Solved

Writing a unique ID to a text file.

Posted on 2003-10-27
4
193 Views
Last Modified: 2010-04-01
Hi Experts,

I am trying to write to a text file on the server. The twist is I need a unique ID at the start of every input. I am not sure how create a unique ID. Can you help. This what I have so far.

BufferedWriter fp = null;
      String str = new String("blah blah; sdfg; dsfg; dsfg");
         
     try {
         fp = new BufferedWriter(new FileWriter("./webapps/printTest/textTempText.txt", true));
     
         fp.write(str, 0, str.length());
         fp.newLine();
     
         fp.flush();
         fp.close();
   }
     catch (IOException e) {
     }
0
Comment
Question by:achatburn
  • 2
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
kotan earned 400 total points
ID: 9631463
String str = new java.rmi.server.UID().toString();
0
 

Author Comment

by:achatburn
ID: 9631541
Hi Kotan,

This returns this 18e18a3:f880eeed24:-7fd6. I am a beginning JSP programmer. I would like to know how this works. I will give you a hundred more point if you briefly explain this.
0
 
LVL 6

Expert Comment

by:kotan
ID: 9631572
Get from javadocs,

A UID instance contains three primitive values:
    * unique, an int that uniquely identifies the VM that this UID was generated in, with respect to its host and at the time represented by the time value (an example implementation of the unique value would be a process identifier), or zero for a well-known UID
    * time, a long equal to a time (as returned by System.currentTimeMillis()) at which the VM that this UID was generated in was alive, or zero for a well-known UID
    * count, a short to distinguish UIDs generated in the same VM with the same time value


If you would like to know how does he generate those values, you can check the source.
0
 

Author Comment

by:achatburn
ID: 9631608
You Rock

Thanks
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
EJB MDB example 4 76
java cigar challenge 58 204
AlarmClock Challenge 35 145
Limiting the number of characters a user can type in a text field 6 46
Learn to move / copy / export exchange contacts to iPhone without using any software. Also see the issues in configuration of exchange with iPhone to migrate contacts.
A Short Story about the Best File Recovery Software – Acronis True Image 2017
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now