Vallabhaneni Suresh Kumar

Ranch Hand
+ Follow
since Mar 01, 2004
Merit badge: grant badges
For More
Cows and Likes
Cows
Total received
In last 30 days
0
Forums and Threads

Recent posts by Vallabhaneni Suresh Kumar

Hello Tanase,
When I tried to click the link given by you, its giving no such topic number exists? Can you help me out in answering the question posted by me?

Thank you
Why there is a separation between life cycle methods and business logic methods i.e. we are Remote and Home interfaces for business logic and life cycle methods. Can't we define them in a single interface, why two interfaces?
I am new to EJB so don't mind if you feel this as a silly question?

Thank you
Holding the reference of the other class within some other class is known as composition.
Acquiring the properties of a base class into the child class is known as inheritance

Thank you
19 years ago
What is the difference between object reuse using inheritance versus object reuse using composition. Which of these techniques breaks the encapsulation of the extended object.


Thank you
19 years ago
What is the need for two classes namely thread and runnable. Why start() is called to run a thread instead of calling run() directly.

Thank you
How to share a context object between two machines assuming that one has app server and another one just has JDK?

Thank you
19 years ago
Is memory leakage possible in Java? If yes, can you describe a case in which memory leaks may occur, and what is the way to avoid that?

Thank you
19 years ago
We had wait and notify methods in Object class? Why are the wait and notify methods provided in the Object class instead of in the Thread class, though these methods are used by a Thread.


Thank you
Suppose if I write an application. This application should not be accessed by all the people. Only me and a few people should access it. How I can implement security to my application. Its a standalone application not a web application.

Thank you
19 years ago
How I can provide security for my applications? I mean if I write some standalone application. I need it to be secured. How can I implement security to my application. Please explain me with an example

Thank you
19 years ago
Is memory leakage possible in Java? If yes, can you describe a case in which memory leaks may occur, and do you know a way to avoid that?

Thank you
19 years ago
what are the advantages in using Byte Reader than Buffered Reader

Thank you
19 years ago
When would you use a synchronized method and when a synchronized block?

Thank you
What is a difference between Hashtable, HashMap and TreeMap? How do you decide which one to use?

Thank you
19 years ago
In servlets I want to do something,when the session expires.How to achive this?

Thank you
19 years ago