SlideShare a Scribd company logo
1 of 28
JAVA AT A
GLANCE
Overview
 What is Java ?
 Why Java ?
 Security Models In Java.
 Performance of Java.
 Java in Real World.
 TIOBE & PYPL Index.
 How Many Java Developers ?
 IEEE Spectrum Ranking.
 Programming Language Trend – World Wide
 About MAAN.
What is JAVA ?
“Java From 10,000 Feet's
 According to the world, Java is...
 According to Sun, Java is...
 On closer inspection, Java is
“According to the World, java is...
 Secured Web pages
 The cross-platform language
 The rest-of-the-worlds answer to Bill Gates
 The C++ replacement we need
 A bunch of hype
According to Sun, JAVA IS...
 Simple and Powerful
 Object Oriented
 Portable
 Architecture Neutral
 Distributed
 Multi-threaded
 Robust, Secure/Safe
 High Performance
On Closer Inspection, JAVA IS...
 Simple
 Pure
 Portable
 Surprisingly effective
Why Java ?
“Java
Write Once, Run Anywhere
“Security Models In JAVA
 Need For JAVA Security.
 The Sandbox Model or Java 1.0.
 Java 2 Platform Security Model.
Need For Security IN JAVA
 Code Mobility Can Be Useful.
* Improve Functionality of Services.
 Downloaded Executable Contents is Dangerous
* The Source May Be Unknown Hence Trusted.
* Downloaded Code May modify or destroy data in our System.
* They may be install other hostile code on our system.
* Hostile code may use the resources of our system.
Sandbox model
 The original security model provided by the
Java platform.
 It existed in order to provide a very
restricted environment in which to
 run untrusted code obtained from the open
network.
Java 2 Platform Security Model
“ Fine Grained Access Control :-
* Every code access to the resources based on what is defined in a policy file.
 Easily Configurable Security Policy :-
* It is desirable to allow application builders and users to configure security
policies without having to program.
 Easily Extensible Access Control Structure :-
* The new architecture allows typed permissions and automatic handling of
all permissions of the correct type.
 Extension of Security Checks to all Java programs :-
* There is no longer a built-in concept that all local code is trusted.
“How Sandboxing work ?
 Compile the Applet .
 Create JAR file for the Applet.
 Generate a pair of public/private keys.
 Sign the applet jar with private key.
 Export the certificate for public key.
 Import the certificate as a trusted certificate.
 Create the policy file.
 Load and run the Applet.
Performance of java
Twitter migrates core infrastructure to the JVM
and supports more than 400 million Tweets a day.
Java's innate scalability has played a key role in enabling Netflix to
expand its service to more than 57 million members in 50
countries. Collectively, these viewers enjoy more than 1 billion
hours of shows and movies per month.
JAVA IN REAL WORLD
 1.1 billion desktops run Java.
 930 million Java Runtime Environment downloads each
year.
 3 billion mobile phones run Java.
 10 times more Java phones ship every year than Apple
and Android combined.
 100% of all Blu-ray players run on Java.
 1.4 billion Java Cards are manufactured each year.
 Java powers set-top boxes, printers, Web cams, games,
car navigation systems, lottery terminals, medical
devices, parking payment stations, and more.
“Tiobe & pypl
 TIOBE Index :
TIOBE ratings are calculated by counting hits of the most popular
search engines.
 PYPL Index :
The PYPLU Popularity of Programming Language Index is created
by analyzing how often language tutorials are searched on Google.
TIOBE Index for 2018
Very Long Term History
PYPL Index for 2018
“How many Java developers ?
Based on a survey made using various portals, different sources for
estimation – popularity contests, job market analysis and download
numbers of popular Java development infrastructure products there are
approximately 8,311,000 Java developers in the World.
IEEE Spectrum ranking FOR 2018
Programming Language
Trend - WORLD WIDE
About MAAN
MAAN Software Inc. is a leading software firm
generating its services since a long time in the
domain of digital solution. It has successfully
managed to aid hundreds of entrepreneurs and
small businessmen to launch their endeavors
and turn them into successful digital units.
www.Maansoftwares.com

More Related Content

What's hot

[OWASP Poland Day] OWASP for testing mobile applications
[OWASP Poland Day] OWASP for testing mobile applications[OWASP Poland Day] OWASP for testing mobile applications
[OWASP Poland Day] OWASP for testing mobile applicationsOWASP
 
Tips to Reduce the Attack Surface When Using Third-Party Libraries
Tips to Reduce the Attack Surface When Using Third-Party LibrariesTips to Reduce the Attack Surface When Using Third-Party Libraries
Tips to Reduce the Attack Surface When Using Third-Party LibrariesKaty Anton
 
[OWASP Poland Day] Security in developer's life
[OWASP Poland Day] Security in developer's life[OWASP Poland Day] Security in developer's life
[OWASP Poland Day] Security in developer's lifeOWASP
 
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...apidays
 
Mobile arsenal
Mobile arsenalMobile arsenal
Mobile arsenalAckcent
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World42Crunch
 
DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...
DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...
DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...DevOps_Fest
 
APIdays Paris 2019 - The Rise of Shadow APIs by Guillaume Montard, Bearer.sh
APIdays Paris 2019 - The Rise of  Shadow APIs by Guillaume Montard, Bearer.shAPIdays Paris 2019 - The Rise of  Shadow APIs by Guillaume Montard, Bearer.sh
APIdays Paris 2019 - The Rise of Shadow APIs by Guillaume Montard, Bearer.shapidays
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Ajin Abraham
 
Monkey talk
Monkey talkMonkey talk
Monkey talkConfiz
 
Injecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeAjin Abraham
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareSeniorStoryteller
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)PrashantDhakol
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperAjin Abraham
 
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...Agile Testing Alliance
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at ScaleNordic APIs
 
DevSecOps: Finding the Adversaries in our Midst
DevSecOps: Finding the Adversaries in our MidstDevSecOps: Finding the Adversaries in our Midst
DevSecOps: Finding the Adversaries in our MidstDevOps.com
 

What's hot (20)

[OWASP Poland Day] OWASP for testing mobile applications
[OWASP Poland Day] OWASP for testing mobile applications[OWASP Poland Day] OWASP for testing mobile applications
[OWASP Poland Day] OWASP for testing mobile applications
 
Tips to Reduce the Attack Surface When Using Third-Party Libraries
Tips to Reduce the Attack Surface When Using Third-Party LibrariesTips to Reduce the Attack Surface When Using Third-Party Libraries
Tips to Reduce the Attack Surface When Using Third-Party Libraries
 
[OWASP Poland Day] Security in developer's life
[OWASP Poland Day] Security in developer's life[OWASP Poland Day] Security in developer's life
[OWASP Poland Day] Security in developer's life
 
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
 
Mobile arsenal
Mobile arsenalMobile arsenal
Mobile arsenal
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
 
DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...
DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...
DevOps Fest 2020. Андрій Шабалін. Distributed Tracing for microservices with ...
 
APIdays Paris 2019 - The Rise of Shadow APIs by Guillaume Montard, Bearer.sh
APIdays Paris 2019 - The Rise of  Shadow APIs by Guillaume Montard, Bearer.shAPIdays Paris 2019 - The Rise of  Shadow APIs by Guillaume Montard, Bearer.sh
APIdays Paris 2019 - The Rise of Shadow APIs by Guillaume Montard, Bearer.sh
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 
Monkey talk
Monkey talkMonkey talk
Monkey talk
 
Injecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at Runtime
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged Software
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - Whitepaper
 
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale
 
Monkey talk
Monkey talkMonkey talk
Monkey talk
 
DevSecOps: Finding the Adversaries in our Midst
DevSecOps: Finding the Adversaries in our MidstDevSecOps: Finding the Adversaries in our Midst
DevSecOps: Finding the Adversaries in our Midst
 
Foss con2011
Foss con2011Foss con2011
Foss con2011
 

Similar to How java is better than other languages according to history and uses.

java online training
java online trainingjava online training
java online trainingVarakumarB
 
Top 7 real world applications of java
Top 7 real world applications of javaTop 7 real world applications of java
Top 7 real world applications of javaYour Team in India
 
Unit 1 part 1 introduction to java
Unit 1 part 1 introduction to javaUnit 1 part 1 introduction to java
Unit 1 part 1 introduction to javaDrArpanaChaturvedi
 
Securing a Cloud Migration
Securing a Cloud MigrationSecuring a Cloud Migration
Securing a Cloud MigrationVMware Tanzu
 
A beginner's guide for Java.pptx
A beginner's guide for Java.pptxA beginner's guide for Java.pptx
A beginner's guide for Java.pptxGautamKumar163048
 
Introduction to Java by Java homework experts
Introduction to Java by Java homework expertsIntroduction to Java by Java homework experts
Introduction to Java by Java homework expertsMitchell Lee
 
MODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptxMODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptxVeerannaKotagi1
 
TechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdfTechSearchWeb
 
Cara Tepat Menjadi iOS Developer Expert - Gilang Ramadhan
Cara Tepat Menjadi iOS Developer Expert - Gilang RamadhanCara Tepat Menjadi iOS Developer Expert - Gilang Ramadhan
Cara Tepat Menjadi iOS Developer Expert - Gilang RamadhanDicodingEvent
 
Build Your Career with help of Java.pptx
Build Your Career with help of Java.pptxBuild Your Career with help of Java.pptx
Build Your Career with help of Java.pptxGautamKumar163048
 

Similar to How java is better than other languages according to history and uses. (20)

java online training
java online trainingjava online training
java online training
 
01_What is Java.ppt
01_What is Java.ppt01_What is Java.ppt
01_What is Java.ppt
 
Top 7 real world applications of java
Top 7 real world applications of javaTop 7 real world applications of java
Top 7 real world applications of java
 
Java 2 computer science.pptx
Java 2 computer science.pptxJava 2 computer science.pptx
Java 2 computer science.pptx
 
Unit 1 part 1 introduction to java
Unit 1 part 1 introduction to javaUnit 1 part 1 introduction to java
Unit 1 part 1 introduction to java
 
Java Applications.pdf
Java Applications.pdfJava Applications.pdf
Java Applications.pdf
 
Securing a Cloud Migration
Securing a Cloud MigrationSecuring a Cloud Migration
Securing a Cloud Migration
 
Java Training in Chandigarh
Java Training in ChandigarhJava Training in Chandigarh
Java Training in Chandigarh
 
Java Training in Chandigarh.pdf
Java Training in Chandigarh.pdfJava Training in Chandigarh.pdf
Java Training in Chandigarh.pdf
 
A beginner's guide for Java.pptx
A beginner's guide for Java.pptxA beginner's guide for Java.pptx
A beginner's guide for Java.pptx
 
Introduction to Java by Java homework experts
Introduction to Java by Java homework expertsIntroduction to Java by Java homework experts
Introduction to Java by Java homework experts
 
MODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptxMODULE_1_The History and Evolution of Java.pptx
MODULE_1_The History and Evolution of Java.pptx
 
TechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdf
 
TechSearchWeb.pdf
TechSearchWeb.pdfTechSearchWeb.pdf
TechSearchWeb.pdf
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdf
 
Core java slides
Core java slidesCore java slides
Core java slides
 
Cara Tepat Menjadi iOS Developer Expert - Gilang Ramadhan
Cara Tepat Menjadi iOS Developer Expert - Gilang RamadhanCara Tepat Menjadi iOS Developer Expert - Gilang Ramadhan
Cara Tepat Menjadi iOS Developer Expert - Gilang Ramadhan
 
Build Your Career with help of Java.pptx
Build Your Career with help of Java.pptxBuild Your Career with help of Java.pptx
Build Your Career with help of Java.pptx
 
Ch2
Ch2Ch2
Ch2
 
Java Basic.pdf
Java Basic.pdfJava Basic.pdf
Java Basic.pdf
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

How java is better than other languages according to history and uses.

  • 2. Overview  What is Java ?  Why Java ?  Security Models In Java.  Performance of Java.  Java in Real World.  TIOBE & PYPL Index.  How Many Java Developers ?  IEEE Spectrum Ranking.  Programming Language Trend – World Wide  About MAAN.
  • 4. “Java From 10,000 Feet's  According to the world, Java is...  According to Sun, Java is...  On closer inspection, Java is
  • 5. “According to the World, java is...  Secured Web pages  The cross-platform language  The rest-of-the-worlds answer to Bill Gates  The C++ replacement we need  A bunch of hype
  • 6. According to Sun, JAVA IS...  Simple and Powerful  Object Oriented  Portable  Architecture Neutral  Distributed  Multi-threaded  Robust, Secure/Safe  High Performance
  • 7. On Closer Inspection, JAVA IS...  Simple  Pure  Portable  Surprisingly effective
  • 10. “Security Models In JAVA  Need For JAVA Security.  The Sandbox Model or Java 1.0.  Java 2 Platform Security Model.
  • 11. Need For Security IN JAVA  Code Mobility Can Be Useful. * Improve Functionality of Services.  Downloaded Executable Contents is Dangerous * The Source May Be Unknown Hence Trusted. * Downloaded Code May modify or destroy data in our System. * They may be install other hostile code on our system. * Hostile code may use the resources of our system.
  • 12. Sandbox model  The original security model provided by the Java platform.  It existed in order to provide a very restricted environment in which to  run untrusted code obtained from the open network.
  • 13. Java 2 Platform Security Model
  • 14. “ Fine Grained Access Control :- * Every code access to the resources based on what is defined in a policy file.  Easily Configurable Security Policy :- * It is desirable to allow application builders and users to configure security policies without having to program.  Easily Extensible Access Control Structure :- * The new architecture allows typed permissions and automatic handling of all permissions of the correct type.  Extension of Security Checks to all Java programs :- * There is no longer a built-in concept that all local code is trusted.
  • 15. “How Sandboxing work ?  Compile the Applet .  Create JAR file for the Applet.  Generate a pair of public/private keys.  Sign the applet jar with private key.  Export the certificate for public key.  Import the certificate as a trusted certificate.  Create the policy file.  Load and run the Applet.
  • 17. Twitter migrates core infrastructure to the JVM and supports more than 400 million Tweets a day.
  • 18. Java's innate scalability has played a key role in enabling Netflix to expand its service to more than 57 million members in 50 countries. Collectively, these viewers enjoy more than 1 billion hours of shows and movies per month.
  • 19. JAVA IN REAL WORLD  1.1 billion desktops run Java.  930 million Java Runtime Environment downloads each year.  3 billion mobile phones run Java.  10 times more Java phones ship every year than Apple and Android combined.  100% of all Blu-ray players run on Java.  1.4 billion Java Cards are manufactured each year.  Java powers set-top boxes, printers, Web cams, games, car navigation systems, lottery terminals, medical devices, parking payment stations, and more.
  • 20. “Tiobe & pypl  TIOBE Index : TIOBE ratings are calculated by counting hits of the most popular search engines.  PYPL Index : The PYPLU Popularity of Programming Language Index is created by analyzing how often language tutorials are searched on Google.
  • 22. Very Long Term History
  • 24. “How many Java developers ? Based on a survey made using various portals, different sources for estimation – popularity contests, job market analysis and download numbers of popular Java development infrastructure products there are approximately 8,311,000 Java developers in the World.
  • 27. About MAAN MAAN Software Inc. is a leading software firm generating its services since a long time in the domain of digital solution. It has successfully managed to aid hundreds of entrepreneurs and small businessmen to launch their endeavors and turn them into successful digital units.