Preview

Java vs .Net

Powerful Essays
Open Document
Open Document
970 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Java vs .Net
Architectural Strategies

Java VS .Net Technology University of Phoenix Online Software Architecture July 16, 2012

CDCo needs to improve its architecture strategy in order to make the current application architecture more efficient and productive. Looking at the level 0 target state architecture of CDCo, improvement is necessary and choosing which types of technology to use needs to be thoroughly examine to see which is more beneficial to use or adapt. We will address this and explain which approached we will choose after presenting the benefits and pointing out the problems that can eliminate high cost of maintenance. We will define and compare two technologies, discuss their advantages and disadvantages so that we can rule out the best option that we have. Furthermore it is very important to know how this two software architecture overhead cost when it is implemented. For the purpose of this white paper I will introduce the technology that I believe and consider to be appropriate solutions on the current CDCo’s software architecture these are the JAVA technology and the .NET technology.
JAVA technology is a technology that is known to be adaptable. It is a technology that is both programming language and a platform. It can connect to computers all kinds of networks including mobile, internet, games console and so many to name. JAVA’s advantages are its versatility, simple, object oriented, distributed, secure, architectural neutral, portability, efficiency and so many more to name; but the most widely noticeable advantage its portability because it can be use on one or more platform because of it being architectural neutral. When compared to .NET technology JAVA also have the capability to run on web services and browser. JAVA’s code simplicity compared to .NET is a tremendous advantage because error can easily be debugged if it occurs when the program is executed. JAVA carefully examine the security aspect of



References: Getdotgnu.com. (2004-06). .NET Technology. Retrieved July 12, 2012 from, http://getdotgnu.com/technology.htm Debbabii, M (2007), Embedded Java Security, Retrieved July 11, 2012 from, http://www.springer.com/computer/communication+networks/book/978-1-84628-590-5 Java tutorials, About Java technology, Retrieve July 14, 2012 from, http://docs.oracle.com/javase/tutorial/getStarted/intro/definition.html Microsoft.net, .NET4, Retrieve July 12, 2012 from, http://www.microsoft.com/net Microsoft.net Passport(1996-2011), Ready to run software, Retrieve July 12, 2012 from, http://www.rtr.com/Ready-to-Run_Software/NET_passport.htm

You May Also Find These Documents Helpful

  • Good Essays

    A1: Applet is a type of Java program that runs on web browser. It can be a fully functional Java application because it has full Java API…

    • 559 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Java is multi-platform and allows a much broader audience to be reached. The .NET framework is aimed primarily at the Windows OS whereas Java is targeted at many different platforms including gadgets, gaming, mobiles as well as windows and the Apple equivalent. This is because Java runs on it’s own virtual machine that can installed on any platform. This is something that should always be considered at the beginning of a project so the developer can reach it’s target audience.…

    • 1025 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    References: Racherla, S., Bajaj, V., Knebel, E., Korn, G., Kutepova, A., Newell, G., et al. (2010). IBM Information Infrastructure Solutions Handbook. IBM Redbooks, 2010, from www.books.google.com…

    • 574 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Website Migration Project

    • 3004 Words
    • 13 Pages

    The system’s requirements call for an adoption of system architecture that is robust, stable and efficient. The architecture will encompass an operating system platform, a database, a web server and server side scripting software. For each of these system sub sections, there is a large variety of software solutions available for adoption. These tools possess operational, cost and adaptability characteristics that make them suited for application in varying areas.…

    • 3004 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Prg420 Syllabus

    • 1691 Words
    • 7 Pages

    Horton, I. (2005). Ivor Horton’s Beginning Java 2, JDK (5th ed.). Indianapolis, IN: Wiley Publishing.…

    • 1691 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Java

    • 490 Words
    • 3 Pages

    Write a Java program to demonstrate using bitmaps and bitwise operators to sort and remove duplicates from a file of random phone numbers. Do not confuse the term bitmap used for compressing data into smaller spaces with the bitmap that has come to mean a graphic image.…

    • 490 Words
    • 3 Pages
    Good Essays
  • Best Essays

    A SDLC defines the phases and tasks that are essential to systems development regardless of the size or scope of the impending system. While there are many versions or ‘models' of the SDLC, they differ only in terminology and are more often alike than dissimilar. In its simplest form, the SDLC consists of five phases: planning, analysis, design, implementation, and support. Following are examples of three different models, and have been included to further highlight the similarity between the phases and underlying principles.…

    • 2859 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Java vs..Net Programming

    • 3126 Words
    • 13 Pages

    "The future of software development is now expected to be a near 50-50 split between Java and .Net. When making a decision on which technology to bank on, you should really research what types of companies use which technology, and which fits into your career aspirations. Java and .Net overlap in a lot of markets and inevitably each will form definitive niches that will be hard to break until newer model-based programming technologies take over." -Payton Byrd, Java vs .Net - The Professional Software Developer's Survival Guide…

    • 3126 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    Application Security

    • 2278 Words
    • 10 Pages

    Note that this approach is technology / platform independent. It is focused on principles, patterns, and practices.…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    It208 D

    • 1180 Words
    • 5 Pages

    IT208 – Case Study Document Outline Title Page Abstract Table of Contents List of Figures List of Tables 1.0 Research Description (January 22, 2013) 1.1 Overview of the Current State of Technology 1.2 Problem Analysis of the Existing System 2.0 Research Objectives (January 29, 2013) 2.1 General Objective 2.2 Specific Objectives 3.0 Scope and Limitation of the Research (February 4, 2013) 4.0 Research Methodology (February 4, 2013) 5.0 The System (included in the list of tables & figures) 5.1 System Overview (February 12, 2013) 5.2 System Objectives (February 12, 2013) 5.2.1 General Objective 5.2.2 Specific Objectives 5.3 System Functions (February 19, 2013) 5.4 System Scope and Limitations (February 19, 2013) 5.5 System Architectural Design (February 26, 2013) 5.6 Physical Environment and Resources (February 28, 2013) 5.7 Report/Form Design (February 28, 2013)…

    • 1180 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Big Data

    • 476 Words
    • 2 Pages

    References: • • • • • • • www.wikipedia.com www.idc.com www.jaspersoft.com/bigdata www.infoworld.com www.znet.com www.formtek.com www.forwardthinking.pcmag.com…

    • 476 Words
    • 2 Pages
    Better Essays
  • Good Essays

    Legacy System

    • 6123 Words
    • 25 Pages

    Parodi, J. (1996), “Building Wrappers for Legacy Software Applications,” Digital Equipment Corp., Boston. Rugaber, S. and J. White (1998), “Restoring a Legacy – Lessons Learned,” IEEE Software 15, 4, 28. Sneed, H. (1996), “Encapsulating Legacy Software for Reuse in Client/Server Systems,” In Proceedings of WCRE-96, IEEE Press, Monterey, November. Sneed, H. (1997a), “Software Interface Reengineering,” In Proceedings of WCRE-97, IEEE Press, Amsterdam, October. Sneed, H. (1997b), “SoftWrap – ein Tool f¨ r die Kapselung vorhandener Assembler, PLI und COBOL u Programme,” HMD Heft Nr. 194, Stuttgart, Germany. Sneed, H. (1998), Objektorientierte Softwaremigration, Addison-Wesley, Bonn. Souder, T. and S. Mancordis (1999), “Legacy – A Tool for Securely Integrating Legacy Systems into a Distributed Environment,” In Proceedings of IEEE-WCRE-99, Atlanta, October, to appear. Taylor, D. (1995), Business Engineering with Object Technology, Wiley, New York. Verhoef, C., A. Sellink, and H. Sneed (1999), “Restructuring of COBOL/CICS Legacy Systems,” In Proceedings of 3rd European Conference on Software Maintenance and Reengineering, Amsterdam, March, p. 72. Wallner, K. and E. Wallace (1996), “Simulated Evaluation of the Object Management Group’s (OMG) Object Management Architecture (OMA),” ACM SIGPLAN Notices 31, 10, 168. Winsberg, P. (1995), “Legacy Code – Don’t Bag it, Wrap it” Datamation, May. Yourdon, E. (1997), “Distributed Computing,” American Programmer 10, 12.…

    • 6123 Words
    • 25 Pages
    Good Essays
  • Satisfactory Essays

    java

    • 312 Words
    • 2 Pages

    AllocationStrategy.java import java.util. ArrayList; import java.util. Collection; import java.util. Iterator; import java.util. List; import java.util.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Current generation application systems are complex ecosystems—the various applications within the ecosystem have many interdependencies among them and are generally integrated at a platform level; they are not a collection of independent applications using application level integration schemes. There is a strong interdependency between business systems, IT systems, software systems, platforms, and IT infrastructure. As a result, a holistic management of the entire ecosystem is…

    • 6211 Words
    • 25 Pages
    Powerful Essays
  • Better Essays

    Remote Method Invocation

    • 1965 Words
    • 8 Pages

    I1 Introduction Distributed systems require entities which reside in different address spaces, potentially on different machines, to communicate. The Java™ system (hereafter referred to simply as “Java”) provides a basic communication mechanism, sockets [13]. While flexible and sufficient for general communication, the use of sockets requires the client and server using this medium to engage in some application-level protocol to encode and decode messages for exchange. An alternative to sockets is Remote Procedure Call (RPC) [13].…

    • 1965 Words
    • 8 Pages
    Better Essays

Related Topics