SlideShare a Scribd company logo
1 of 10
Jam BW java based 
biologist 
Afsheen khalid 
Roll no 1061 
Bs(h)botany(M) 
Universty of education 
Okara campus
contents 
• Introduction of jam bw 
• Software problems 
• Services 
• Invention 
• How java programed 
• Conclusion 
• Referenced
Introduction of jam Bw 
• Java (15), the new programming language from sun microsystems, was spe-cifically 
designed to run on any computer platform. This is how it works: 
javaprograms are run within a shell called the java virtual machine. Because the 
java virtual machine has been ported to virtually all computer platforms (e.G., 
UNIX, windows, openvms, IBM mainframes, macintosh, and so on) all java 
programs should run on all platforms. All you need is the java virtual machine. 
Software written in java is therefore platform independent. Software develop- ers 
need only write and maintain one java version of the software, rather than many 
versions for many platforms. The java molecular biology workbench (16) is an 
example of a suite of java programs. In this case, the programs are run as applets, 
which are downloaded from the remote server at runtime. Java programs can also 
be downloaded and run as standalone applications on one’s local server, work-station 
or PC. One of the main advantages of java is that it is modular. Applications 
writ- ten in traditional languages are single entities taking up many megabytes of 
memory. Java applications are packages of small objects, each carrying out a single 
function. When a NC runs a java application, only the objects needed at a given 
time are downloaded from the server. Consequently, java-based ncs don’t need 
large amounts of memory and processing power, which provides some protection 
from obsolescence
Software problems 
The third party software problem 
• The chief impediment to the growth of network computing is the perceived lack of third party 
software for server-based platforms. At one level it is true that the majority of desktop software 
vendors write specifically for pcs. Whereas use of java may result in platform independence in the 
future, at present it is often more difficult to find applications for server-based systems such as 
UNIX, VMS, or AS400. On the other hand it is surprising how much software is available for these 
platforms. In many cases, server-based versions of programs such as wordperfect (2) or adobe 
photoshop (8) are available. In other cases, comparable applications exist that are specifically 
targeted to cli- ent/server platforms. 
• 406 fristensky 
• Generally, it is best to use native unix applications wherever possible. When no UNIX version is 
available, windows applications can be displayed from a windowsnt server to an x-windows desktop 
via ncd’s wincentre (9). This approach has the advantages that applications run on native intel 
architecture, and some tasks are offloaded to the NT server. The disadvantages are that a dedicated 
NT server is needed, and the NT server must be configured to work with the UNIX file server. On 
sun systems, wabi (5) can run windows 3.1 in software emulation. 
• 3.4. X11 programs from remote servers
services 
• If your computer center administers your server as 
described above, you reap the greatest benefit of the 
NC model: let the experts do the work. This is 
particularly important with respect to security. Most 
professionally adminis- tered systems have someone 
who keeps up on the latest security holes, and installs 
the appropriate patches in a timely fashion. 
Alternatively, someone in your lab or department will 
need a working knowledge of UNIX, some previous 
experience in programming (preferably C or java) and 
an ability to write html. All other users will benefit 
from an introduction to UNIX (7), but by and large, the 
skills and concepts learned on windows-based.
invention 
• Because almost everything related to the internet was invented 
under UNIX, typical configurations come standard with full internet 
services, including telnet, ftp, e-mail programs, and a web browser 
such as netscape. UNIX sys- tems typically also include the X11 
display manager (xdm) that serves x-terminals. If the computer 
center at your institution already operates net- worked UNIX 
servers, they may be willing (perhaps for a small fee) to adminis- ter 
your server as a clone of their other machines. This has the 
advantage that if your server needs to be down, you can log into 
any other server. To cite an example, in 1996 I moved my home 
directory from my personal workstation to our campus system. 
During a 3-mo interim prior to purchasing a new server for several 
lab groups in our department, I used the publicly-available dual-cpu
How java programed 
• Java was conceived originally as a hardware-independent language to allow 
electronic devices to be programmed, rather than having their capabilities 
hardwired. That aspect of java may lead to networked laboratory equipment that 
is far more versatile and upgradeable than the machines currently in our labs. 
Today, laboratory devices such as fluorescent imagers, DNA sequencers, and even 
plant growth chambers each require a PC to operate them. Because software for 
analysis and data acquisition both usually reside on the dedicated PC, you cannot 
analyze your data if the device is in use by someone else. In the future, many 
devices will be networked java ncs. One obvious result is that it will no longer be 
necessary to purchase and configure a PC for each device. Dedicated hardware 
such as monitors, printers, or LCD displays will also be unnecessary, making java 
devices smaller and cheaper. A java chip (17) resi- dent in each device will perform 
all operations. Each device can be controlled and monitored from any NC. At the 
completion of the experiment, data can be uploaded directly to the user’s 
directory for analysis. More exciting is the concept of the virtual robot. In principle, 
virtual robots could be created on the desktop by linking java devices together in 
an equip- ment control program. In this example, the equipment control program 
repre- sents each real device by a screen icon.
Virtual robot 
Looking back at today from tomorrow’s perspective 
when we look back at the PC era in five or ten years, 
we will be amazed at the things we took for granted. 
Most ridiculous will be the notion that every user was a 
system administrator. In the NC era, servers will be 
professionally administered. By their nature, there is 
essentially nothing to administer on an NC. All the user 
will do is use them. The economics of computing will 
be changed, breaking the obsolescence cycle. Users 
will still spend money on computing, but rather than 
personally buying RAM, disk drives, coprocessors, and 
software,make this.
conclusion 
• This play an important role in our life the 
virtual robot help to understood that java 
make our life more easy than past.
Refrence 
• www.sun.com/java/

More Related Content

What's hot

What's hot (17)

Plan 9: Not (Only) A Better UNIX
Plan 9: Not (Only) A Better UNIXPlan 9: Not (Only) A Better UNIX
Plan 9: Not (Only) A Better UNIX
 
Making Linux do Hard Real-time
Making Linux do Hard Real-timeMaking Linux do Hard Real-time
Making Linux do Hard Real-time
 
Handout2o
Handout2oHandout2o
Handout2o
 
Microkernel Evolution
Microkernel EvolutionMicrokernel Evolution
Microkernel Evolution
 
olibc: Another C Library optimized for Embedded Linux
olibc: Another C Library optimized for Embedded Linuxolibc: Another C Library optimized for Embedded Linux
olibc: Another C Library optimized for Embedded Linux
 
A tour of F9 microkernel and BitSec hypervisor
A tour of F9 microkernel and BitSec hypervisorA tour of F9 microkernel and BitSec hypervisor
A tour of F9 microkernel and BitSec hypervisor
 
Frststps
FrststpsFrststps
Frststps
 
ELC_NA-2015-AFT_for_CI-Igor.Stoppa
ELC_NA-2015-AFT_for_CI-Igor.StoppaELC_NA-2015-AFT_for_CI-Igor.Stoppa
ELC_NA-2015-AFT_for_CI-Igor.Stoppa
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vm
 
Construct an Efficient and Secure Microkernel for IoT
Construct an Efficient and Secure Microkernel for IoTConstruct an Efficient and Secure Microkernel for IoT
Construct an Efficient and Secure Microkernel for IoT
 
Virtual machine subhash gupta
Virtual machine subhash guptaVirtual machine subhash gupta
Virtual machine subhash gupta
 
Embedded Hypervisor for ARM
Embedded Hypervisor for ARMEmbedded Hypervisor for ARM
Embedded Hypervisor for ARM
 
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesWindows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
 
Priority Inversion on Mars
Priority Inversion on MarsPriority Inversion on Mars
Priority Inversion on Mars
 
Openoffice Portable In 2008conference
Openoffice Portable In 2008conferenceOpenoffice Portable In 2008conference
Openoffice Portable In 2008conference
 
Unikernels Introduction
Unikernels IntroductionUnikernels Introduction
Unikernels Introduction
 
Microservices in Unikernels
Microservices in UnikernelsMicroservices in Unikernels
Microservices in Unikernels
 

Viewers also liked (20)

Number Systems
Number SystemsNumber Systems
Number Systems
 
Boolean Logic
Boolean LogicBoolean Logic
Boolean Logic
 
3046 e4
3046 e43046 e4
3046 e4
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
3025 e1 (1)
3025 e1 (1)3025 e1 (1)
3025 e1 (1)
 
3014 e1 (2)
3014 e1 (2)3014 e1 (2)
3014 e1 (2)
 
3014 e1 (1)
3014 e1 (1)3014 e1 (1)
3014 e1 (1)
 
Gene Pool
Gene PoolGene Pool
Gene Pool
 
Bauble
BaubleBauble
Bauble
 
BioSoft
BioSoftBioSoft
BioSoft
 
Argo
ArgoArgo
Argo
 
Biovis3D
Biovis3DBiovis3D
Biovis3D
 
Waqar younas 3040
Waqar younas 3040Waqar younas 3040
Waqar younas 3040
 
BG-Maps
BG-MapsBG-Maps
BG-Maps
 
Codon Code
Codon CodeCodon Code
Codon Code
 
LIMS
LIMSLIMS
LIMS
 
DNA DRAGON
DNA DRAGONDNA DRAGON
DNA DRAGON
 
BIOKM
BIOKMBIOKM
BIOKM
 
Оценка воздействия на биоразнообразие при реализации гидроэнергетических прое...
Оценка воздействия на биоразнообразие при реализации гидроэнергетических прое...Оценка воздействия на биоразнообразие при реализации гидроэнергетических прое...
Оценка воздействия на биоразнообразие при реализации гидроэнергетических прое...
 
10 Tips to becoming Twitter Tastic
10 Tips to becoming Twitter Tastic10 Tips to becoming Twitter Tastic
10 Tips to becoming Twitter Tastic
 

Similar to 1061 (m2)

OBJECT ORIENTED ROGRAMMING With Question And Answer Full
OBJECT ORIENTED ROGRAMMING With Question And Answer  FullOBJECT ORIENTED ROGRAMMING With Question And Answer  Full
OBJECT ORIENTED ROGRAMMING With Question And Answer FullManas Rai
 
Making clouds: turning opennebula into a product
Making clouds: turning opennebula into a productMaking clouds: turning opennebula into a product
Making clouds: turning opennebula into a productCarlo Daffara
 
Making Clouds: Turning OpenNebula into a Product
Making Clouds: Turning OpenNebula into a ProductMaking Clouds: Turning OpenNebula into a Product
Making Clouds: Turning OpenNebula into a ProductNETWAYS
 
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...OpenNebula Project
 
198970820 p-oooooooooo
198970820 p-oooooooooo198970820 p-oooooooooo
198970820 p-oooooooooohomeworkping4
 
MODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptxMODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptxVeerannaKotagi1
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsSuhreed Sarkar
 
Develop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM BoardsDevelop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM BoardsNational Cheng Kung University
 
Rapyuta a cloud robotics platform
Rapyuta a cloud robotics platformRapyuta a cloud robotics platform
Rapyuta a cloud robotics platformieeepondy
 
Core java kvr - satya
Core  java kvr - satyaCore  java kvr - satya
Core java kvr - satyaSatya Johnny
 
J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01Jay Palit
 
10 interesting things about java
10 interesting things about java10 interesting things about java
10 interesting things about javakanchanmahajan23
 
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUsScalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUsIndrajit Poddar
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)Casey Bisson
 

Similar to 1061 (m2) (20)

JAVA CORE
JAVA COREJAVA CORE
JAVA CORE
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
OBJECT ORIENTED ROGRAMMING With Question And Answer  FullOBJECT ORIENTED ROGRAMMING With Question And Answer  Full
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
 
Making clouds: turning opennebula into a product
Making clouds: turning opennebula into a productMaking clouds: turning opennebula into a product
Making clouds: turning opennebula into a product
 
Making Clouds: Turning OpenNebula into a Product
Making Clouds: Turning OpenNebula into a ProductMaking Clouds: Turning OpenNebula into a Product
Making Clouds: Turning OpenNebula into a Product
 
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...
 
198970820 p-oooooooooo
198970820 p-oooooooooo198970820 p-oooooooooo
198970820 p-oooooooooo
 
MODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptxMODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptx
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Develop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM BoardsDevelop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM Boards
 
Minor
MinorMinor
Minor
 
Java ms harsha
Java ms harshaJava ms harsha
Java ms harsha
 
Rapyuta a cloud robotics platform
Rapyuta a cloud robotics platformRapyuta a cloud robotics platform
Rapyuta a cloud robotics platform
 
Inside JVM
Inside JVMInside JVM
Inside JVM
 
Core java kvr - satya
Core  java kvr - satyaCore  java kvr - satya
Core java kvr - satya
 
J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01
 
10 interesting things about java
10 interesting things about java10 interesting things about java
10 interesting things about java
 
Computer
ComputerComputer
Computer
 
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUsScalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
 

More from university of education,Lahore

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

1061 (m2)

  • 1. Jam BW java based biologist Afsheen khalid Roll no 1061 Bs(h)botany(M) Universty of education Okara campus
  • 2. contents • Introduction of jam bw • Software problems • Services • Invention • How java programed • Conclusion • Referenced
  • 3. Introduction of jam Bw • Java (15), the new programming language from sun microsystems, was spe-cifically designed to run on any computer platform. This is how it works: javaprograms are run within a shell called the java virtual machine. Because the java virtual machine has been ported to virtually all computer platforms (e.G., UNIX, windows, openvms, IBM mainframes, macintosh, and so on) all java programs should run on all platforms. All you need is the java virtual machine. Software written in java is therefore platform independent. Software develop- ers need only write and maintain one java version of the software, rather than many versions for many platforms. The java molecular biology workbench (16) is an example of a suite of java programs. In this case, the programs are run as applets, which are downloaded from the remote server at runtime. Java programs can also be downloaded and run as standalone applications on one’s local server, work-station or PC. One of the main advantages of java is that it is modular. Applications writ- ten in traditional languages are single entities taking up many megabytes of memory. Java applications are packages of small objects, each carrying out a single function. When a NC runs a java application, only the objects needed at a given time are downloaded from the server. Consequently, java-based ncs don’t need large amounts of memory and processing power, which provides some protection from obsolescence
  • 4. Software problems The third party software problem • The chief impediment to the growth of network computing is the perceived lack of third party software for server-based platforms. At one level it is true that the majority of desktop software vendors write specifically for pcs. Whereas use of java may result in platform independence in the future, at present it is often more difficult to find applications for server-based systems such as UNIX, VMS, or AS400. On the other hand it is surprising how much software is available for these platforms. In many cases, server-based versions of programs such as wordperfect (2) or adobe photoshop (8) are available. In other cases, comparable applications exist that are specifically targeted to cli- ent/server platforms. • 406 fristensky • Generally, it is best to use native unix applications wherever possible. When no UNIX version is available, windows applications can be displayed from a windowsnt server to an x-windows desktop via ncd’s wincentre (9). This approach has the advantages that applications run on native intel architecture, and some tasks are offloaded to the NT server. The disadvantages are that a dedicated NT server is needed, and the NT server must be configured to work with the UNIX file server. On sun systems, wabi (5) can run windows 3.1 in software emulation. • 3.4. X11 programs from remote servers
  • 5. services • If your computer center administers your server as described above, you reap the greatest benefit of the NC model: let the experts do the work. This is particularly important with respect to security. Most professionally adminis- tered systems have someone who keeps up on the latest security holes, and installs the appropriate patches in a timely fashion. Alternatively, someone in your lab or department will need a working knowledge of UNIX, some previous experience in programming (preferably C or java) and an ability to write html. All other users will benefit from an introduction to UNIX (7), but by and large, the skills and concepts learned on windows-based.
  • 6. invention • Because almost everything related to the internet was invented under UNIX, typical configurations come standard with full internet services, including telnet, ftp, e-mail programs, and a web browser such as netscape. UNIX sys- tems typically also include the X11 display manager (xdm) that serves x-terminals. If the computer center at your institution already operates net- worked UNIX servers, they may be willing (perhaps for a small fee) to adminis- ter your server as a clone of their other machines. This has the advantage that if your server needs to be down, you can log into any other server. To cite an example, in 1996 I moved my home directory from my personal workstation to our campus system. During a 3-mo interim prior to purchasing a new server for several lab groups in our department, I used the publicly-available dual-cpu
  • 7. How java programed • Java was conceived originally as a hardware-independent language to allow electronic devices to be programmed, rather than having their capabilities hardwired. That aspect of java may lead to networked laboratory equipment that is far more versatile and upgradeable than the machines currently in our labs. Today, laboratory devices such as fluorescent imagers, DNA sequencers, and even plant growth chambers each require a PC to operate them. Because software for analysis and data acquisition both usually reside on the dedicated PC, you cannot analyze your data if the device is in use by someone else. In the future, many devices will be networked java ncs. One obvious result is that it will no longer be necessary to purchase and configure a PC for each device. Dedicated hardware such as monitors, printers, or LCD displays will also be unnecessary, making java devices smaller and cheaper. A java chip (17) resi- dent in each device will perform all operations. Each device can be controlled and monitored from any NC. At the completion of the experiment, data can be uploaded directly to the user’s directory for analysis. More exciting is the concept of the virtual robot. In principle, virtual robots could be created on the desktop by linking java devices together in an equip- ment control program. In this example, the equipment control program repre- sents each real device by a screen icon.
  • 8. Virtual robot Looking back at today from tomorrow’s perspective when we look back at the PC era in five or ten years, we will be amazed at the things we took for granted. Most ridiculous will be the notion that every user was a system administrator. In the NC era, servers will be professionally administered. By their nature, there is essentially nothing to administer on an NC. All the user will do is use them. The economics of computing will be changed, breaking the obsolescence cycle. Users will still spend money on computing, but rather than personally buying RAM, disk drives, coprocessors, and software,make this.
  • 9. conclusion • This play an important role in our life the virtual robot help to understood that java make our life more easy than past.