Solved

Servlet

Posted on 2006-07-09
3
252 Views
Last Modified: 2010-04-01
Hi Experts
I write a servlet with jbuilder X.
what files I should upload to host for run servlet.
please help me.
0
Comment
Question by:Momenzadeh
3 Comments
 
LVL 8

Accepted Solution

by:
kaliyugkaarjun earned 250 total points
ID: 17067776
0
 
LVL 3

Expert Comment

by:anumalas
ID: 17070756
hi

you can upload files to tomcat webapps directory if you are using tomcat.

or if you are using any application server we need to deploy webapplicaiton.

follow the link for further reference.

http://edocs.bea.com/wls/docs81/deployment/quickstart.html#1036337
0
 
LVL 2

Expert Comment

by:pankilmpatel
ID: 17070766
Hi,
You need Java Servlet Development Kit (JSDK) JAR file which is available at  java.sun.com

Following link will 100 % help you to install and use servlet in jbuilder.

Installation Link
http://www.devdaily.com/java/edu/jb/jb010007/index.shtml

devlope servlet with jBuilder
http://www.devdaily.com/java/edu/jb/jb010006/

Regards,
Pankil Patel
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This tutorial shows how to create a greeting card by combining two image layers and a text layer on a PC using a free image editing app.
Does your audience prefer people in photos or no people? How can you best highlight what you’re selling? What are your competitors doing, and what can you do that is different and unique from them?  Continue reading to learn how to make your images …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question