Free Essay

.Net and Java Technology Comparison

In:

Submitted By reyes5537
Words 705
Pages 3
.NET & Java Comparsion Activity
Zeferino Reyes
CSS - 422
December 12, 2011
Nasser Alaeddine

.NET & Java Comparison Activity In this written document will focus on the advantages and disadvantages or the use of .NET technology in use compared to the use of JAVA Technology as Software Architecture, (University of Phoenix, 2010, 2009, 2008, 2007, 2006, 2005). .NET technology is the means to “connect” meaning connecting software, people, structures, things like printers, networks, computers, anything one can think of, (Getdotnnu.com, 2004-06). JAVA Technology is known to be adaptable where it can connect computers to networks, mobile phones to the internet, and game consoles such as the new Playstation 3, Xbox 360, and Nintendo Wii to the internet to access web browsing, built in plug in like Netflix to watch movies, and to other consoles for online gaming like the popular shooter Call of Duty. Advantages of .NET technologies are that it has the ability to grab internet servers that web services and tools such as internet apps or anything that can produce these services. One profitable feature of .NET is its ASP.net technologies that allows for the making of additional websites and net services that exist on the .NET infrastructure, (Getdotnu.com, 2004-06). Another powerful advantage of .NET technology is the ASP feature is that it creates construction sites, services and applications and does not require as much coding as the older coding in the beginning. A disadvantage of the use of .NET is its lack of support on several platforms or multiplatform to be exact. Another disadvantage is which can be very detrimental is that .NET can be reverse engineered meaning the code can be reversed and basically the code copied just rewritten. With technology in several aspects existing everywhere, mobile phones, televisions, receivers, blue tooth, computers etc., not many platforms can support .NET technology. Advantages of using JAVA technologies is it versatility, efficiency, and portability and it is also the highest use technology in existence, (Oracle, 1995, 2010). One true advantage of JAVA utilizing its portability function is the software can be coded on one platform and the ability for the software to be run on any other platform is a definite. Like .NET, JAVA also has the ability to be run on web services, and web browsers, (Oracle, 1995, 2010). A tremendous advantage of JAVA is the simplicity of the code; programs can easily be written and debugged if any errors arise in running the written code. With the existence of malicious hackers those wanting to cause harm on the internet and personal computers, JAVA is one of the first programming languages that took into consideration to include security embedded. Disadvantages of JAVA technologies with its embedded security and ability to run on several platforms negatively the speed of the program is tagged as a disadvantage. Another disadvantage viewed on JAVA is its lack to convert .class files to java files, this is most likely done to reverse engineer code and when done the code being perplexing. In conclusion, as defined in the beginning the advantages and disadvantages in the technology of .NET and JAVA technologies were briefly described. .NET having good advantages like connecting software, structures, people and devices. Included advantages of JAVA with the ability to easily write code, and if needed the debugging feature is not complicated. One disadvantage of JAVA is its inability to convert .class files to java files, which is due to trying to reverse engineer code and when produced the code is perplexed. However if one where to think and process it through this can also be viewed as an advantage. The reason is that a disadvantage of .NET is the ability to reverse engineer the code and basically the code is copied, but the true advantage would be that JAVA cannot convert .class files to java files and will prevent reverse engineering and will protect ones valuable coding in existence. References
Getdotgnu.com. (2004-06). .NET Technology. Retrieved from http://getdotgnu.com/technology.htm
Oracle. (1995, 2010 ). Learn About Java Technology. Retrieved from http://www.java.com/en/about/
University of Phoenix. (2010, 2009, 2008, 2007, 2006, 2005). BSA385 Course Syllabus. Retrieved from University of Phoenix, CSS422 – Software Architecture Website.

Similar Documents

Premium Essay

Advantages and Disadvantages of Java V.Net

...Advantages and Disadvantages of Java v. .NET University of Phoenix CSS/422 .NET and Java There is no shortage of definitions for software architecture but in a general sense it is the blueprint for a system, its properties and the relationships among all of the elements. It specifies all of the actions to be taken by the design and implementations teams. There are various differences between .NET and Java Technology so there are certainly advantages and disadvantages to using one or the other as software architecture. The choice, however, depends on the scope of the project and the skill of the design team. Both .NET and Java have platforms that offer a good solid foundation for project design. Java Technology is the choice of many developers because of its work-saving features and ease of use. “.NET and web services are tightly integrated and it is easier to create a basic web service in .NET” (Ranck, 2002). Advantages A major advantage of .NET is that it allows for the use of multiple languages and horizontal scalability. This feature makes it an ideal choice by developers for software architecture if they want to write programs in C++, Java or Virtual Basic because it provides a unified environment in which to work. It is easily developed and supported. Unfortunately, the same cannot be said for Java which is limited to use with the Java programming language only. Another advantage of .NET is that the interface is easily...

Words: 756 - Pages: 4

Premium Essay

Java

...A Comparison between Java and .Net Languages Introduction Java and .Net provide technologies that enable skilled developers to build quality enterprise applications. These technologies are rarely picked based on performance alone. There are many factors to consider when choosing Java or .Net. These considerations are often the deciding factor when choosing one or both of these platforms. Java Java is kenned as both a programming language and a development platform. It was first developed by Sun Microsystems in 1991 and subsequently relinquished in 1995. To help to make the language more accepted and accessible, Sun Microsystems developed it as an object oriented language with a syntax that is very similar to C++. (Java vs. .NET, 2007) Sun Microsystems decided to create this new platform out of a desire to be able to write programs only once that could be run on any system. (James) The Java 2 platform was launched in December 1998. This was a major amelioration of the platform, and included incipient graphics, user interface, and enterprise capabilities. This upgrade was over seven times as large as the initial Java 1.0 release and marked the maturity of the Java platform. (What is java?) Within the Java 2 platform there are 3 editions: • The Java 2 Standard Edition (J2SE) Provides the essential compiler, tools, runtimes, and APIs for writing, deploying, and running applets and applications. • The Java 2 Enterprise Edition (J2EE) Defines a standard for developing multi-tier...

Words: 2279 - Pages: 10

Free Essay

It in Pakistan After 10 Years

...Java RMI and .Net Remoting Performance Comparison Willem Elbers, Frank Koopmans and Ken Madlener Radboud Universiteit Nijmegen December 2004 Abstract Java and .Net are both widely used for creating Middleware solutions. There are many interesting aspects which can be compared between Java and .Net. In this paper we examine the architecture of Java RMI and .Net Remoting and test their performance as they come ”out-of-the-box”. The performance was measured over a series of 3 different tests using .Net and Java’s high performance timers and our own modules to measure CPU utilization and Memory usage. In all our tests Java RMI had the best performance times. 1 1 Introduction The creation of software has been evolving strongly over the past few years. High level programming languages are increasingly popular amongst software developers because there is a great need for software quality and lower development times, while not compromising on performance. Also, the Internet has become increasingly popular and the need for networking applications is greater then ever. Java and .Net are both widely used for creating Middleware solutions. There are many interesting aspects which can be compared between Java and .Net, this paper focuses specifically on Middleware performance. First there will be an overview of the Java and .Net middleware implementations, Java RMI and .Net Remoting. These will be described on an abstract level which will help understanding and explaining the...

Words: 2911 - Pages: 12

Free Essay

Web 238 Team Assignment

...information to share. The basic Web site is built with HTML, and then creatively enhanced with CSS. To create a visually expressive Web site that can attract thousands of visitors each day you need to use more than HTML and decide what the site contains. There are different languages that can be used to add a sense of style to your site, some of the possible devices are JavaScript, Java, DOM, and AJAX. In the following paper our team will discuss a few examples of how each can be used in Web development. Comparison of Java and JavaScript Java and JavaScript are both object-oriented languages (Burns, 2012). Knowing how to use one language often becomes confusing when attempting to learn the other. Some of the differences between the two are that Java applets can create stand-alone applications that work across platforms running as standalone programs. However, JavaScript cannot create these stand-alone applications and reside on an Internet browser. A programmer must compile Java code before the program can run. This requires an outside program just to compile the code. A compiler turns Java code into machine language code before a browser can interpret it. Any changes the programmer makes to the code will require him to recompile the program and this can be a real tedious act to commit over and over. A web designer can write JavaScript functions directly in a text editor, saving the file and upload it to the server for immediate execution or using an editor like Adobe...

Words: 2442 - Pages: 10

Free Essay

Amazing

...CHINTAN VORA ‘Arihant’, 163/2-C,Railway Lines, Solapur-413001,Maharashtra, India Tel: 9833393475; Email Address: vorachins123@yahoo.co.in OBJECTIVE: To contribute to research in networking and security in emerging technologies like Cloud Computing. EDUCATION: * University of Mumbai, Mumbai, India Bachelor of Engineering, Information Technology at D.J.Sanghvi College of Engg(Exp. Date May 2011) Secured 63.02% aggregate in first six semesters with First Class * Sangameshawar College (Junior College), Solapur, India Secured 88.5% at the HSC Examination, March 2007 * St.Joseph High School (High School), Solapur, India Secured 87.33% at the SSC Examination, March 2005 ACADEMIC PROJECTS: * An ecommerce application based on Google’s Cloud - Final year B.E. Project Developing a state of the art ecommerce solution using Google’s cloud computing framework (Google App Engine) in association with L&T Infotech, a global IT services and solutions provider. * An auction engine Developed a real-time auction engine based on client-server architecture, using Java RMI as middleware technology. * Pizza delivery management in Visual Basic - Database Management project Developed a Pizza delivery Management system modelled on “Domino’s Pizza” using MS-SQL as back end and Visual...

Words: 303 - Pages: 2

Free Essay

Exalogic

...features or functionality described for Oracle‘s products remains at the sole discretion of Oracle. Oracle White Paper—Oracle Exalogic Elastic Cloud Brief Introduction Introduction For most enterprise IT organizations, years of innovation, expansion, and acquisition have resulted in sprawling infrastructure that stretches the limits of manageability. While the individual IT systems and applications in service are often well considered and expertly implemented, the sheer scale of the ongoing IT investment itself has emerged as the dominant concern. Even when best-of-breed technologies, open standards, market-leading vendors, and modern architectural practices like SOA have been employed pervasively, most enterprises now find themselves with too many platforms, too many technologies, too many domains of expertise, and too many vendors to coordinate and manage. In response, a number of technologies and practices have become staples for large enterprises, ranging from virtualization and centralized storage to enterprise-wide standardization of software and hardware. Recently, however, the discussion of specific cost containment techniques has given way to a larger discussion of the transformation of IT from cost center to profit center. This transformation typically involves adoption of a...

Words: 3116 - Pages: 13

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...

Words: 3868 - Pages: 16

Premium Essay

Sem 5 Bca

...Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune University of Pune Pattern 2008, w.e.f. 2010-11 Semester – V Course No. 501 502 503 504 505 506 Subject Name VB.NET or VB.NET Programming Internet Programming and Cyber Law Principals of Marketing Core Java Project work ( VB ) Computer Laboratory and Practical Work (.NET + Core Java ) Semester – VI Course No. 601 602 603 604 605 606 Subject Names E-Commerce Multimedia Systems Introduction to Syspro And Operating Systems Advance Java Project Work (Banking & Finance, Cost Analysis, Financial Analysis, Payroll, EDP, ERP etc.) Computer Laboratory and Practical Work (Multimedia + Advanced Java) University of Pune, T.Y. B.C.A., Semester V & VI 2 T.Y. B.C.A. Semester V Subject Name -: VB.NET or VB.NET Programming. Course Code -: 501 Sr. No. 1. TOPICS .NET Framework (Introduction to .NET Framework) 1.1 Introduction 1.2 CLR 1.3 CTS 1.4 MSIL 1.5 Garbage Collection 1.6 Assemblies 1.6.1 Assembly content 1.6.2 Assembly types VB.Net Programming 2.1 Windows Forms 2.1.1. Setting Title Bar Text 2.1.2. Seeing the initial position of a form 2.1.3. Minimizing/Maximising a form 2.1.4. Working with multiple forms 2.1.5. Setting the StartUp Form 2.1.6. Adding controls to a form 2.1.7. Setting properties at Design Time...

Words: 3973 - Pages: 16

Free Essay

Computer

...CONTENT Page No 1 2 3 4 5 6 7 8 9 10 Academic calendar Digital Communications Microprocessors and microcontrollers Digital Signal Processing Object Oriented Programming Through Java Managerial Economics And Financial Analysis Digital Signal Processing Lab Microprocessor & Microcontroller Lab Advanced English Communication Skills Lab Object Orient Programming Through Java Lab 2 3 48 85 129 186 217 219 222 224 ACADEMIC CALENDAR VIGNAN INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT ACADEMIC CALENDAR B. Tech Academic Year 2013 - 2014 - II - Semester S.No Event Date th 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Submission of abstracts of main project by IV years Faculty orientation program Commencement of Class work Spell for UNIT – I Instructions Fresher’s day Spell for UNIT – II Instructions Alumni meet VIGNAN TARANG Spell for Unit-III Instructions st nd Assignment -1/ Unit test-1 on I & II Units Submission of results & week students list to Dept Spell for Unit-IV Instructions University I-Mid-Exam- II & IV Year rd University I-Mid-Exam- III Year Spell for UNIT – V Instructions for II &IV years rd Spell for UNIT – V Instructions for III year LAB INTERNAL-1 Commencement of Special classes for Slow learners Spell for UNIT – VI Instructions for II &IV years rd Spell for UNIT – VI Instructions for III year Submission of Mini project title along with guide for III year Spell for Unit...

Words: 28702 - Pages: 115

Premium Essay

Blah

...Second International Symposium on Information Science and Engineering Comparison of Several Cloud Computing Platforms Junjie Peng Xuejun Zhang Zhou Lei, Bofeng Zhang, Wu Zhang, Qing Li School of computer science & High performance computing center Shanghai University Shanghai, 200072 P.R. China School of computer science & High Qinghua machinery factory at Changzhi performance computing center Changzhi, 046012 P.R China Shanghai University Shanghai, 200072 P.R. China Abstract—Cloud computing is the development of parallel computing, distributed computing and grid computing. It has been one of the most hot research topics. Now many corporations have involved in the cloud computing related techniques and many cloud computing platforms have been put forward. This is a favorable situation to study and application of cloud computing related techniques. Though interesting, there are also some problems for so many flatforms. For to a novice or user with little knowledge about cloud computing, it is still very hard to make a reasonable choice. What differences are there for different cloud computing platforms and what characteristics and advantages each has? To answer these problems, the characteristics, architectures and applications of several popular cloud computing platforms are analyzed and discussed in detail. From the comparison of these platforms, users can better understand the different cloud platforms and more reasonablely choose what they want. Keywords-cloud computing;...

Words: 3393 - Pages: 14

Premium Essay

Toward an Abstract Language on Top of Xacml for Web Services Security

...6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates Toward an Abstract Language on Top of XACML for Web Services Security aDepartment of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon b Department of Computer Engineering, Khalifa University of Science, Technology & Research, Abu Dhabi, UAE CDepartment of Computer Science, Kuwait University, Kuwait b Azzam Mourada, Hadi Otrok , Hamdi YahyaouiC and Lama Baajoura Abstract-We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML profile(s). Our proposed approach allows first to specify the XACML profiles, which are then translated using our intended compiler into XACML security policies. The main contributions of our approach are: (1) Describing dynamic security policies using an abstract and user friendly profile language on top of XACML, (2) generating automatically the the XACML policies and (3) separating the business and security concerns of composite web services, and hence developing them separately. Our solution address the problems related to the complexity and difficulty of specifying security policies in XACML and other standard languages. We tested the feasibility of our approach by developing the library system (LB) that...

Words: 2085 - Pages: 9

Premium Essay

Mobile Voting

...1 Chapter 1 THE PROBLEM AND ITS SCOPE Introduction Now more than ever, technology is changing on how we vote. Voting schemes have evolved from counting hands on early days to systems that includes papers, punch cards, mechanical levers and optical machines. Electronic voting systems provide some characteristic different from the traditional voting technique. As an effect of vast change in modern technology, several techniques in voting arises in order to solve various drawbacks like time consuming and large volume of paper works can be consumed. So the solutions are televoting, android phone voting and web voting. Televoting was also known as voting via SMS text messages. Mobile phone connects through GSM (Global System for Mobile Communications) in which it searches for cells in the immediate vicinity. Televoting uses a format in which the public viewer follows and replies error whenever they send an invalid format. Like in a real television shows, televoting was a very common method that opens the public to vote its favorite contestant to remain and not to be evicted. The outcome will be decided by the number of votes in which a contestant garners. On the other hand, android phone voting and web voting has this similarity. Both use an internet in order to gain access and make vote counts. In web voting, it uses a browser to view the page and users just simply browse, follow some steps and vote, and if successful, the vote is counted. The most common method before a user...

Words: 3624 - Pages: 15

Premium Essay

Application.Servers.for.E-Business

...Application Servers for E-Business Table of Contents Application Servers for E-Business - 2 Preface - 4 Chapter 1 - Introduction - 5 Chapter 2 - A Survey of Web Technologies - 22 Chapter 3 - Java - 44 Chapter 4 - CORBA - 65 Chapter 5 - Application Servers - 82 Chapter 6 - Design Issues for Enterprise Deployment of Application Servers - 114 Chapter 7 - Tying It All Together - 137 References - 160 For More Information - 163 page 1 Application Servers for E-Business Application Servers for E-Business Lisa M. Lindgren Auerbach Library of Congress Cataloging-in-Publication Data Lindgren, Lisa. Application servers for e-business / Lisa M. Lindgren. p.cm. Includes bibliographical references and index. ISBN 0-8493-0827-5 (alk. paper) 1. Electronic commerce. 2. Application software—Development. I. Title. HF5548.32 .L557 2001 658′.0553–dc21 00-050245 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system,...

Words: 98260 - Pages: 394

Free Essay

Android

...Android vs iPhone Junyao Zhang April 12, 2010 This is a complete analysis and comparison between Android and iPhone OS. The rest of this report is organized as follows. Section ?? outlines the system architecture, history and detail management configuration. Section ?? discusses the iPhone system. In Section ??, a comparison between these two systems is presented. 1 Android Android, originally meaning “robot”, is a mobile operating system using a modified version of the Linux kernel. It was initially developed by Android Inc., a firm later purchased by Google,[?]and lately by the Open Handset Alliance[?]. It allows developers to write managed code in the Java language, controlling the device via Google-developed Java libraries.[8] It empolys the software stack architecture, as shown in Figure 1. • Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. The kernel also acts as an abstraction layer between the hardware and the rest of the software stack. It is implemented by programming language C. • The middleware level includes Runtime and Libraries. The Runtime includes core libraries, providing most of the functionality available in the core libraries of the Java programming language, and Dalvik virtual machine which allows every Android application runs in its own process. The Libraries is used by various components of the Android system, such as Media Libraries, 3D libraries...

Words: 6786 - Pages: 28

Premium Essay

Brand Awareness of Hcl

...LOVELY PROFESSIONAL UNIVERSITY DEPARTMENT OF MANAGEMENT Report on Summer Training BRAND AWARENESS OF HCL LEARNING - CDC (Career Development Centre) -A Study in Chandigarh- Submitted to Lovely Professional University In partial fulfilment of the Requirements for the award of Degree of Master of Business Administration Submitted by: Gaurav Sharma University Registration No. 3450070065 DEPARTMENT OF MANAGEMENT LOVELY PROFESSIONAL UNIVERSITY JALANDHAR-NEW DELHI GT ROAD PHAGWARA PUNJAB Acknowledgment This project was result of my life’s best efforts till now and ultimate industry and corporate world experience. However, it would not have been possible without the kind support and help of many individuals and organizations. I would like to extend my sincere thanks to all of them. I wish to express my sincere gratitude to my Training Coordinator, Mr. Ashwani Panesar and my Mentor and project guide for Summer Training, Ms. Mandakini, Lecturer in Management Department of Lovely Professional University, for providing me an opportunity to do my Six week Summer Training Project on “BRAND AWARENESS OF HCL LEARNING-CDC” in “HCL Infosystems Ltd., PHASE-8, MOHALI.” I am highly indebted to my project guide in HCL Infosystems Ltd, Mr.Tarun Kumar, Business manager-North, HCL Infosystems Ltd. for their guidance and constant supervision as well as for providing necessary information regarding the project & also for their support in completing...

Words: 3212 - Pages: 13