What is SDK Java for and...

and can it help me to open some chat windows.(.it is some program SDK Java 4.0. )what for does it serves at all ..if somebody can explain me ......

As far as I understand the full form of SDK is Software Developers Kit. It is a tool with which we develop programs. There is an SDK for Visual C++ and an SDK for Java. There can be a other SDKs for other languages.
The SDK provides for classes and functions that can be used in your programs. Obviously it makes software development easier and faster. For example if you need to manage dates, use a timer you can either write a program from scratch or you can use date functions provided by the SDK to manage time.
I am learning Java and under no circumstances can the above be taken as Bible.
Thanks
Krishnan

Similar Messages

  • I have Mac OS X Version 10.6.8 ,I want to buy the updated operating system that puts iMessage and Facetime on my Macbook Pro. What should I search for, and then purchase, in the App Store?

    I have Mac OS X Version 10.6.8 ,I want to buy the updated operating system that puts iMessage and Facetime on my Macbook Pro. What should I search for, and then purchase, in the App Store?

    FaceTime can run in the version of OS X that you currently have. To get Messageyou need Mountain Lion. The protocol used by Messages is iMeassage.
    The question is does your MBP meet the specs for Mountain Lion.
    iMac (Mid 2007 or newer)
    MacBook (Late 2008 Aluminum, or Early 2009 or newer)
    MacBook Pro (Mid/Late 2007 or newer)
    MacBook Air (Late 2008 or newer)
    Mac mini (Early 2009 or newer)
    Mac Pro (Early 2008 or newer)
    Xserve (Early 2009)
    Your Mac needs:
    OS X v10.6.8 or OS X Lion already installed
    2 GB or more of memory
    8 GB or more of available space

  • What does SC stand for and is used for?

    I am new to SRM, can anyone tell What does SC stand for and is used for?

    Hi
    SC- Shopping cart . For eg.It is a just a request form to purchase the materials /services.
    http://help.sap.com/saphelp_srm2007/helpdata/en/74/344c430fab4d0bbc30996d56cc293a/frameset.htm
    SC is also one of the business objects in SRM.
    regards
    Muthu

  • What is ABAP/JAVA Proxy and whats the use of it?

    Hello All,
    What is ABAP/JAVA Proxy. And why do we need to use them? I am not sure of the definitions given on help.sap.com. Thats the reason I am posting this question. Right answer will be rewarded. Thanks in advance.
    Regards,
    Farooq.

    HI Farooq
    <u><i>ABAP Proxy</i></u>
    ABAP server proxy is created for the inbound interface creted in XI's Integration repository proxy should be created in the business system for which the interface is created .
    U can reference following link :
    http://help.sap.com/saphelp_nw2004s/helpdata/en/02/265c3cf311070ae10000000a114084/frameset.htm
    Server Proxies are generated for Inbound Message Interfaces. These are used to Process the Data coming into SAP System from an external application.
    Sproxy is the transaction to generate Proxies.
    Plz refer to this blog on abap server proxies
    /people/siva.maranani/blog/2005/04/03/abap-server-proxies
    <u><i>Java Proxy</i></u>
    Java Proxoies are used to allows your java Applications ( j2ee, j2se applications )to interact directly to the Integration Server of XI without any special adapters.
    All documents are available on SDN itself .
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/7d4db211-0d01-0010-1e8e-9b07fc2113ab - How To Work with XI 3.0 Java Proxies
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/a068cf2f-0401-0010-2aa9-f5ae4b2096f9- Java Proxies and SAP XI - The Inside Story, Part 1
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/f272165e-0401-0010-b4a1-e7eb8903501d - Java Proxies and SAP XI - The Inside Story, Part 2
    Proxies help you achieve non-standard functionality for which the out of box XI adapters do not suffice. Just to give you an example, consider a system with which XI has to integrate , the only interface the system offers is a TCP / IP socket based interface. You could write a Java proxy which would interact over sockets with your target system, which is not possible with other standard adapters which are shipped with your XI installation
    You can refer demo on SDN TV, on this link
    https://www.sdn.sap.com/irj/sdn?rid=/webcontent/uuid/110ff05d-0501-0010-a19d-958247c9f798 [original link is broken]
    Cheers..
    Vasu
    <i>** Reward Points if found useful **</i>

  • What are the mapfiles for and when should I use them?

    Hi,
    what are the map files for and why/when should I use them?
    /usr/lib/ld/map.noexstk
    usr/lib/ld/map.noexbss
    /usr/lib/ld/map.noexdata
    /usr/lib/ld/map.pagealign

    Hi, I'm sure you've read the comments, but for the benefit of those who haven't: /usr/lib/ld/map.noexstk # Linker mapfile to create a non-executable stack definition within an # executable. /usr/lib/ld/map.noexbss # Link-editor mapfile to create a non-executable bss segment definition # within an executable. /usr/lib/ld/map.noexdata # Link-editor mapfile to create a non-executable data segment definition # within an executable. These stop the various segments from being executable. Which could reduce the risk surface for exploiting security holes in an application. /usr/lib/ld/map.pagealign # Linker mapfile to create page-aligned data within an executable. Aligning the start of the data segment can reduce the number of TLB entries needed to map the data. So the smallest TLB page size is 8KB, then we have 64KB, then 4MB etc. If the data starts on a 4MB boundary then it can be mapped with 4MB pages, if not then it has to be mapped with 8KB pages until a 64KB boundary, then 64KB pages until we get to a 4MB boundary. You sometimes get a bit of performance from this, but you may also get performance stability from it. If the mapping is random sometimes it works well, sometimes it works less well. Regards, Darryl.

  • I get notifications of changes for radiowmpcoregecko7.dll. It is indicated that it is from Firefox. What is this file for and why does it keep changing.

    About once a week to two weeks I receive notification through my anti-virus that this file has been changed. It appears to be part of Firefox. What is it and what does it do?
    Thank you.

    See this thread for a similar issue:
    *[[/questions/878063]]

  • Hackers - What to look out for and prevention!?

    Hi, I was just looking through my logs and such and saw some alot of gobbly gook. It made me nervous. so I was wondering what are the main tips on detecting a Hacker, spotting Hacking attempts and prevention of Hackers?
    I understand that I depends on what kit you have and such and that your computer has to make connections with others to use the internet but what do I and every other average Apple user need to look out for in logs on modems, firewalls and applications.
    I personaly have looked at my logs on my Netgear Modem and logs on my System Profiler application. I see connections to various things but i'm no good at networking. All I know is to have my firewall on!
    Also...I am always nervous when using Bit Torrent, do I have any need to be?
    Thanks all ~ Joe
    p.s - I have also read in other posts that posting log information is a dumb idea so have played safe and kept them to myself. So there's my tip! :)
    PowerBook G4 15" - Sept 04- 1.5 GHz   Mac OS X (10.4.2)   Power Mac G4 1GHz DP - Airport Extreme - 2MBPS Broadband

    It's not always true that an invalid access is an attack. For example, if your firewall application reports that the misused source port is a high port number, it might be a trigger packet. Some ISP may configure the servers system incorrectly or insufficiently. Some organization or a group of companies may send scanning packets to P2P users in a special way in order to improve heavy WAN traffics caused by P2P software users. You might mis-configure your modem or router firewall system or a built-in firewall has a bug, etc.
    If a source port number is in the rage between 49152 and 65535, it is normally either dynamic or private ports. Dynamic ports are randomly assigned, and private ports are used by OS software or applications. By seeing any high ports with other logs events, you may guess whether someone attacks your node, about his/her skills/ability and the time zone. You may see one of high ports displaying on Netstat program for Network Utility application when pressing "Display the state of all current socket connections"-- udp4 0 0 localhost.xxxxx. Netstat may help to know who is on networks but not in real time. You need to refresh the button manually.
    Here are two basic points:
    * It is important to know yourself and think of your computer configurations before you start thinking who is there or your enemy.
    * The most important matter in computer security is to be aware, and watch the systems carefully something most people do not do. For example, check if asl.log facility status with the level integer value displays differently from regular bases. If system.log or console.log reports that your computer name and the host name are changed, you may be facing to a serious security situation.
    If you want to see whether your ISP blocks ports or you have opened ports, security scan service such as grc.com (Shields UP), dshield.org or seifried.org are available on the Internet.
    Mac OS X Tiger built-in firewall (ipfw) has basic features. You can add rule-sets if you want. See for example here. Normally, you do not need to change the default rule-sets that blocks unwanted incoming packets.
    Here is how to read about a log example for Mac OS X built-in firewall:
    ipfw: 64000 Deny TCP 123.456.78.900:4990 444.555.66.777:1433 in via en1
    The ipfw rule-set 64000 denies a Transmission Control Protocol IP packet sent by the source address 123.456.78.900 via the port number 4990 to attempt an invalid access to the destination address 444.555.66.777 targeting to the port 1433 in via your interface "AirPort." The destination address in this case is your local IP address, but not a remote IP address assigned for your ISP (for instance) node. The BSD device name for Built-in Ethernet interface is "en0." "en1" is used for AirPort or the first PCI Ethernet card if you install one.
    You see the Mac OS X built-in firewall do not tell you the service name of a misused port number and the host name of the source IP address in real time. Therefore, it may be uncomfortable to analyze the background in details-- especially, if events of the firewall log would be flooded by access attempted every minute or more frequently. You may not even be able to send an e-mail to abuse team who is responsible for the source IP address net block to ask for the investigation if you want to do so. To send an enquiry has two meaning-- suggesting their server vulnerability or insufficient configuration and making a good use of their reply to your analysis.
    In this case, an unassigned port number 4990 is misused by someone directly or indirectly (e.g. bot, botarmy, etc.) from the server 123.456.78.900, and the port 1433 for sniffing if a Microsoft SQL Server (Windows related) is running on your machine. There is also known history that some viruses try to exploit vulnerabilities in Microsoft SQL Server. The most known ports being misused in recent days are 8 (ICMP ping) 135, 139, 445 and ports for Trojan Horses and P2P technology driven software such as BitTorrent-- See also this world map, http://isc.sans.org/.
    You may think about why bad IP packets pass through your ISP servers especially if servers are configured with a firewall system.
    If you want to know more about Transmission Control Protocol specification, find "RFC 793" documentation on the Internet. All assigned port numbers document is available at www.iana.org.
    If you are interested in third-party firewall, DoorStop X and Who's There are very good applications. You'll see it when you use their trial version with the full features.
    Good firewall applications may protect your computer from various invalid access attempts but not for the real solution. Good packet analyzing (Sniffers) applications may help to inform you a result of analysis but not for the real solution. End-users, ISPs and the authorities need to run to the same direction together.

  • What is XCM stands for and Webshiop Collabration?

    HI Experts
    can any body can answer full form of XCM asked in interview as FAQ
    and can any body can explain Webshop collabration in Internet Sales?
    Regards
    Venkat

    You use the Extended Configuration Management (XCM) Administration tool to configure Web applications, once you have installed the Web components. You use it to make configuration settings needed at runtime.
    The CRM Web applications are used in the following scenarios:
    ·        CRM E-Commerce
    ·        ERP E-Commerce
    ·        Selling via eBay in CRM and ERP
    ·        Channel Management
    Web Collabration is an E Selling method in ICWEB with Live customer support communication channels like Email,Chat,Co browsing.
    Regards,
    Satish Mathala
    ·        Interaction Center
    ·        Interaction Center WebClient
    ·        Interaction Center Workforce Management
    ·        Internet Customer Self-Service
    ·        SAF
    You only have to set up XCM configuration settings for those Web applications that are relevant to the scenarios and processes you are using.
    Regards,
    Satish Mathala

  • If the app wasn't what I was looking for and I payed can I get my money back?

    I bought an application to download free music I found very complicated, and I want to deleted but first I want to know if I can get my money back for which I payed for the app.

    The best way to find out if you are eligible for a refund would be to use Apple's Express Lane option. You fill out the form and they send you a reply and possibly the refund.
    https://expresslane.apple.com/GetproductgroupList.action;jsessionid=3YCjQGLDw2Jh LgTYFDbm6tNRJdw9nDNQZpLQQRphnmSTvSLpKX19!-714128999

  • What is the Category field for and how do I edit it?

    In the iTunes music list, there is a category field. However, I do not see it in the get info window. Not surprisingly, although the category field shows in my iTunes music list, none of my songs have anything entered for the category. What is this field for and how do I edit it? Thanks.

    The only items I have that show a category are some iTunes U downloads.
    You can see a list of iTunes U category and subcategory codes and associated names here: http://deimos.apple.com/rsrc/doc/iTunesUAdministrationGuide/iTunesUintheiTunesSt ore/chapter13_section3.html

  • What is the symbol $ for?

    Hi i'd like to know what is the $ symbol for and when it can be used.
    I've seen it in class definitions like
    "org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process"
    Thanks

    Basically '$' is an ordinary "Java letter", but should normally not be used in identifiers (see below). The JLS says [http://java.sun.com/docs/books/jls/third_edition/html/lexical.html#3.8]:
    The Java letters include uppercase and lowercase ASCII Latin letters A-Z (\u0041-\u005a), and a-z (\u0061-\u007a), and, for historical reasons, the ASCII underscore (_, or \u005f) and dollar sign ($, or \u0024). The $ character should be used only in mechanically generated source code or, rarely, to access preexisting names on legacy systems.
    Some details on how Java uses the '$' internally are available here: [http://java.sun.com/docs/books/jls/third_edition/html/binaryComp.html#13.1]
    Another example that is not connected to nested or inner classes is with java.lang.reflect.Proxy [http://java.sun.com/javase/6/docs/api/java/lang/reflect/Proxy.html]:
    The unqualified name of a proxy class is unspecified. The space of class names that begin with the string "$Proxy" should be, however, reserved for proxy classes.

  • What is "grab" used for?

    I can't find anything in the macair manual or elsewhere are what to do with "grab". What is it used for and how?

    Grab is an app to take screenshots of your display. When you open it, you won't see any window, but you will see that Grab shows up on the menu bar. Just select the "Capture" menu and choose the option you want.
    Apart from that, you can take screenshots without using Grab, just with these shortcuts:
    - Command, Shift and 3 keys > take a screenshot of the whole display.
    - Command, Shift and 4 keys > take a screenshot of the part you want.
    - Command, Shift, 4 and Space keys > take a screenshot of a window.
    If you want to know more shortcuts, read > http://support.apple.com/kb/PH11229

  • What is the JMS for?

    hi, I am new to JMS. can anyone tell me what it is use for and when you use it? Thanks!

    you can also check out this whitepaper titled "A Messaging Primer: How Messaging Solves Today's Business Problems'.
    http://www.sonicsoftware.com/white_papers/messaging_primer.pdf

  • What does POP server mean and where do i find it?

    i do not know what POP server means, or what's it used for and where to find it?

    Not exactly; in my yahoo email, in order for it to accept an address from another site to receive emails from, the settings there are required to put in a "POP server". This is what i don't get of what to put in that required field?

  • Java for os x 10.8

    I want to install java for OS X 10.8 but i don´t know where can I found the java

    This is what you want: Java for OS X 2012-004.

Maybe you are looking for

  • Help with animated gif background once opened in Photoshop c33 extended

    I often work with animated Gif's and a adding doggies etc to the top layer. I am having a problem with animated Gif with (existing transparent) background when saving from the web and opening in Photoshop cs3 extended it is changing the background to

  • Memory Analysis for a program

    Hi All, In production sometimes a data load fails because of the less ABAP memory available. For a perticular load ABAP memory goes till 4 Gb and more and after that load fails with short dump. This time i change a start routine logic  and split a co

  • How to upload 'Tiff' file in scripts

    hi how to upload 'Tiff' file in scripts

  • IPhone 5 screen went black and nothing is working

    Hey everyone, I woke up today and found my iPhone 5 screen to be black. The power and home buttons were unresponsive so I decided to hold them both together to reset the phone. Luckily the phone turned on and was working fine until now. I went to loo

  • Oracle 9i rac windows 2003 server

    Hai, I am planning to do oracle 9i rac windows 2003 server(enterprise edition service pack 2) installion. All the pre-requiste has been completed. At the time of running clustersetup.exe , it is exiting without showing an error. The event veiwer is h