How java is better than other languages according to history and uses.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES
Mobil game : A mobile game is a video game played on a mobile phone, smartphone, PDA, handheld computer or portable media player Type of language writing.
Java security (in a nutshell)
CompSci Applets & Video Games. CompSci Applets & Video Games The Plan  Applets  Demo on making and running a simple applet from scratch.
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
Java: History and Introduction (Lecture # 1). History… Java – Based on C and C++ – Developed in 1991 for intelligent consumer electronic devices – Green.
OSGi: Open Services Gateway Initiative Richard Chapman 5 Sept
For more Lectures and Notes Visit
01 Introduction to Java Technology. 2 Contents History of Java What is Java? Java Platforms Java Virtual Machine (JVM) Java Development Kit (JDK) Benefits.
Sadegh Aliakbary Sharif University of Technology Fall 2011.
Page 1 Sandboxing & Signed Software Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
JAVA v.s. C++ Programming Language Comparison By LI LU SAMMY CHU By LI LU SAMMY CHU.
CSC 142 A 1 CSC 142 Introduction to Java [Reading: chapter 0]
Introduction to Java CSIS 3701: Advanced Object Oriented Programming.
Java Security. Topics Intro to the Java Sandbox Language Level Security Run Time Security Evolution of Security Sandbox Models The Security Manager.
Sadegh Aliakbary Sharif University of Technology Spring 2011.
Sadegh Aliakbary. Copyright ©2014 JAVACUP.IRJAVACUP.IR All rights reserved. Redistribution of JAVACUP contents is not prohibited if JAVACUP.
Sadegh Aliakbary Sharif University of Technology Fall 2010.
Java Beserkers Group 4. Start of Java Development began on June of 1991 by a group of computer scientist at the Sun Mircrosystems Company Development.
Applets & Video Games 1 Last Edited 1/10/04CPS4: Java for Video Games Applets &
Security in Java Sunesh Kumra S
Sadegh Aliakbary Sharif University of Technology Fall 2012.
1 Module Objective & Outline Module Objective: After completing this Module, you will be able to, appreciate java as a programming language, write java.
Введение в JAVA. Java Java – язык программирования: объектно-ориентированный кроссплатформенный строго-типизированный.
Java Security Nathan Moore CS 665. Overview Survey of Java Inherent Security Properties Java Runtime Environment Java Virtual Machine Java Security Model.
Java 2 security model Valentina Casola. Components of Java the development environment –development lifecycle –Java language features –class files and.
Java Security Model For Mobile Code Abdo Achkar. Mobile Code A mobile object is a “self contained piece” of executable code. Definition:  Code that can.
What Is Java? According to Sun in a white paper: Java: A simple, object-oriented, network-savvy, interpreted, robust, secure, architecture-neutral, portable,
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Computer Programming 2 Why do we study Java….. Java is Simple It has none of the following: operator overloading, header files, pre- processor, pointer.
Copyright © Mohamed Nuzrath Java Programming :: Syllabus & Chapters :: Prepared & Presented By :: Mohamed Nuzrath [ Major In Programming ] NCC Programme.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
Java – in context Main Features From Sun Microsystems ‘White Paper’
JAVA Ekapap Julnonyang When it was implemented? Developed by Sun Microsystems. The first public implementation was Java 1.0 in 1995 The language.
Client-Server applications Introduction to Java Applets Client-server architectures Why do Applets exist? What can an Applet do?
Basic Java training Harinath Mallepally
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
Introduction to JAVA Programming
Mobile Computing Lecture#01 Mobile Horizon. Leading Mobile Phone Technologies  iOS  Android  Blackberry  Symbian  Windows Phone  J2ME.
JAVA TRAINING IN NOIDA. Introduction to Java:  Java training in noida is a general-purpose computer programming language that is concurrent, class-based,
Compilers and Security
Sung-Dong Kim, Dept. of Computer Engineering, Hansung University Java - Introduction.
Fundamental of Java Programming (630002) Unit – 1 Introduction to Java.
Object Oriented Programming in
Diagrams and Sample Code from the Java Tutorial,
How to replace Java (signed) applets Matija Tomašković | Evolva
Opportunity Recognition Project Copyright 2008 by Luong & Lau
Done By: Ashlee Lizarraga Ricky Usher Jacinto Roches Eli Gomez
Android System Security
Chapter 1 Introduction to Computers, Programs, and Java
The playground can be in any area of the ecosystem
Introduction to Advanced Java Programming
Lecture 1: Introduction to JAVA
The Java Programming Language
Platform as a Service.
Open Web App.
Java security (in a nutshell)
Introduction Enosis Learning.
Topic: Java Security Models
Week 01 Comp 7780 – Class Overview.
Introduction Enosis Learning.
WHATAP 제가 와탭을 소개하겠습니다. November 14, 2018.
Advanced Programming Fall 2017.
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Introduction to Applet, Application and JDK
(Computer fundamental Lab)
Java History, Editions, Version Features
Project Overview Konstantinos Tserpes, ICCS/NTUA Final Review Meeting
Introducing Java.
Presentation transcript:

JAVA AT A GLANCE

Overview  What is Java ?  Why Java ?  Security Models In Java.  Performance of Java.  Java in Real World.  TIOBE & PYPL Index.  How Many Java Developers ? How Many Java Developers ?  IEEE Spectrum Ranking.  Programming Language Trend – World Wide Programming Language Trend – World Wide  About MAAN.

What is JAVA ?

“ Java From 10,000 Feet's  According to the world, Java is...  According to Sun, Java is...  On closer inspection, Java is

“ According to the World, java is...  Secured Web pages  The cross-platform language  The rest-of-the-worlds answer to Bill Gates  The C++ replacement we need  A bunch of hype

According to Sun, JAVA IS...  Simple and Powerful  Object Oriented  Portable  Architecture Neutral  Distributed  Multi-threaded  Robust, Secure/Safe  High Performance

On Closer Inspection, JAVA IS...  Simple  Pure  Portable  Surprisingly effective

Why Java ?

“ Java Write Once, Run Anywhere

“ Security Models In JAVA  Need For JAVA Security.  The Sandbox Model or Java 1.0.  Java 2 Platform Security Model.

Need For Security IN JAVA  Code Mobility Can Be Useful. * Improve Functionality of Services.  Downloaded Executable Contents is Dangerous * The Source May Be Unknown Hence Trusted. * Downloaded Code May modify or destroy data in our System. * They may be install other hostile code on our system. * Hostile code may use the resources of our system.

Sandbox model  The original security model provided by the Java platform.  It existed in order to provide a very restricted environment in which to  run untrusted code obtained from the open network.

Java 2 Platform Security Model

“  Fine Grained Access Control :- * Every code access to the resources based on what is defined in a policy file.  Easily Configurable Security Policy :- * It is desirable to allow application builders and users to configure security policies without having to program.  Easily Extensible Access Control Structure :- * The new architecture allows typed permissions and automatic handling of all permissions of the correct type.  Extension of Security Checks to all Java programs :- * There is no longer a built-in concept that all local code is trusted.

“ How Sandboxing work ?  Compile the Applet.  Create JAR file for the Applet.  Generate a pair of public/private keys.  Sign the applet jar with private key.  Export the certificate for public key.  Import the certificate as a trusted certificate.  Create the policy file.  Load and run the Applet.

Performance of java

Twitter migrates core infrastructure to the JVM and supports more than 400 million Tweets a day.

Java's innate scalability has played a key role in enabling Netflix to expand its service to more than 57 million members in 50 countries. Collectively, these viewers enjoy more than 1 billion hours of shows and movies per month.

JAVA IN REAL WORLD  1.1 billion desktops run Java.  930 million Java Runtime Environment downloads each year.  3 billion mobile phones run Java.  10 times more Java phones ship every year than Apple and Android combined.  100% of all Blu-ray players run on Java.  1.4 billion Java Cards are manufactured each year.  Java powers set-top boxes, printers, Web cams, games, car navigation systems, lottery terminals, medical devices, parking payment stations, and more.

“ Tiobe & pypl  TIOBE Index : TIOBE ratings are calculated by counting hits of the most popular search engines.  PYPL Index : The PYPLU Popularity of Programming Language Index is created by analyzing how often language tutorials are searched on Google.

TIOBE Index for 2018

Very Long Term History

PYPL Index for 2018

“ How many Java developers ? Based on a survey made using various portals, different sources for estimation – popularity contests, job market analysis and download numbers of popular Java development infrastructure products there are approximately 8,311,000 Java developers in the World.

IEEE Spectrum ranking FOR 2018

Programming Language Trend - WORLD WIDE

About MAAN MAAN Software IncMAAN Software Inc. is a leading software firm generating its services since a long time in the domain of digital solution. It has successfully managed to aid hundreds of entrepreneurs and small businessmen to launch their endeavors and turn them into successful digital units.