Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Installation and Setup For RMI

Posted on 2003-11-13
4
Medium Priority
?
330 Views
Last Modified: 2006-11-17
Dear All the Experts,

     Can someone teach me how to RMI setup and installation for Windows XP? I have already install tomcat and jdk in my computer. What other steps that I need to do? This is urgent for me. I am a new user in RMI, so, I really need your help. Thank you.


Regards,
   Jocelyn
0
Comment
Question by:jocelynyip
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 15

Accepted Solution

by:
jimmack earned 1000 total points
ID: 9748930
You probably need to have a look through this.  I think it explains everything you need.  If not, just ask ;-)

http://java.sun.com/docs/books/tutorial/rmi/index.html
0
 
LVL 15

Expert Comment

by:jimmack
ID: 9770652
How is it going?

I notice that you refer to JDK and Tomcat in your question.  Is it really RMI that you are interested in, or is it Servlets/JSPs that you need help with?
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question