Solved

Jython IDE

Posted on 2010-08-31
2
383 Views
Last Modified: 2014-03-31
What is the best Jython IDE to use with WebSphere 6.0.2.x and WebSphere 7.0 enviornment
0
Comment
Question by:vickie0918
  • 2
2 Comments
 
LVL 41

Expert Comment

by:HonorGod
ID: 33569996
I don't have a good answer for this. ;-(

In fact, I wish there were.  Hopefully, someone out there will tell us of something that they have found that answers this question.

At this point thought, I have not found a Jython IDE that has any built-in awareness of the WebSphere AppServer environment.
0
 
LVL 41

Accepted Solution

by:
HonorGod earned 125 total points
ID: 33570115
This page: http://myarch.com/getting-started-wsadmin
seems to say the PyDev could be used as an IDE for wsadmin Jython scripts.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
New Website 15 30
JTable - RowFilter & Columns Header. 3 143
JTable - Group/UnGroup/Drag&Drop 2 93
WEBLOGIC 10.3.6 deployment Issue : Unable to deploy EJBs 22 293
-Xmx and -Xms are the two JVM options often used to tune JVM heap size.   Here are some common mistakes made when using them:   Assume BigApp is a java class file for the below examples. 1.         Missing m, M, g or G at the end …
Configure Web Service (server application) I. Configure security for Web Services methods First, we need to protect Session bean which implements the service: 1. Open EJB deployment descriptor (ejb-jar.xml) in the EJB project that contains you…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question