Which assistant tool is the best to program java?

hello,all
I want to know what tools do you often use to
program.
Always I program in the notepad,and then compile
if in JDK,but I find I'm very tied to program in such
environment,and it always cause wrong.I like the interface
in Visual J++,but due to some reason I don't want to use
Visual J++,can someone tell me a better tool.
Update with JDK or developed by Sun is the best one.
Regards.

In my experience the best there is out there COULD BE ... as follows :)
Just a text editor, metapad : http://welcome.to/metapad/ (very simple text editor with some great little features for any programmer - and none of those annoying ones that notepad or wordpad have. I personally use this more often than anything else)
Simple stuff, neat and lightweght SciTe : www.scintilla.org/SciTE.html(very, very sweet and simple)
In great betweeny, Eclipse : www.eclipse.org (its excellent, + I ADORE the refactoring feature)
The works, JBuilder : www.borland.com/jbuilder (generally regarded as the best or the among the best and the trial version is free)

Similar Messages

  • Which tool is the best to develop stored procedure?

    Hello everyone,
    which tool is the best to develop and debug stored procedure in oracle9i/10g?
    Thanks

    > Now i am using sqlplus to develop procedures. But I can not debug them.
    How do you debug??
    Bad programmers tend to need and use a debugger a lot.
    I learned to program back when you were only allowed 3 compiles and link due to mainframe CPU costs. The 3rd build was the production one. If you could not cut it, you could not become a Programmer. (back then it still carried a lot of meaning and yes, people spoke of Programmers using capitals)
    If you need to debug your code regularly, then you have a more serious problem. A problem of not writing PROPER MODULARISED code. A problem of not tackling programming problems LOGICALLY - by reducing the complex problem into a set of smaller problems and solving each of those in turn.
    Having to trace code step by step, insert break points, and all that... Debugging must be an exception. If it is not, you must seriously consider your programming techniques and better your design skills. Get back to programming 101 fundamentals.

  • I have to create a presentation about waste water management. The students needs to see how the water flows in the system. Which is the best Adobe program for this task?

    I need to show dirty water, the treatment, and the clean water after treatment. It is necessary to see how the water flows in the tubes.
    Which is the best Adobe program fr this job? 

    After Effects, but be ready for a steep learning curve. Third party plug-ins may be required if you want realistic flow. Schematic diagrams are fairly easy to create with After Effects. I do it all the time.

  • Which object-relational mapping tool is the best for Oracle Coherence?

    Which object-relational mapping tool is the best for Oracle Coherence?
    My application is read-and-write-intensive. Which tool is most suitable for this application?
    TopLink essentials, TopLink, Eclipse or Hibernate?
    Thank you

    I would pick Hibernate mainly because of its popularity and wide knowledge base.
    Coherence has provided some documentation for the integration.
    http://download.oracle.com/docs/cd/E14526_01/coh.350/e14537/usehibernateascoh.htm#CEGFEFJH
    If you have the schema in database, myEclipse can provide you hibernate bindings by reverse engineering.

  • What is the best antivirus program for mac

    Can somebody tell me what the best antivirus program is at this moment for macbook air?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What is the Best Utility program for my Macbook Pro

    I have a Macbook Pro 2.33 with OS 10.4.10. I would like to know what is the best utility program to help with my computer. I used to use Norton Utilities, but I don't think they support 10.4. Is Tech Tool Pro a good program.
    Thanks.

    Is Tech Tool Pro a good program.
    Yes.

  • Which method signature is the best?

    Among the following method signatures in Java, which one can provide the best performance while the method is called? Why?
    (1) public void my_method( String a, int b, int c )
    (2) public void my_method( int b, String a, int c )
    (3) public void my_method( int b, int c, String a )

    1) All primitive types (except long and double) are pushed onto the stack as 32-bit entities and are 32-bit aligned. The reference types are pushed as a reference and occupy 32-bit also.
    2) If the method have had tens or hundreds of parameters, the opcodes for accessing some parameters will have short offsets and other parameters will have long offsets. When you have only 3 or 4 parameters there is no difference between the offsets needed to access each parameter. The difference of time used for the interpreter or JIT compiler for dealing with short or long offsets usually is negligible.
    3) So the better way to speed up your program is to forget micro-optimization and concentrate in better algorithms and caching data if possible.

  • I am thinking of getting my first Macbook pro for uni and was just wondering which one would be the best? The macbook pro or macbook pro with retina display? or even wait for the new release in 2013 ?

    I am thinking of getting my first Macbook pro for uni and was just wondering which one would be the best? The macbook pro or macbook pro with retina display? or even wait for the new release in 2013 ?

    If your budget is unlimited, look at both the retina and non-retina and make a decision based on your preferences.  If funds are tight, explore the options in the refurbished section.  Unless you are dealing with courses that demand specific performance parameters, any one of these options will suffice.
    Ciao.

  • Hi, I planned to purchase a laptop for me to use for graphic design ..could let me know which laptop would be the best for me to use ? Thank you!

    Hi, I planned to purchase a laptop for me to use for graphic design ..could let me know which laptop would be the best for me to use ? Thank you! Pro or Air

    Someday - and no one knows when that day will come - maybe all applications will be able to take advantage of the Retina display. But for the present, not many do: including all Adobe applications. There was a demo of Photoshop at the Apple World Wide Developers Conference of Photoshop running at native Retina resolutions but no one at Adobe in marketing is saying when, if or how the upgrade may be coming. It could be a week, it could be a year, it could be 2-3 years. No one knows. And only Apple app's (for the main part) are really utilizing the native Retina display.
    I've seen some demos of some applications (Apple's) that take advantage of the Retina display and they're awesome. But in actually working in the here-and-now I've heard quite a few gripes, particularly on the Photoshop forum, of menus looking pixelated and/or 'blurry' so I'm not quite ready to jump into the Retina display boat just now. Don't get me wrong - others have ad are very, very pleased with their selection. But until Retina displays are available on larger monitors, the maximum work area that you're going to be able to use is 15" - and that's simply not enough room for full-blown graphic design. Then there's the cost factor - for the $4,000+ you spend for a completely full-blown Retina kit, you can get a standard MacBook Pro, 16 GB of RAM, a fast SSD and even the Apple Thunderbolt Display for the same amount.
    The standard MacBook Pro isn't better than the Retina display: it's just different. And I think (and this is only my opinion - other graphic designers should feel free to jump in here) that it's the best computer that you can get for your specific purposes. And, towards that goal, I have to recommend a very good external monitor (there's nothing more annoying than having to use InDesign in a single-page mode rather than side-by-side because your monitor isn't big enough).
    Remember that this is only my opinion and that others might jump in with their own. But I was in the electronic pre-press business for more years than I care to admit and we always - always - worked with at least 19" monitors (and that's back when dinosaurs actually ruled the world).
    I hope that others will jump in with their comments. I'm going to follow this thread and see!
    Good luck,
    Clinton

  • HT3775 hello guys, i m just wondering that which software would be the best for my macbook pro. whenever i try to open those video, it says '(video name)avi' cant open. that will be appreciable if anyone can help me out. thanks.

    hello guys, i m just wondering that which software would be the best for my macbook pro. whenever i try to open those video, it says '(video name)avi' cant open. that will be appreciable if anyone can help me out. thanks.

    I think that VLC Media Player will play avi files.
    Regards,
    Clinton

  • Can somebody help me! which beamer would be the best for my macbook air?

    Can somebody help me! which beamer would be the best for my macbook air?

    I think that VLC Media Player will play avi files.
    Regards,
    Clinton

  • What's the best approach/program for finding and eliminating duplicate photos on my hard drive?

    What's the best approach/program for finding and eliminating duplicate photos on my hard drive? I have a "somewhat" older version of iPhoto (5.0.4), and it doesn't seem to offer anything like that except during the importing phase of syncing my phone...

    I wonder, is there room to transfer them to your phone, & then back to filter them?

  • Which hard drive is the best?

    I was thinking about replacing the hard drive and the combo drive with something better.
    Which hard drive is the best? Is it the Western Digital? I was also looking at Samsung but after reading about them using harmful chemicals, I became a bit hesitant.

    aigoosung:
    Here is a list of available drives for your computer at OWC.
    cornelius

  • Which KVM switch is the best for Mac Mini

    Base on individual experience, which KVM switch is the best for Mac Mini

    Hot-Key mode MacMini and IO Gear KVM Switch MiniView Micro USB Plus
    Fusionwolf, can you help me?
    I want to use my TFT monitor (HPvs19 ) with a MacMini and a Casablanca KRON PC. The monitor works good with both computers, when connecting them separately.
    I've bought a KVM switch MiniView Micro USB Plus (IOGear GCS632U) connected it as written in the IOGear Installation Manual. Now I can use the monitor with my MacMini and my Mac keyboard, but I cannot switch to the PC.
    In the IO Gear manual several methods to switch ports are written. But every method starts by invoking HotKey mode.
    The manual reads :
    "To invoke HotKey mode, do the following:
    1. Press and hold down the NumLock key
    2. Press and release the minus- key
    3. Release the NumLock key"
    and
    "When HotKey mode is active, the Caps Lock, and Scroll Lock LEDs flash in succession to indicate that Hotkey mode is in effect."
    I've tried many times to do this pressing/releasing on my Mac keyboard. Within different time/speeds. But with no result... I CANNOT get in the HotKey mode...
    What can I do? Are there other ways to get in HotKey mode with my Mac keyboard (bought with my previous iMac some 4 years ago)? Or are there other ways of switching with the IO Gear KVM Switch?
    Thanks a lot in advance for an answer!
    John

  • Which web browser is the best?(firefox, chrome, safari)

    I am using mac 10.6.4 which web browser is the best for mac?
    Facebook, youtube etc.
    Thanks
    Ala.

    What could be possibly better than an Apple product for an Apple product.
    Actually there are various areas where Safari is defective compared to other browsers. For example it lacks the ability to override the fonts of a website with fonts of your own choosing. Also it cannot send a different language identifier for multilingual webpages without changing the language for the entire OS. Whether the defects matter depends of course on each user's individual requirements.

Maybe you are looking for

  • Oracle Sesame Adaptater - missing template for creation of a new SAIL repo.

    Hi, I'm trying to deploy the Sesame Adaptater on my TOMCAT server. At the point 8.9 of the doc ( http://docs.oracle.com/cd/E18283_01/appdev.112/e11828/sem_sesame.htm#BABFFEFA) I'm suppose to type in the sesame console the following comand : "create o

  • Trying to parse a file-read from text file.vi

    I'm attempting to read a txt file that has tab separated data. In the fourth (or any) column is the only data I need. The data is a string of numbers (23.454). I've used the Read from Text File.vi and the Read From Spreadsheet.vi and I just don't see

  • Compressor 2 not working in FCP 5

    I'm having a problem with Compressor 2 and FCP 5. For the past several months, I had FCP 5 and Compressor 2 working on my 800ghz G4 Titanium powerbook. No problems. However, I needed to go back to FCP 4.5 for compatibility issues with other machines

  • WSIF Binding Error while invoking HTTP Service

    Hi, I am getting a WSIF binding error when invoking an HTTP service. I was able to successfully invoke another HTTP service on the same server. However, while invoking some of the others services, we are getting errors. The wsdl binding declaration i

  • Package javax.persistence does not exist

    Hi, I'm a beginner on Weblogic, sorry my so simple and basic question (and my bad english). But I'm trying to build the weblogic examples ("ant build", as the documentation says) and got error messages like this: Buildfile: build.xml clean: init: [mk