Friday, January 31, 2020

Conference Management System Essay Example for Free

Conference Management System Essay In Java EE 6, JAX-WS provides the functionality for â€Å"big† web services, which are described in Chapter 19, Building Web Services with JAX-WS. Big web services use XML messages that follow the Simple Object Access Protocol (SOAP) standard, an XML language defining a message architecture and message formats. Such systems often contain a machine-readable description of the operations offered by the service, written in the Web Services Description Language (WSDL), an XML language for defining interfaces syntactically. The SOAP message format and the WSDL interface definition language have gained widespread adoption. Many development tools, such as NetBeans IDE, can reduce the complexity of developing web service applications. A SOAP-based design must include the following elements. †¢ A formal contract must be established to describe the interface that the web service offers. WSDL can be used to describe the details of the contract, which may include messages, operations, bindings, and the location of the web service. You may also process SOAP messages in a JAX-WS service without publishing a WSDL. †¢ The architecture must address complex nonfunctional requirements. Many web service specifications address such requirements and establish a common vocabulary for them. Examples include transactions, security, addressing, trust, coordination, and so on. †¢ The architecture needs to handle asynchronous processing and invocation. In such cases, the infrastructure provided by standards, such as Web Services Reliable Messaging (WSRM), and APIs, such as JAX-WS, with their client-side asynchronous invocation support, can be leveraged out of the box. RESTful Web Services In Java EE 6, JAX-RS provides the functionality for Representational State Transfer (RESTful) web services. REST is well suited for basic, ad hoc integration scenarios. RESTful web services, often better integrated with HTTP than SOAP-based services are, do not require XML messages or WSDL service–API definitions. Project Jersey is the production-ready reference implementation for the JAX-RS specification. Jersey implements support for the annotations defined in the JAX-RS specification, making it easy for developers to build RESTful web services with Java and the Java Virtual Machine (JVM). Because RESTful web services use existing well-known W3C and Internet Engineering Task Force (IETF) standards (HTTP, XML, URI, MIME) and have a lightweight infrastructure that allows services to be built with minimal tooling, developing RESTful web services is inexpensive and thus has a very low barrier for adoption. You can use a development tool such as NetBeans IDE to further reduce the complexity of developing RESTful web services. A RESTful design may be appropriate when the following conditions are met. †¢ The web services are completely stateless. A good test is to consider whether the interaction can survive a restart of the server. †¢ A caching infrastructure can be leveraged for performance. If the data that the web service returns is not dynamically generated and can be cached, the caching infrastructure that web servers and other intermediaries inherently provide can be leveraged to improve performance. However, the developer must take care because such caches are limited to the HTTP GET method for most servers. †¢ The service producer and service consumer have a mutual understanding of the context and content being passed along. Because there is no formal way to describe the web services interface, both parties must agree out of band on the schemas that describe the data being exchanged and on ways to process it meaningfully. In the real world, most commercial applications that expose services as RESTful implementations also distribute so-called value-added too lkits that describe the interfaces to developers in popular programming languages. †¢ Bandwidth is particularly important and needs to be limited. REST is particularly useful for limited-profile devices, such as PDAs and mobile phones, for which the overhead of headers and additional layers of SOAP elements on the XML payload must be restricted. †¢ Web service delivery or aggregation into existing web sites can be enabled easily with a RESTful style. Developers can use such technologies as JAX-RS and Asynchronous JavaScript with XML (AJAX) and such toolkits as Direct Web Remoting (DWR) to consume the services in their web applications. Rather than starting from scratch, services can be exposed with XML and consumed by HTML pages without significantly refactoring the existing web site architecture. Existing developers will be more productive because they are adding to something they are already familiar with rather than having to start from scratch with new technology. RESTful web services are discussed in Chapter 20, Building RESTful Web Services with JAX-RS. This chapter contains information about generating the skeleton of a RESTful web service using both NetBeans IDE and the Maven project management tool. Deciding Which Type of Web Service to Use Basically, you would want to use RESTful web services for integration over the web and use big web services in enterprise application integration scenarios that have advanced quality of service (QoS) requirements. †¢ JAX-WS: addresses advanced QoS requirements commonly occurring in enterprise computing. When compared to JAX-RS, JAX-WS makes it easier to support the WS-* set of protocols, which provide standards for security and reliability, among other things, and interoperate with other WS-* conforming clients and servers. †¢ JAX-RS: makes it easier to write web applications that apply some or all of the constraints of the REST style to induce desirable properties in the application, such as loose coupling (evolving the server is easier without breaking existing clients), scalability (start small and grow), and architectural simplicity (use off-the-shelf components, such as proxies or HTTP routers). You would choose to use JAX-RS for your web application because it is easier for many types of clients to consume RESTful web services while enabling the server side to evolve and scale. Clients can choose to consume some or all aspects of the service and mash it up with other web-based services. Types of Web services You can host simple Web services without the needing complex setup. In addition, experienced Web service developers can host more complex services by handling the deployment details themselves. Types of Web services include simple and complex: Simple Web services For simple Web services, only simple data types (string, int, and other types) are sent or received as arguments and values that are returned from methods. You must specify the Java class that provides the implementation for the Web service. InfoSphereâ„ ¢ MDM Server for PIM handles generating any WSDL, and creating any WSDD (Web Services Deployment Descriptor) for the deployment of the service. Complex Web services For more complex Web services, you provide WSDD to configure the ability to send and receive more than simple types. You author and provide the WSDD in the WSDD field in the Web Service Console, or through the WebService::setWsddDocPath() script operation. IBM ® InfoSphere Master Data Management Server for Product Information Management uses the WSDD to deploy the defined service instead of using default WSDD for IBM InfoSphere Master Data Management Server for Product Information Management. You must have a good understanding of Web services to author your WSDD. You must also know the Java2WSDL, and WSDL2Java tools in case you break your deployment with the complex Web service.+ Big web services Big web services are based on SOAP standard and often contain a WSDL to describe the interface that the web service offers. The details of the contract may include messages, operations, bindings, and the location of the web service. Big web services includes architecture to address complex non-functional requirements like transactions, security, addressing, trust, coordination, and also handles asynchronous processing and invocation. The SOAP message format and the WSDL interface definition language have gained widespread adoption in traditional enterprises. SOAP based Web Services is a great solution when you need, †¢ Asynchronous processing †¢ Reliability †¢ Stateful operations – If the application needs contextual information and conversational state management then SOAP 1.2 has the additional specification in the WS* structure to support those things (Security, Transactions, Coordination, etc). RESTful Web Services RESTful web services are based on the way how our web works. Our very own world wide web (www) – the largest distributed application – is based on an architectural style called REST – Representational State Transfer. REST is neither a standard nor a protocol. It is just an architectural style like say for example client-server architecture (client-server is neither a standard nor a protocol). Web services following this architectural style are said to be RESTful Web services. So what is this REST? According to Roy Fielding who coined this term, â€Å"Representational State Transfer is intended to evoke an image of how a well-designed Web application behaves: Presented with a network of web pages (a virtual state-machine), the user progresses through an application by selecting links (state transitions), resulting in the next page (representing the next state of the application) being transferred to the user and rendered for their use.† In the web, everythi ng is identified by resources. When we type a URL in the browser we are actually requesting a resource present on the server. A representation of the resource (normally a page) is returned to the user which depicts the state of the application. On clicking any other link, the application transfers state with the new representation of the resource. Hence the name Representational State Transfer. REST-style architecture follows this concept and consists of clients and servers. Clients initiate requests to servers; servers process requests and return appropriate responses. Requests and responses are built around the transfer of representations of resources which are identified by URI (Uniform Resource Identifier). RESTful web services are based on HTTP protocol and its methods mainly PUT, GET, POST, and DELETE. These web services are better integrated with HTTP than SOAP-based services are, and as such do not require XML SOAP messages or WSDL service definitions. Because RESTful web services use existing well-known standards (HTTP, XML, URI, MIME) and have a lightweight infrastructure that allows services to be built with minimal tooling, developing RESTful web services is inexpensive and thus has a very low barrier for adoption. RESTful Web Service HTTP methods A RESTful web services is a collection of resources. For example, consider an office has deployed a web services to get a list of employees and to get individual employee data for use with other departments. The web service makes available a URL to a ‘list of employees’ resource. For example, a client would use this URL to get the employee list: http://www.example.com/myoffice/employees On sending a request to that particular URL, the client would receive the following document. |1| | |2|234 | |3|235 | |4|236 | |5|237 | |6| | The above document contains the links to get detailed info about each employee. This is a key feature of REST. The client transfers from one state to the next by examining and choosing from among the alternative URLs in the response document. To get individual employee information, the web service makes available a URL to each employee resource. For example, to get employee information whose id is 237, the client may send a request to the following URL: http://www.example.com/myoffice/employee/237 And the response document containing the employee information may be as follows: |1 | | |2 |237 | |3 |xyz | |4 |abc | |5 |123 ABC St | |6 |3344.56 | |7 | | [pic] We have seen the use of HTTP GET method to get the information. In the same way, we can use the other HTTP methods like POST, PUT and DELETE. The logical meaning of these HTTP methods for the URL http://www.example.com/myoffice/employees is as follows, †¢ When a HTTP POST request is sent to the above URL with an employee data, the data will be added to the employee list. †¢ When a HTTP PUT request is sent to the above URL with a list of employees then the original list will be modified with this employee list. †¢ When a HTTP DELETE request is sent to the above URL then the entire list of employees will be deleted. Similarly for the URL http://www.example.com/myoffice/employee/237 the actions may be interpreted as follows, †¢ When a HTTP POST request is sent to the above URL, treat the addressed member as a collection in its own right and create a new entry in it. o For example consider a situation where the employee works in a particular department and the URL http://www.example.com/myoffice/dept/A1205 represents the list of employees working in department A1205. So a POST request to this URL with employee data will add an employee data to that particular department. †¢ When a HTTP PUT request is sent to the above URL then modify that particular employee with the new request data or create if employee does not exist. †¢ When a HTTP DELETE request is sent to the above URL then delete that particular employee. In this REST form of communication, the service producer and service consumer should have a mutual understanding of the context and content (XML) being passed along. Because there is no WSDL to describe the web services interface, both parties must agree on the schemas that describe the data being exchanged and on ways to process it meaningfully. A RESTful design may be appropriate when, †¢ The web services are completely stateless. †¢ The data that the web service returns is not dynamically generated and can be cached. o The caching infrastructure that web servers provide can be leveraged to improve performance. However, the developer must take care because such caches are limited to HTTP GET method for most servers. †¢ The service producer and service consumer have a mutual understanding of the context and content being passed along. †¢ Bandwidth is particularly important and needs to be limited. o REST is particularly useful for limited-profile devices, such as PDAs and mobile phones, for which the overhead of headers and additional layers of SOAP elements on the XML payload must be restricted. †¢ Web service delivery or aggregation into existing web sites is to be enabled.

Thursday, January 23, 2020

Censorship of Music Essay -- social issues

Censorship of Music In today's society, all types of music artists are expressing their views, opinions and feelings in their songs about what they see and what they know. This is on of the great things about this country, the freedom to express yourself. It is not fair, nor is it constitutional that music should be censored in anyway. It is not only rap music trying to be censored it is in all types of music. They are taking away their rights and it isn't fair. As reported in the New York Times. "Wall-Mart CD standards are Changing Pop Music", Wal-Mart and other large department stores sell CD's by your favorite artists which are not what your favorite artists originally created. Some retailers refuse to carry CDs with "Parental Advisory Stickers", a few also go as far as to make it known to labels and artists that if the CD comes to their shelves with a "dirty" word, a "controversial" cover, or an "explicit" lyric it will not be allowed on the shelves. Some of the artists include Nirvana, Beck, John Mellencamp and the list goes on. (Internet ultratnet) The most recent case involving Wal-Mart and censorship, was the new Sheryl Crow album. A song on the album which lashes the company for selling guns that end up in the wrong hands as caused the company to ban the album in stores. (Schruers 64) Delores Tucker, William Bennett, Senator Joseph Lieberman, and Senator Sam Nunn held a press conference in Washington D.C. The message: censor obscene music and censor "pro-drug lyrics". These censors announced their plan to pressure major record companies to discontinue production of what they called "obscene" music and music which contains " blatantly pro-drug lyrics. All of the CDs targeted as "obscene" already carry RIAA Parental Advisory Labels. Parents are already provided with the information they need if they choose to monitor their children's musical selections. Discontinuing production of this music takes the freedom of expression away form everyone- musicians and fans of every age. (Internet ultranet) The increas ing controversy surrounding rap music, with its rough-edged lyrics about sex and violence, has prompted two very different responses from black oriented radio stations in New York and Los Angeles. Two stations WBLS New York and KACE in Los Angeles, have announced they wont play the roughest and most offensive songs. A third station WPWR opted... ... of their age. I always tell them that if you want to keep listening to the music that you enjoy, starting today you have to learn to fight back. If you don't fight for your own freedom, no one is going to give it to you". (Internet xnet). Morello believes and I agree, speech and expression are being shackled in the U.S., and she puts much of the blame on the current political climate. " Cenosorship is coming down now harder then it has before. " she says. " Look at the Congress we have, trying to take funds away from the National Endowment for the arts, trying to kill public television. They must be living in the Dark Ages." (Internet xnet). After reaserching music censorship and supporting anti-censorship organizations, I realize that there is much wrok to be done to get free speech. There will always be someone or some group to stand aganist what you believe. I think the only way to really gain full freedom of speech is to fight and not give up. I think that the more people realize that rights are being violated, the more people will support the anit-censorship groups. I believe that people who do support these groups should really get involved. It is the only way we can win.

Tuesday, January 14, 2020

Islamic Law Essay

Quran and Sunnah are the fundamental sources of Islamic Shariah. When the solution to the arising problems is not available in these sources, Ijtihad is used to reach an appropriate solution in Islamic jurisprudence. Secondary sources of Islamic Shariah like Ijma, Qiyas, Istihsan and Maslahah are also forms of Ijtihad. These secondary sources provide a sequence and a data base to the Mujtahid to reach to a solution of a problem in the most appropriate way and at the same time assist in formulation of Islamic law and development of system of Shariah as a whole. Introduction Quran and Sunnah (in the form of Hadith) are the two fundamental sources of Shariah. Generally the definition and acceptability of all other sources of Shariah varies in various sects of Islam. According to Sunni school of thought, the fundamental sources of Islam include Quran, Sunnah and Ijtihad, whereas according to Shiite school of thought, Quran and Sunnah are the only authentic sources of Shariah and Ijtihad can only be a contributing factor and that too only in some circumstances. Ijtihad can be defined as use of one’s own utmost abilities in deriving secondary opinions from the four fundamental sources of Islamic law, namely Quran, Sunnah, Ijma and Qiyas†. Can the Secondary Sources be Characterized as Forms of Ijtihad In the eyes of majority of Muslim scholars, especially Sunni Muslims, all the secondary sources including Ijma, Qiyas, Istihsan and Maslahah are forms   of Ijtihad. Rather all these secondary sources in one form or the other contribute towards Ijtihad. For example, in case of an event for which no authentic proof is available in Quran and Sunnah, the only option available is Ijtaihad. This Ijtaihad will either be supported by consensus of different learned scholars of Islam, or it will be done by comparing and drawing similarities or differences in the different events of past which occurred during the times of Prophet or His companions. In case no previous event is available, and consensus does not occur among the scholars on the issue, then the only way out is to either look for the ‘good by one’s own deliberations’ (Istihsan) or to determine what is in the interests of human welfare (Istislah or Maslahah). Therefore, it will not be wrong to say that all the four secondary sources can be characterized as forms of Ijtihad and all contribute towards it. Importance of Having so Many Different Sources to Represent Ijtihad Ijtihad is a very complex phenomenon and that is why, very strict criteria have been set in Islam for a person to be a Mujtahid. Therefore, while making a judgment a Mujtahid needs to evaluate the available data before he proceeds to make a judgment. Now the most authentic and fundamental sources i. e. Quran and Sunnah have already been ruled out for the reason that if a solution was present is those sources, there was no need for Ijtihad. In the absence of those two sources, a Mujtahid needs some additional sources in order to formulate the judgment, though Quran and Sunnah must be kept at the back of the mind. These additional sources like Ijma, Qiyas, Istihsan and Maslahah provide the Mujtahid with a data base and a sequence to analyze the event and lead him logically to an acceptable solution which is not conflicting with the teachings of Quran and Sunnah. Therefore, it is extremely important to have multiple sources to represent Ijtihad. Importance of Secondary Sources in Creating Law and Development of System of Shariah While studying the Islamic law, one must keep in mind that the times have changed a lot since the era of Prophet Muhammad and with the passage of time many situations came up which were not there in the times of Prophet. For example in the times of Prophet, there was not concept of photography and only thing that was available was â€Å"Tasweer† that is the hand painted pictures and the person who made those pictures was known as â€Å"Mussawir†. The Prophet prohibited the â€Å"Tasweer† in that time and He was quoted as saying that a person who will make a â€Å"Tasweer† will be asked on the Day of Judgment to bring life into that â€Å"Tasweer†. Today, we know that in the present era photography is a compulsion in passport and identity cards etc. Therefore, Islamic scholars reached a conclusion through Ijtihad that what was prohibited was â€Å"Tasweer| and not the photography. Photography, as per modern science, is actually the image preserved on a paper and even the companions of the Prophet used to see the image in mirror or in the water, so according to scholars, it is not prohibited in Islam. Similarly there are many other problems which needed solution in the present time due to modernization and advent of technology. If these secondary sources were not used in creation of Islamic law, the Islamic law will become stagnant and will not be able to meet the requirements of changing scenario and modern developments of science and technology. Hence, the basis characteristics of these secondary sources i. e. consensus, measurement and comparison, equity and public policy are all extremely important in formulation of Islamic law. Side by side, it will also help in development of system of Shariah as a whole so as to meet the requirement of pragmatism, practicality and need of the changing times. Conclusion According to Holy Quran, Prophet Muhammad has been sent as a Prophet for whole universe and this is not possible till the time his teachings are applicable to all the times. This applicability for all the times is only possible if the teachings can be interpreted according to changing times. All this is only possible through these secondary sources, if used correctly in accordance with the basic teachings of Quran and Sunnah. Hence, these secondary sources are part and parcel of Islamic law and must be taken as such. References References have not been cited as per the requirement of the client. Original language has been used without quotations.