Software  >   Systems Software  >   Programming Languages  >   Object-Oriented Programming Languages  >   Java  >  

Java Remote Method Invocation

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Java RMI, Remote Method Invocation, RMI
DEFINITION: RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network. RMI is the Java version of what is generally known as a remote procedure call (RPC), but with the ability to pass one or more objects along with the request.  … 
Definition continues below.
Java Remote Method Invocation Reports
51 - 75 of 685 Matches Previous Page  |  Next Page
Architectural overview: Compliant healthcare software
sponsored by Compressus
RESOURCE: Read this architectural overview to learn about this fully compliant software designed for healthcare facilities.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Compressus

Automating the back office: How BPM can help improve productivity
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper describes how some major retail banks have accomplished significant productivity and quality improvements by using BPM to automate the back office.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

TIBCO Software Inc.

Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Best Practices for Selecting an Enterprise Time and Attendance System
sponsored by Workforce Software
WHITE PAPER: Access this guide to selecting an enterprise time and attendance system for assistance in identifying and describing necessary product capabilities. Additionally, this guide provides questions to ask potential providers to uncover if they have the resources, expertise, and products capable of optimizing your current processes.
Posted: 24 Mar 2015 | Published: 09 Mar 2015

Workforce Software

Best Practices – Maximizing Efficiency Through Service Automation
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Automating tasks such as provisioning, management, and issue remediation enables IT organizations to transform into a true broker of services, which is extremely beneficial for IT service delivery and overall business efficiency. This white paper provides best practices for using service automation to maximize efficiency and get closer to XaaS.
Posted: 02 Feb 2015 | Published: 31 Oct 2014

FrontRange Solutions Inc.

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines
sponsored by Dell, Inc.
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Dell, Inc.

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Azul Pauseless Garbage Collection: Improving Application Scalability and Predictability
sponsored by Azul Systems, Inc
WHITE PAPER: This paper examines garbage collection issues such as concurrent marking and concurrent relocation, as well as, benefits of acheiving pauseless garbage collection compared to traditional collection approaches.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

Azul Systems, Inc

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Batch processing with WebSphere Compute Grid: Delivering business value to the enterprise
sponsored by IBM
EBOOK: Reduced windows for operation and increases in data make it imperative for today's batch processing systems to scale out and perform better. Read this white paper to learn how to address these and other challenges of modern batch processing while reducing costs and improving time to market.
Posted: 14 Feb 2012 | Published: 11 Jan 2010

IBM

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

Better Software Management and More Secure Computers
sponsored by Dell, Inc. and Intel®
CASE STUDY: This whitepaper details the systems management solution that Princeton University selected to solve their three major IT problems.
Posted: 18 Jun 2014 | Published: 05 Dec 2013

Dell, Inc. and Intel®

BlackBerry JDE Plug-in for Eclipse
sponsored by BlackBerry
SOFTWARE DOWNLOAD: The BlackBerry® JDE Plug-in for Eclipse® offers a familiar way to build and test rich mobile applications optimized for BlackBerry smartphones. Read on to learn more and to download the BlackBerry JDE Plug-in for Eclipse.
Posted: 03 Jun 2010 | Premiered: 24 May 2010

BlackBerry

BlackBerry® by Research In Motion: An @stake Security Assessment
sponsored by BlackBerry
WHITE PAPER: Research In Motion (RIM) engaged @stake, Inc. to perform a Product Penetration Assessment of the Java™ based BlackBerry Wireless Handhelds™ supporting components.
Posted: 11 Aug 2006 | Published: 01 Nov 2003

BlackBerry

BlackBerry® Push Service SDK documentation
sponsored by BlackBerry
INFORMATION CENTER: BlackBerry® Push Service SDK contains a set of Java® libraries you can use to develop push applications. Access this information center, with technical overviews, guides and more to start developing BlackBerry® Push Services.
Posted: 11 Jun 2010 | Published: 11 Jun 2010

BlackBerry
51 - 75 of 685 Matches Previous Page    1 2 3 4 5 6    Next Page
 
JAVA REMOTE METHOD INVOCATION DEFINITION (continued): …  The object can include information that will change the service that is performed in the remote computer. Sun Microsystems, the inventors of Java, calls this "moving behavior." For example, when a user at a remote computer fills out an expense account, the Java program interacting with the user could communicate, using RMI, with a Java program in another computer that always had the latest policy about expense reporting. In reply, that program would send back an object and associated method information that would enable the remote computer program to screen the user's expense account data in … 
Java Remote Method Invocation definition sponsored by SearchSOA.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement