Win a copy of Event Streams in Action this week in the Java in General forum!

Rahul Kakkar

Ranch Hand
+ Follow
since Apr 17, 2005
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
0
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by Rahul Kakkar

hello,

i want to test this profiling tool for which i need a java app (or any app for that matter) which would keep my total CPU usage in windows at 95% or above for a stipulated amount of time. any ideas?
12 years ago
My JRML looks like:

<group name="COLUMN_7">
<groupExpression><![CDATA[$F{COLUMN_7}]]></groupExpression>
<groupHeader>
<band height="15">
<staticText>
<reportElement key="StaticText_COLHEADER_COLUMN_7" mode="Opaque" x="0" y="0" width="82" height="15" forecolor="#ffffff" backcolor="#64"/>
<textElement>
<font fontName="Arial" size="10" isBold="true" isItalic="false" isUnderline="false" isStrikeThrough="false" pdfFontName="Helvetica"/>
</textElement>
<text><![CDATA[File Name :]]></text>
</staticText>
<textField isStretchWithOverflow="true">
<reportElement key="TextField_COLFIELD_COLUMN_7" positionType="Float" mode="Opaque" x="82" y="0" width="458" height="15" forecolor="#ffffff" backcolor="#64"/>
<textElement textAlignment="Justified">
<font fontName="Arial" size="10" isBold="true" isItalic="false" isUnderline="false" isStrikeThrough="false" pdfFontName="Helvetica"/>
</textElement>
<textFieldExpression class="java.lang.String"><![CDATA[$F{COLUMN_7}.substring($F{COLUMN_7}.lastIndexOf(File.separatorChar)+1)]]></textFieldExpression>
</textField>
</band>
</groupHeader>
//...
</group>

however for the filename field.. incase the filename is more than the limit of characters set, it only displays:

"c:" out of the entire absolute path. i am not able to figure out why despite setting the "isStretchWithOverflow" property to "true".

any ideas?
could someone please tell me what constitute annotation member types?

thanks.
12 years ago
i am making a utility which basically analyses static code using JDT DOM. Apart from providing the source and class path, the user also provides a JDK. Is there a way to know if the code being analysed is of J2SE or J2ME?
12 years ago
custom class loaders can definitely have their own security issues and it is recommended to stay away as far from them as possible. could someone please cite an example where a custom class loader is causing a possible security issue and how we could have a workaround by not having one in the first place?

thanks!
12 years ago
I read somewhere that 'Date', 'Time' objects and 'System.currentTimeMillis()' method invocations have certain security issues.. could someone please elaborate on what they could be?

thanks.
12 years ago
I read somewhere that 'Date', 'Time' objects and 'System.currentTimeMillis()' method invocations have certain security issues.. could someone please elaborate on what they could be?

thanks.
12 years ago
eclipse has an option to set the following rule as an error and warning. could someone please explain as to what is it actually looking out for?

"Method overridden but not package visible"
okay.. lets try this.. i'm creating an IDE with a java editor built in.. its based on eclipse.. so basically how eclise gives you the option to refactor source that is opened in it.. i want to give the same options in my IDE using eclipse's refactoring APIs/dialogs. hope this clears things out.. if not please let me know..
what i mean is that my application is a standalone application and not running through eclipse. So I want to use the eclipse API to allow refactoring but the dialogs and would have to be mine since my application is a standalone application
hello,

i am developing an SWT application and i want to give the user the option to refactor code using my application. can someone please direct me to a tutorial or something where i can learn how to use the refactoring api of eclipse in my application?
From the java article at javaworld:

http://www.javaworld.com/javaworld/jw-08-2000/jw-0825-ejbrestrict.html

Jtest has a rule which states we should not access or modify security configuration objects.

I was wondering.. would this continue to apply to EJB 2 and higher?

Could anyone give code examples as to what he is talking about? Haven't quite understood.
i'm unable to understand the code/algo behind generating string permutations.. could some explain the code to me? i've tried but am not able to get how its working
13 years ago
i'm keen on learning javascript.. which books would you'll recommend? i wish the headfirst series had one
i basically want to understand how the java api is designed and the underlying design patterns etc.... the javadocs don't give a clear overview picture.. any books recommended?
13 years ago