I hereby claim:
- I am ankurtrapasiya on github.
- I am trapaank (https://keybase.io/trapaank) on keybase.
- I have a public key whose fingerprint is FE16 FA14 7C8A EC8E 4BFE 9E08 DDD0 BA4F 7CD6 232A
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
### Keybase proof | |
I hereby claim: | |
* I am trapaank on github. | |
* I am trapaank (https://keybase.io/trapaank) on keybase. | |
* I have a public key whose fingerprint is FE16 FA14 7C8A EC8E 4BFE 9E08 DDD0 BA4F 7CD6 232A | |
To claim this, I am signing this object: |
public class SocketServlet extends WebSocketServlet { | |
private static final long serialVersionUID = 1L; | |
private static final String GUEST_PREFIX = "Guest"; | |
private final AtomicInteger connectionIds = new AtomicInteger(0); | |
private final Set<ChatMessageInbound> connections = | |
new CopyOnWriteArraySet<ChatMessageInbound>(); |
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> | |
<title>Web Socket Example</title> | |
<script> | |
var socket = new WebSocket( | |
"ws://localhost:8080/WebSocketExample/SocketServlet"); | |
socket.onopen = function() { | |
alert("opened a socket"); |
Section 1: Application Design Concepts and Principles | |
Explain the main advantages of an object-oriented approach to system design including the effect of encapsulation, inheritance, and use of interfaces on architectural characteristics. | |
Describe how the principle of "separation of concerns" has been applied to the main system tiers of a Java Platform, Enterprise Edition application. Tiers include client (both GUI and web), web (web container), business (EJB container), integration, and resource tiers. | |
Describe how the principle of "separation of concerns" has been applied to the layers of a Java EE application. Layers include application, virtual platform (component APIs), application infrastructure (containers), enterprise services (operating system and virtualization), compute and storage, and the networking infrastructure layers. | |
Section 2: Common Architectures | |
Explain the advantages and disadvantages of two-tier architectures when examined under the following topics: scalability, maintainability, reliab |
http://webdesignledger.com/tools/10-jquery-plugins-that-will-make-your-life-easier | |
http://tympanus.net/Tutorials/FancySlidingForm/ | |
http://www.egrappler.com/jquery-clean-and-simple-tooltips-gips/ | |
http://www.greepit.com/notify/# |