Enterprise J2ME Wireless Applications

( 1 )

Overview

Industrial-strength J2ME™ for enterprise developers, architects, and decision-makers

J2ME offers an extraordinarily flexible and robust platform for developing mobile applications with enterprise-class performance, reliability, and value. Now, leading mobile developer Michael Yuan covers every aspect of building industrial-strength applications with J2ME: design, architecture, tools, processes, business issues, and more.

Yuan introduces ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (27) from $1.99   
  • New (6) from $38.86   
  • Used (21) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$38.86
Seller since 2009

Feedback rating:

(17)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
2003-11-02 Paperback New New Book. Remainder Mark. Publisher Overstock and may have some slight wear from handling.

Ships from: San Jose, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$41.26
Seller since 2008

Feedback rating:

(17614)

Condition: New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$41.27
Seller since 2007

Feedback rating:

(23419)

Condition: New
BRAND NEW

Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$44.24
Seller since 2014

Feedback rating:

(0)

Condition: New
0131405306 Premium Publisher Direct Books are Like New or Brand New books direct from the publisher sometimes at a discount. Multiple copies are usually available. These books ... are not available for expedited shipping and may take up to 14 business days to receive. Read more Show Less

Ships from: Woodland Hills, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Express, 48 States
$69.68
Seller since 2014

Feedback rating:

(3)

Condition: New
New

Ships from: Idyllwild, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$74.71
Seller since 2010

Feedback rating:

(7)

Condition: New
10-23-03 other 1 BRAND NEW! ONLY Expedited orders are shipped with tracking number! *WE DO NOT SHIP TO PO BOX* Please allow up to 14 days delivery for order with standard ... shipping. SHIPPED FROM MULTIPLE LOCATIONS. Read more Show Less

Ships from: San Jose, CA

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Industrial-strength J2ME™ for enterprise developers, architects, and decision-makers

J2ME offers an extraordinarily flexible and robust platform for developing mobile applications with enterprise-class performance, reliability, and value. Now, leading mobile developer Michael Yuan covers every aspect of building industrial-strength applications with J2ME: design, architecture, tools, processes, business issues, and more.

Yuan introduces innovations that make the platform even more powerful, ranging from new J2ME profiles and wireless messaging APIs to mobile databases and web services tools. These innovations allow existing Java™ developers (especially J2EE™ developers) to leverage their skills and add mobility to enterprise applications. Yuan also presents more than a dozen complete sample applications—including the application that earned him the grand prize in Nextel, Sun, and Motorola’s nationwide wireless developer contest. Coverage includes:

  • Patterns and best practices for building end-to-end mobile applications
  • Emerging mobile “killer applications”: driving productivity and cost reduction
  • “Smart client” applications: architecture and construction
  • Advanced HTTP techniques for authentication and session tracking
  • Overcoming hardware and network limitations
  • Leading-edge mobile enterprise messaging techniques
  • Mobile databases and synchronization engines
  • XML and mobile web services, including the J2ME Web Services Optional Package
  • New options for mobile security in the enterprise
Read More Show Less

Product Details

  • ISBN-13: 9780131405301
  • Publisher: Prentice Hall
  • Publication date: 10/4/2003
  • Pages: 452
  • Product dimensions: 6.98 (w) x 9.24 (h) x 1.02 (d)

Meet the Author

MICHAEL JUNTAO YUAN is a researcher, developer, author, and advocate for Java and open source technologies. He is a research associate at the Center for Research in Electronic Commerce at the University of Texas at Austin and the Wireless Java columnist for JavaWorld. Yuan won the 2002 Grand Prize in Nextel, Sun, and Motorola’s national J2ME application contest. Currently, he leads an effort in BuzzPhone.com to develop a series of official blueprint applications for Nokia.

Read More Show Less

Read an Excerpt

About this BookTarget Audience

This book targets all mobile software developers and business decision makers. It focuses on end-to-end architectural patterns, best practices, key innovations, and real-world design approaches. For different readers, this book offers different benefits:

  • Managers and entrepreneurs: This book is a comprehensive guide to mobile enterprise applications and the Java 2 Micro Edition (J2ME). It covers the capabilities, limitations, common best practices, and commercial solutions of the state-of-the-art mobile Java technologies. It helps you decide which mobile Java profile and products are the best for your business.
  • Experienced mobile developers: This book skips the basic MIDP API tutorial materials and goes straight to the more advanced and more useful topics. It uses several complete sample applications to illustrate common architectural patterns and coding best practices in mobile enterprise applications. For developers who are looking for specific solutions (e.g., messaging, database,
  • Experienced Java developers: For experienced Java enterprise developers (J2EE developers), the move to mobility is about leveraging existing skills. This book walks through familiar design patterns and best practices and shows developers how to apply them in mobile applications. Lightweight mobile versions of enterprise Java APIs (such as JDBC, Java servlet, JMS, and Java Cryptography Extension) are discussed. Those are excellent examples of how to scale down enterprise solutions for mobility while still preserving core functionalities. With a few notes on mobile-specific issues, it is the fastest pathto add mobility to existing enterprise infrastructure.
Prerequisites

To fully understand the technical content in this book, the readers should be familiar with the basic Java 2 Micro Edition, Mobile Information Device Profile (J2ME/MIDP) APIs and development tools. A quick MIDP programming guide is provided in Appendix A.

To run the end-to-end sample applications, you will need to deploy the serverside components to your own Java application server and run the clientside components on the desktop emulator or real devices. Please refer to the product manuals of your tools for step-by-step instructions.

Although serverside Java is not the focus of this book, familiarity with basic Java 2 Enterprise Edition (J2EE) concepts such as servlets, Java DataBase Connectivity (JDBC), Java Messaging Service (JMS), Java

Contents

This book is divided into six parts:

  • Part I is the introductory material for mobile commerce, mobile enterprise applications, and J2ME. It covers the overall architecture, current status, and future roadmaps of J2ME.
  • Part II is the heart of this book. It presents several example applications to illustrate the smart client mobile application paradigm, common architectural patterns, and best practices. It covers how to run container-managed applications (e.g., servlets) on PDA devices. It also presents a useful advanced HTTP client library for J2ME clients.
  • Part III is about mobile messaging. In the mobile world, messaging clients are easy to use and fit into the mobile lifestyle. In the enterprise world, messaging is the best way to build loosely coupled applications that have guaranteed quality-of-service (QoS). This part of this book seeks to combine the best of the two worlds. It covers email and SMS-based end-to-end applications as well enterprise mobile messaging servers.
  • Part IV discusses mobile databases that are core to occasionally connected and synchronization-based applications. This part covers commercial and open source innovations for mobile databases, synchronization engines, and legacy database connectivity. Two sample database applications from PointBase are presented.
  • Part V covers how to integrate mobile clients into the enterprise Web services infrastructure. It discusses existing and emerging J2ME
  • Part VI is all you need to know about J2ME mobile security solutions. It goes way beyond the simple connection-based end-to-end solutions such as the HTTPS. This part covers open source and commercial cryptography toolkits for J2ME. Due to the complexity of cryptography APIs, API tutorials for each important toolkit are provided.
  • There are two appendices to this book. One of them uses a simple end-to-end MIDP application to illustrate the whole development and deployment cycle. The other appendix introduces the IBM WebSphere Studio Device Developer IDE and provides undocumented instructions on how to install IBM J2ME runtimes on PocketPC devices.
Code Examples

This book uses complete example applications to demonstrate design patterns, best practices, and important API usages. Since this book discusses a wide range of technologies, innovations, and application scenarios, it is impractical to cover everything within a monolithic example. Instead, I decided to develop several small to midsize samples, each focusing on a particular topic. This approach allows the readers to partition the learning task and read one part of this book at a time.

The source code is presented in easy-to-digest segments that are relevant to the discussion text. Nonessential parts of the code (e.g., exception handling, importing packages) are often deliberately omitted from the listings for clarity. Hence, the printed listings are suffcient for understanding the ideas but are not directly runnable code.

  • iFeedBack: The grand prize winner of the NexTel/Motorola/Sun wireless application contest in 2002 (Chapter 3).
  • Echo: A GUI client and a service running in an OSGi clientside container (Chapter 4).
  • Pizza Order: An example included in the IBM Service Management Framework download. It demonstrates how to build smart clients with HTTP front ends (Chapter 4).
  • Smart Ticket: The Sun Wireless Blueprints application v2.0 early release code (Chapter 5).
  • HttpClient: The code for the advanced HTTP library we develop in this section (Chapter 6).
  • Mail: An MIDP email client based on the Mail4ME v1.0 library (Chapter 8).
  • WMATester: A simple messaging application that illustrates the use of Wireless Messaging API v1.0 (Chapter 9).
  • ContactManager: A mobile address book based on the PointBase v4.5 library (Chapter 11).
  • ContactManagerSync: A synchronized mobile address book based on the PointBase v4.5 library (Chapter 13).
  • AmazonExample: An k
  • PeekAndPick: A RSS reader for mobile phones developed by Jonathan Knudsen (Chapter 15).
  • Google: A simple client for the Google Web services API. Both kSOAP v1.2 and v2.0 versions are available (Chapter 16).
  • SmartPhrases: An integrated Google search and online dictionary application (Chapter 16).
  • MapPoint AxisFacade: An Apache Axis facade for MapPoint v3.0 Web services (Chapter 18).
  • MapPoint AxisClient: Personal Profile and MIDP clients for the Map-Point facade (Chapter 18).
  • MobileSecurity: A collection of small applications that demonstrate the correct usage of cryptography APIs (Chapter 20).
  • SimpleDemo: A simple MIDP application to illustrate key concepts and APIs in MIDP programming (Appendix A).
Commercial Products

This book covers and compares more than 30 toolkits and libraries from more than a dozen third-party vendors. The descriptions and API usage examples of those products are intended to give the readers a solid technical ground to make informed comparisons and decisions. They also serve as realworld examples for API and tool designs. However, they do not substitute for the formal product documentation from the vendor. I strongly encourage interested readers to obtain the latest evaluation package and documentation from the vendor to investigate further.Related Publications

Some of the materials used in this book are loosely based on articles I published previously on several online magazines.

  • The Sun Smart Ticket blueprint discussed in Chapter 5 is also covered in “End-to-End J2ME Application Development by Example,” published on the Sun Wireless Java Web site in June 2003.
  • The first half of Chapter 9 is also covered by “Mobile P2P messaging, Part 1,” published on IBM developerWorks in December 2002.
  • Examples in Part IV are adapted from “High-availability mobile applications,” published on JavaWorld in June 2003.
  • Chapter 16 is based on “Access Web services from wireless devices,” published on JavaWorld in August 2002.
  • The example in Chapter 18 is adapted from “Let the mobile games begin, Part 2,” published on JavaWorld in May 2003.
  • Part VI is loosely based on “Data security in mobile Java applications,” published on JavaWorld in December 2002.
Production Notes

This book is produced by the Latex typesetting system on a 1GHz Apple PowerBook running Mac OS X—the best consumer operating system ever produced. Microsoft Word is used for collaborative editing and reviewing. The figures are made with Microsoft Visio, OmniGra2e, GIMP, and the ImageMagick utilities.

The example applications are developed using a variety of development tools, including VI, JEdit, IntelliJ IDEA, and the WebSphere Studio Device Developer IDE. Apache Ant is used to build the applications. Mobile clients are tested on many vendor SDKs, including those from Sun Microsystems (the J2ME Wireless ToolKit), IBM (the WebSphere Micro Environment), Nokia, and Motorola. Real device testing was conducted on Motorola i95cl, Nokia 7210, Nokia 6800, and PocketPC Phone devices.

Read More Show Less

Table of Contents

Foreword.

About the Book.

Acknowledgments.

I. INTRODUCTION.

1. Mobile Commerce: Visions, Realities, and Opportunities.

Mobile Commerce Value Propositions. Mobile Technology Adoption. The Search for Killer Mobile Applications. Mobile Commerce Landscape. Summary. Resources.

2. J2M 2ME: Is Mobile Java Ready for Enterprise?

Why Java? The Java Community Process. Java Everywhere. Java 2 Micro Edition Explained. Competing Technologies. Summary. Resources.

II. END-TO-END ENTERPRISE APPLICATIONS.

3. The Smart Client Paradigm: iFeedBack.

Benefits of Smart Clients. Introducing iFeedBack. iFeedBack Usage Scenarios. Implementation Walk Through. Summary. Resources.

4. Managed Smart Clients.

Container-Managed Applications. OSGi Containers. A Simple Echo Service Example. Smart Client with HTTP Front End. Mobile Gateways. Summary. Resources.

5. Mobile Design Patterns: The Smart Ticket Blueprint.

Getting Started. Smart Ticket in Action. Important Architectural Patterns. Implementation Techniques. Summary. Resources.

6. Advanced HTTP Techniques.

The Decorator Approach. The Process-Chain Approach. Session Tracking via HTTP Cookies. HTTP Basic Authentication. HTTP Digest Authentication. Secure HTTP. Summary. Resources.

7. End-to-End Best Practices.

Limited Device Hardware. Slow, Unreliable Networks. Pervasive Devices. Ubiquitous Integration. The Impatient User. Summary. Resources.

III. MOBILE MESSAGING APPLICATIONS.

8. Email and PIM.

Basics of Email. Introducing Mail4ME. The JavaPhone API. The PDA Optional Package. Commercial Email and PIM Suites. Corporate Portal Servers. Summary. Resources.

9. Converged Mobile P2P 2P Messaging.

Introducing the Wireless Messaging API. WMA in Action. WMA Reference Implementation. SMS from the Backend. Beyond SMS: The IM Convergence. SIP-Based IM Applications. Summary. Resources.

10. Enterprise Messaging.

Mobile Enterprise Messaging. Introducing the JMS. Mobile JMS from iBus//Mobile. The IBM WebSphere MQ Everyplace. Summary. Resources.

IV. MOBILE DATABASES AND SYNCHRONIZATION ENGINES.

11. Mobile Database for CDC Devices.

Database on the Go. Introducing JDBC. Portable and Efficient Code Using PreparedStatement. Access Stored Procedures Using CallableStatement. The JDBC Optional Package for the CDC. HSQL Database Engine. iAnywhere Solutions SQL Anywhere Studio. IBM DB2 Everyplace. Oracle9i Lite. PointBase Micro Edition. Example Application: Contact Manager. Summary. Resources.

12. Mobile Databases for MIDP DP devices.

PointBase Micro Edition. The Oracle J2ME SODA SDK. The IBM DB2e FastRecordStore. Summary. Resources.

13. Database Synchronization.

Synchronization and Mobility. PointBase UniSync. IBM DB2 Everyplace. iAnywhere Solutions MobiLink. Oracle9i Mobile Server. The Synchronized Contact Manager. Summary. Resources.

14. Access Backend Databases.

Direct Access to Remote Databases. The Oracle J2ME SQL SDK. Legacy Applications. Using Simplicity for Legacy Databases. Summary. Resources.

V. XML AND MOBILE WEB SERVICES.

15. XML for Small Devices.

What Is XML? Challenges for Small Devices. XML Parsing Models. Introducing Amazon XML Services. Amazon Services via XmlPull. Amazon Services via kDOM. A Mobile RSS Client. Summary. Resources.

16. SOAP Web Services on Smart Clients.

What Is SOAP Web Services? Introducing kSOAP. kSOAP Explained. Advanced kSOAP. More kSOAP Examples. What's in kSOAP v2.0? Summary. Resources.

17. The J2M 2ME Web Services Optional Package.

A Little History. The XML Processing API. The JAX-RPC API. The SPI for Implementers. Compare with kXML and kSOAP. Summary. Resources.

18. Case Study: Mobile Clients for Location on-Based Services.

Location-Based Service. Microsoft MapPoint Web Services. MapPoint J2ME Clients. Enhancing the Driving Directions Application. Summary. Resources.

VI. ADVANCED MOBILE SECURITY.

19. Mobile Security for Enterprise.

What Is Advanced Mobile Security? Lightweight Mobile Cryptography Toolkits. Bouncy Castle Lightweight API. The IAIK ME JCE. Phaos Technology Micro Foundation Toolkit. NTRU jNeo for Java Toolkit. B3 Security. Device-Specific APIs. Standardization of J2ME Security APIs. Summary. Resources.

20. The J2M 2ME Crypto Recipes.

Overview of Recipes. Symmetric Encryption. Password-Based Encryption. Public Key Encryption. Digital Signature. Summary. Resources.

A: Basics of J2M 2ME Application on Development.

Life Cycle Methods. UI Model. Remote and Local Data. Code Walkthrough. Packaging and Building. Deployment. Summary.

B: Tools and J2M 2ME Runtimes for PDAs.

Overview of the WebSphere Studio Device Developer. Installing MIDP on PocketPC Devices. Installing Personal Profile on PocketPC Devices. Run Java Applications on the PocketPC Device. Summary.

Index.

Read More Show Less

Preface

About this Book

Target Audience

This book targets all mobile software developers and business decision makers. It focuses on end-to-end architectural patterns, best practices, key innovations, and real-world design approaches. For different readers, this book offers different benefits:

  • Managers and entrepreneurs: This book is a comprehensive guide to mobile enterprise applications and the Java 2 Micro Edition (J2ME). It covers the capabilities, limitations, common best practices, and commercial solutions of the state-of-the-art mobile Java technologies. It helps you decide which mobile Java profile and products are the best for your business.
  • Experienced mobile developers: This book skips the basic MIDP API tutorial materials and goes straight to the more advanced and more useful topics. It uses several complete sample applications to illustrate common architectural patterns and coding best practices in mobile enterprise applications. For developers who are looking for specific solutions (e.g., messaging, database, XML, and security), the technical discussions on leading third-party J2ME tools and libraries will prove useful. Those real-world innovations also serve as prime examples of how you should design and implement your own solutions for similar tasks.
  • Experienced Java developers: For experienced Java enterprise developers (J2EE developers), the move to mobility is about leveraging existing skills. This book walks through familiar design patterns and best practices and shows developers how to apply them in mobile applications. Lightweight mobile versions of enterprise Java APIs (such as JDBC, Java servlet, JMS, and Java Cryptography Extension) are discussed. Those are excellent examples of how to scale down enterprise solutions for mobility while still preserving core functionalities. With a few notes on mobile-specific issues, it is the fastest path to add mobility to existing enterprise infrastructure.

Prerequisites

To fully understand the technical content in this book, the readers should be familiar with the basic Java 2 Micro Edition, Mobile Information Device Profile (J2ME/MIDP) APIs and development tools. A quick MIDP programming guide is provided in Appendix A.

To run the end-to-end sample applications, you will need to deploy the serverside components to your own Java application server and run the clientside components on the desktop emulator or real devices. Please refer to the product manuals of your tools for step-by-step instructions.

Although serverside Java is not the focus of this book, familiarity with basic Java 2 Enterprise Edition (J2EE) concepts such as servlets, Java DataBase Connectivity (JDBC), Java Messaging Service (JMS), Java XML processing, and Enterprise JavaBean (EJB), will help you understand various topics in this book.

Contents

This book is divided into six parts:

  • Part I is the introductory material for mobile commerce, mobile enterprise applications, and J2ME. It covers the overall architecture, current status, and future roadmaps of J2ME.
  • Part II is the heart of this book. It presents several example applications to illustrate the smart client mobile application paradigm, common architectural patterns, and best practices. It covers how to run container-managed applications (e.g., servlets) on PDA devices. It also presents a useful advanced HTTP client library for J2ME clients.
  • Part III is about mobile messaging. In the mobile world, messaging clients are easy to use and fit into the mobile lifestyle. In the enterprise world, messaging is the best way to build loosely coupled applications that have guaranteed quality-of-service (QoS). This part of this book seeks to combine the best of the two worlds. It covers email and SMS-based end-to-end applications as well enterprise mobile messaging servers.
  • Part IV discusses mobile databases that are core to occasionally connected and synchronization-based applications. This part covers commercial and open source innovations for mobile databases, synchronization engines, and legacy database connectivity. Two sample database applications from PointBase are presented.
  • Part V covers how to integrate mobile clients into the enterprise Web services infrastructure. It discusses existing and emerging J2ME XML and SOAP toolkits, specifications and showcases several complete sample applications.
  • Part VI is all you need to know about J2ME mobile security solutions. It goes way beyond the simple connection-based end-to-end solutions such as the HTTPS. This part covers open source and commercial cryptography toolkits for J2ME. Due to the complexity of cryptography APIs, API tutorials for each important toolkit are provided.
  • There are two appendices to this book. One of them uses a simple end-to-end MIDP application to illustrate the whole development and deployment cycle. The other appendix introduces the IBM WebSphere Studio Device Developer IDE and provides undocumented instructions on how to install IBM J2ME runtimes on PocketPC devices.

Code Examples

This book uses complete example applications to demonstrate design patterns, best practices, and important API usages. Since this book discusses a wide range of technologies, innovations, and application scenarios, it is impractical to cover everything within a monolithic example. Instead, I decided to develop several small to midsize samples, each focusing on a particular topic. This approach allows the readers to partition the learning task and read one part of this book at a time.

The source code is presented in easy-to-digest segments that are relevant to the discussion text. Nonessential parts of the code (e.g., exception handling, importing packages) are often deliberately omitted from the listings for clarity. Hence, the printed listings are suffcient for understanding the ideas but are not directly runnable code.

  • iFeedBack: The grand prize winner of the NexTel/Motorola/Sun wireless application contest in 2002 (Chapter 3).
  • Echo: A GUI client and a service running in an OSGi clientside container (Chapter 4).
  • Pizza Order: An example included in the IBM Service Management Framework download. It demonstrates how to build smart clients with HTTP front ends (Chapter 4).
  • Smart Ticket: The Sun Wireless Blueprints application v2.0 early release code (Chapter 5).
  • HttpClient: The code for the advanced HTTP library we develop in this section (Chapter 6).
  • Mail: An MIDP email client based on the Mail4ME v1.0 library (Chapter 8).
  • WMATester: A simple messaging application that illustrates the use of Wireless Messaging API v1.0 (Chapter 9).
  • ContactManager: A mobile address book based on the PointBase v4.5 library (Chapter 11).
  • ContactManagerSync: A synchronized mobile address book based on the PointBase v4.5 library (Chapter 13).
  • AmazonExample: An kXML client for AmazonWeb services using both kDOM and XmlPull APIs (Chapter 15).
  • PeekAndPick: A RSS reader for mobile phones developed by Jonathan Knudsen (Chapter 15).
  • Google: A simple client for the Google Web services API. Both kSOAP v1.2 and v2.0 versions are available (Chapter 16).
  • SmartPhrases: An integrated Google search and online dictionary application (Chapter 16).
  • MapPoint AxisFacade: An Apache Axis facade for MapPoint v3.0 Web services (Chapter 18).
  • MapPoint AxisClient: Personal Profile and MIDP clients for the Map-Point facade (Chapter 18).
  • MobileSecurity: A collection of small applications that demonstrate the correct usage of cryptography APIs (Chapter 20).
  • SimpleDemo: A simple MIDP application to illustrate key concepts and APIs in MIDP programming (Appendix A).

Commercial Products

This book covers and compares more than 30 toolkits and libraries from more than a dozen third-party vendors. The descriptions and API usage examples of those products are intended to give the readers a solid technical ground to make informed comparisons and decisions. They also serve as realworld examples for API and tool designs. However, they do not substitute for the formal product documentation from the vendor. I strongly encourage interested readers to obtain the latest evaluation package and documentation from the vendor to investigate further.

Related Publications

Some of the materials used in this book are loosely based on articles I published previously on several online magazines.

  • The Sun Smart Ticket blueprint discussed in Chapter 5 is also covered in “End-to-End J2ME Application Development by Example,” published on the Sun Wireless Java Web site in June 2003.
  • The first half of Chapter 9 is also covered by “Mobile P2P messaging, Part 1,” published on IBM developerWorks in December 2002.
  • Examples in Part IV are adapted from “High-availability mobile applications,” published on JavaWorld in June 2003.
  • Chapter 16 is based on “Access Web services from wireless devices,” published on JavaWorld in August 2002.
  • The example in Chapter 18 is adapted from “Let the mobile games begin, Part 2,” published on JavaWorld in May 2003.
  • Part VI is loosely based on “Data security in mobile Java applications,” published on JavaWorld in December 2002.

Production Notes

This book is produced by the Latex typesetting system on a 1GHz Apple PowerBook running Mac OS X—the best consumer operating system ever produced. Microsoft Word is used for collaborative editing and reviewing. The figures are made with Microsoft Visio, OmniGra2e, GIMP, and the ImageMagick utilities.

The example applications are developed using a variety of development tools, including VI, JEdit, IntelliJ IDEA, and the WebSphere Studio Device Developer IDE. Apache Ant is used to build the applications. Mobile clients are tested on many vendor SDKs, including those from Sun Microsystems (the J2ME Wireless ToolKit), IBM (the WebSphere Micro Environment), Nokia, and Motorola. Real device testing was conducted on Motorola i95cl, Nokia 7210, Nokia 6800, and PocketPC Phone devices.

Read More Show Less

Introduction

About this Book

Target Audience

This book targets all mobile software developers and business decision makers. It focuses on end-to-end architectural patterns, best practices, key innovations, and real-world design approaches. For different readers, this book offers different benefits:

  • Managers and entrepreneurs: This book is a comprehensive guide to mobile enterprise applications and the Java 2 Micro Edition (J2ME). It covers the capabilities, limitations, common best practices, and commercial solutions of the state-of-the-art mobile Java technologies. It helps you decide which mobile Java profile and products are the best for your business.
  • Experienced mobile developers: This book skips the basic MIDP API tutorial materials and goes straight to the more advanced and more useful topics. It uses several complete sample applications to illustrate common architectural patterns and coding best practices in mobile enterprise applications. For developers who are looking for specific solutions (e.g., messaging, database, XML, and security), the technical discussions on leading third-party J2ME tools and libraries will prove useful. Those real-world innovations also serve as prime examples of how you should design and implement your own solutions for similar tasks.
  • Experienced Java developers: For experienced Java enterprise developers (J2EE developers), the move to mobility is about leveraging existing skills. This book walks through familiar design patterns and best practices and shows developers how to apply them in mobile applications. Lightweight mobile versions of enterprise Java APIs (such as JDBC, Java servlet,JMS, and Java Cryptography Extension) are discussed. Those are excellent examples of how to scale down enterprise solutions for mobility while still preserving core functionalities. With a few notes on mobile-specific issues, it is the fastest path to add mobility to existing enterprise infrastructure.

Prerequisites

To fully understand the technical content in this book, the readers should be familiar with the basic Java 2 Micro Edition, Mobile Information Device Profile (J2ME/MIDP) APIs and development tools. A quick MIDP programming guide is provided in Appendix A.

To run the end-to-end sample applications, you will need to deploy the serverside components to your own Java application server and run the clientside components on the desktop emulator or real devices. Please refer to the product manuals of your tools for step-by-step instructions.

Although serverside Java is not the focus of this book, familiarity with basic Java 2 Enterprise Edition (J2EE) concepts such as servlets, Java DataBase Connectivity (JDBC), Java Messaging Service (JMS), Java XML processing, and Enterprise JavaBean (EJB), will help you understand various topics in this book.

Contents

This book is divided into six parts:

  • Part I is the introductory material for mobile commerce, mobile enterprise applications, and J2ME. It covers the overall architecture, current status, and future roadmaps of J2ME.
  • Part II is the heart of this book. It presents several example applications to illustrate the smart client mobile application paradigm, common architectural patterns, and best practices. It covers how to run container-managed applications (e.g., servlets) on PDA devices. It also presents a useful advanced HTTP client library for J2ME clients.
  • Part III is about mobile messaging. In the mobile world, messaging clients are easy to use and fit into the mobile lifestyle. In the enterprise world, messaging is the best way to build loosely coupled applications that have guaranteed quality-of-service (QoS). This part of this book seeks to combine the best of the two worlds. It covers email and SMS-based end-to-end applications as well enterprise mobile messaging servers.
  • Part IV discusses mobile databases that are core to occasionally connected and synchronization-based applications. This part covers commercial and open source innovations for mobile databases, synchronization engines, and legacy database connectivity. Two sample database applications from PointBase are presented.
  • Part V covers how to integrate mobile clients into the enterprise Web services infrastructure. It discusses existing and emerging J2ME XML and SOAP toolkits, specifications and showcases several complete sample applications.
  • Part VI is all you need to know about J2ME mobile security solutions. It goes way beyond the simple connection-based end-to-end solutions such as the HTTPS. This part covers open source and commercial cryptography toolkits for J2ME. Due to the complexity of cryptography APIs, API tutorials for each important toolkit are provided.
  • There are two appendices to this book. One of them uses a simple end-to-end MIDP application to illustrate the whole development and deployment cycle. The other appendix introduces the IBM WebSphere Studio Device Developer IDE and provides undocumented instructions on how to install IBM J2ME runtimes on PocketPC devices.

Code Examples

This book uses complete example applications to demonstrate design patterns, best practices, and important API usages. Since this book discusses a wide range of technologies, innovations, and application scenarios, it is impractical to cover everything within a monolithic example. Instead, I decided to develop several small to midsize samples, each focusing on a particular topic. This approach allows the readers to partition the learning task and read one part of this book at a time.

The source code is presented in easy-to-digest segments that are relevant to the discussion text. Nonessential parts of the code (e.g., exception handling, importing packages) are often deliberately omitted from the listings for clarity. Hence, the printed listings are suffcient for understanding the ideas but are not directly runnable code.

  • iFeedBack: The grand prize winner of the NexTel/Motorola/Sun wireless application contest in 2002 (Chapter 3).
  • Echo: A GUI client and a service running in an OSGi clientside container (Chapter 4).
  • Pizza Order: An example included in the IBM Service Management Framework download. It demonstrates how to build smart clients with HTTP front ends (Chapter 4).
  • Smart Ticket: The Sun Wireless Blueprints application v2.0 early release code (Chapter 5).
  • HttpClient: The code for the advanced HTTP library we develop in this section (Chapter 6).
  • Mail: An MIDP email client based on the Mail4ME v1.0 library (Chapter 8).
  • WMATester: A simple messaging application that illustrates the use of Wireless Messaging API v1.0 (Chapter 9).
  • ContactManager: A mobile address book based on the PointBase v4.5 library (Chapter 11).
  • ContactManagerSync: A synchronized mobile address book based on the PointBase v4.5 library (Chapter 13).
  • AmazonExample: An kXML client for AmazonWeb services using both kDOM and XmlPull APIs (Chapter 15).
  • PeekAndPick: A RSS reader for mobile phones developed by Jonathan Knudsen (Chapter 15).
  • Google: A simple client for the Google Web services API. Both kSOAP v1.2 and v2.0 versions are available (Chapter 16).
  • SmartPhrases: An integrated Google search and online dictionary application (Chapter 16).
  • MapPoint AxisFacade: An Apache Axis facade for MapPoint v3.0 Web services (Chapter 18).
  • MapPoint AxisClient: Personal Profile and MIDP clients for the Map-Point facade (Chapter 18).
  • MobileSecurity: A collection of small applications that demonstrate the correct usage of cryptography APIs (Chapter 20).
  • SimpleDemo: A simple MIDP application to illustrate key concepts and APIs in MIDP programming (Appendix A).

Commercial Products

This book covers and compares more than 30 toolkits and libraries from more than a dozen third-party vendors. The descriptions and API usage examples of those products are intended to give the readers a solid technical ground to make informed comparisons and decisions. They also serve as realworld examples for API and tool designs. However, they do not substitute for the formal product documentation from the vendor. I strongly encourage interested readers to obtain the latest evaluation package and documentation from the vendor to investigate further.

Related Publications

Some of the materials used in this book are loosely based on articles I published previously on several online magazines.

  • The Sun Smart Ticket blueprint discussed in Chapter 5 is also covered in "End-to-End J2ME Application Development by Example," published on the Sun Wireless Java Web site in June 2003.
  • The first half of Chapter 9 is also covered by "Mobile P2P messaging, Part 1," published on IBM developerWorks in December 2002.
  • Examples in Part IV are adapted from "High-availability mobile applications," published on JavaWorld in June 2003.
  • Chapter 16 is based on "Access Web services from wireless devices," published on JavaWorld in August 2002.
  • The example in Chapter 18 is adapted from "Let the mobile games begin, Part 2," published on JavaWorld in May 2003.
  • Part VI is loosely based on "Data security in mobile Java applications," published on JavaWorld in December 2002.

Production Notes

This book is produced by the Latex typesetting system on a 1GHz Apple PowerBook running Mac OS X—the best consumer operating system ever produced. Microsoft Word is used for collaborative editing and reviewing. The figures are made with Microsoft Visio, OmniGra2e, GIMP, and the ImageMagick utilities.

The example applications are developed using a variety of development tools, including VI, JEdit, IntelliJ IDEA, and the WebSphere Studio Device Developer IDE. Apache Ant is used to build the applications. Mobile clients are tested on many vendor SDKs, including those from Sun Microsystems (the J2ME Wireless ToolKit), IBM (the WebSphere Micro Environment), Nokia, and Motorola. Real device testing was conducted on Motorola i95cl, Nokia 7210, Nokia 6800, and PocketPC Phone devices.

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted November 25, 2003

    Emphasis of J2ME is shifting to the server

    The substance of this book bodes well for the future of J2ME. As you may known, there have been several books on J2ME published in the last year. Like 'Java Development on PDAs' by Wilding-McBride. For the most part, these have been aimed at someone completely new to J2ME development. They have tended to focus on the client side, because this is more tangible and easier to explain. Here Yuan shifts the focus to the server side. He does have screen shots of some client UIs and related code. But the bulk of the discussion moves to server related issues, like how can you sync to a database, or how to send SMS messages in a network. You can consider the book to be focused on connectivity. Not at the lowest level of network connections, but at a higher conceptual level of hooking to existing applications. In part, this is because UI capabilities are much more limited compared to those on a full Java desktop or even a laptop. But it is mostly because the bigger value is in building logic on the server. Sound familiar? Mainstream java traced this route from applet development in 1996 to, a few years later, J2EE/XML on the server, when people realised that is where java is best suited. In about half the time, J2ME is walking down the same path. Yuan does not suggest this, but the impression I got from the book is that in a few more years, if J2ME is running on a server that is not as resource constained as its clients, then it may be replaced by J2EE. It seems that if server side J2ME is to prosper, it may be only on very physically limited servers.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)