and run the
programs in this chapter. Now edit the files to remove all of the buffering for
the input and output, then compile and run them again to observe the results.
a server that asks for a password, then opens a file and sends the file over
the network connection. Create a client that connects to this server, gives the
appropriate password, then captures and saves the file. Test the pair of
programs on your machine using the
(the local loopback IP address
produced by calling
the server in Exercise 2 so that it uses multithreading to handle multiple
so that output flushing doesn’t occur and observe the effect.
to produce an applet that is a password-protected gateway to a particular
portion of your Web site.
challenging) Create a client/server pair of programs that use datagrams to
transmit a file from one machine to the other. (See the description at the end
of the datagram section of this chapter.)
challenging) Take the
program and modify it so that when you click on the resulting name it
automatically takes that name and copies it to the clipboard (so you can simply
paste it into your email). You’ll need to look back at the IO stream
chapter to remember how to use the Java 1.1 clipboard.
Moving from an on-premises environment to Office 365 does not remove the need to plan for disruptions or reduce the business risk requirements for protecting email services. If anything, some risks increase with a move to the cloud. Read how to ease the transition every business faces if considering or already migrating to cloud email.
This white paper discusses:
Setting expectations when migrating to Office 365
Understanding the implications of relying solely on Exchange Online security
Necessary archiving …
Enterprises are increasingly looking to platform as a service (PaaS) to lower their costs and speed their time to market for new applications. Developing, deploying, and managing applications in the cloud eliminates the time and expense of managing a physical infrastructure to support them. PaaS offerings must deliver additional long-term benefits, such as a lower total cost of ownership (TCO), rapid scalability, and ease of integration, all while providing robust security and availability. This report …