upload
Sun Microsystems Inc.
Sektör: Computer
Number of terms: 4807
Number of blossaries: 1
Company Profile:
Sun Microsystems is a multinational vendor of computers, computer software and hardware, and information technology services.
A JavaBeans component that corresponds to a JSP page that includes JavaServer Faces components. The backing bean defines properties for the components on the page and methods that perform processing for the component. This processing includes event handling, validation, and processing associated with navigation.
Industry:Computer
Inexact results must be rounded up or down to obtain representable values. When a result is rounded up, it is increased to the next representable value. When rounded down, it is reduced to the preceding representable value.
Industry:Computer
A Java programming language object that implements the behavior of a custom tag.
Industry:Computer
Indicates how data between a client and a Web container should be protected. The protection can be the prevention of tampering with the data or prevention of eavesdropping on the data.
Industry:Computer
A Java program that extends the functionality of a Web server, generating dynamic content and interacting with Web applications using a request-response paradigm.
Industry:Computer
ISV
Independent software vendor.
Industry:Computer
A Java language program that sends or receives messages.
Industry:Computer
tag
In XML documents, a piece of text that describes a unit of data or an element. The tag is distinguishable as markup, as opposed to data, because it is surrounded by angle brackets (< and >). To treat such markup syntax as data, you use an entity reference or a CDATA section.
Industry:Computer
A Java interface that declares the methods that a client can invoke on a Web service.
Industry:Computer
In the Solaris environment, function calls inside libraries are either mt-safe or not mt-safe; mt-safe code is also called "re-entrant" code. That is, several threads can simultaneously call a given function in a module and it is up to the function code to handle this. The assumption is that data shared between threads is only accessed by module functions. If mutable global data is available to clients of a module, appropriate locks must also be made visible in the interface. Furthermore, the module function cannot be made re-entrant unless the clients are assumed to use the locks consistently and at appropriate times. See also single-lock strategy.
Industry:Computer