Skip to content
Latest:
  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
IndicThreads

IndicThreads

Software Developer Station

  • News
  • Articles
  • Interviews
  • Contact
  • About

atul kahate

Articles 

Ajax Security & Best Practices

May 17, 2009February 5, 2010 Content Team 5690 Views 0 Comments ajax, Articles, atul kahate, conference-videos-08, home, indicthreads conference, Java, Java Articles, ria, Rich Internet application, security

Ajax is perhaps the best known RIA technology today. While several implementations of Ajax have arrived, and many software projects

Read more
Articles 

Is Java The Language For The Future?

April 24, 2009February 5, 2010 Content Team 3855 Views 0 Comments Articles, atul kahate, conference-videos-08, home, Java, Java Articles, java software, programming languages, scripting languages, video

This discussion looks at the changes Java has undergone and is likely to undergo in the near future. Do these

Read more
Articles 

The Curious Flaw in DSA Digital Signatures

November 18, 2008February 5, 2010 Atul Kahate 4925 Views 0 Comments atul kahate, home, Java Articles

Digital signature mimics a pen-paper signature. When we sign on a piece of paper using a pen, we vouch for

Read more
Articles 

Secure Ajax Based User Authentication

October 7, 2008February 5, 2010 Atul Kahate 5946 Views 5 Comments ajax, atul kahate, Java Articles, ssl, user authentication

Ajax allows us to build Web 2.0 applications with ease. However, it also raises a number of questions. One such

Read more
Articles 

Is EJB Relevant Anymore?

July 7, 2008August 1, 2014 Atul Kahate 9826 Views 5 Comments atul kahate, ejb, enterprise java, Java Articles, javaee, spring

Since its inception, the Enterprise JavaBeans (EJB) technology has been a bit of an enigma. While almost all other Java/J2EE

Read more
Articles 

Demystifying Unicode Character Encoding

June 9, 2008February 5, 2010 Atul Kahate 5208 Views 6 Comments atul kahate, Java Articles

Atul Kahate looks at Unicode charater encoding, the facts the myths, the need and the use. He talks of traditional

Read more
Articles 

Cryptographic Algorithms – Impact On Application Performance

May 12, 2008February 5, 2010 Atul Kahate 4590 Views 3 Comments application performance, atul kahate, Java Articles

The importance of security is often realized only after an application’s security is breached. One of the reasons why security

Read more
Articles 

Office Open XML (OOXML) vs Open Document Format (ODF)

April 2, 2008February 5, 2010 Atul Kahate 6505 Views 0 Comments atul kahate, Java Articles, protocols, standardization

ODF versus OOXML has been a widely debated subject of late. What does this mean? Why does it matter to

Read more
Articles 

Security Assertion Markup Language (SAML)

March 19, 2008February 5, 2010 Atul Kahate 6345 Views 7 Comments atul kahate, Java Articles, user authentication

Identity management is one of the most interesting security problems to solve. How do we establish and then confirm the

Read more
Articles 

Password Based Authentication Using Message Digests

March 10, 2008February 5, 2010 Atul Kahate 4764 Views 2 Comments atul kahate, Java Articles, user authentication

The question of how best to perform user authentication is a puzzle that is quite tough to solve. While newer

Read more
  • ← Previous

Featured

Oracle Database Security Overview – Part 2  -> Security Enhancements
Articles 

Oracle Database Security Overview – Part 2 -> Security Enhancements

June 23, 2016 Saurabh Gupta 0
Oracle Database Security Overview – Part 1 – Virtual Private Database
Articles 

Oracle Database Security Overview – Part 1 – Virtual Private Database

June 23, 2016June 23, 2016 Saurabh Gupta 0
IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
News 

IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development

May 27, 2016June 1, 2016 Content Team 0
Java Garbage Collectors – Moving to Garbage First (G1) Collector
Articles 

Java Garbage Collectors – Moving to Garbage First (G1) Collector

May 25, 2016May 25, 2016 Content Team 0

Random

The Rightrix Best Blog Contest 2005

November 30, 2005February 4, 2010 Content Team 0

NetBeans needs help: NetCAT 5.0 Program

September 8, 2005February 5, 2010 Content Team 0
Typesafe Stack On JVM – Using Scala, Play and Akka

Typesafe Stack On JVM – Using Scala, Play and Akka

August 19, 2013August 19, 2013 Content Team 0

Returning Arrays or Objects – A Security Problem in Java

March 13, 2007February 5, 2010 Atul Kahate 0

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
  • News
  • Articles
  • Interviews
  • Contact
  • About
Copyright © 2025 IndicThreads. All rights reserved.
 

Loading Comments...
 

You must be logged in to post a comment.