Wireless Programming with J2me: Cracking the Code
Think of J2ME as a tiny version of Java specifically for mobile devices -- perfect for bringing powerful, robust applications to mobile phone, pagers, PDAs, and other handhelds. Writing applications for handheld and mobile devices is different than regular Java programming. Mobile developers have to deal with limited screen real estate, bandwidth and computing power. This book covers six wireless applications complete with Flow Diagrams and line-by-line code description. It covers all of J2ME including CDC,CLDC and MIDP with an emphasis on practical code.
Table of Contents
Chapter 1: An Overview of J2ME.
Chapter 2: Programming Techniques for J2ME.
Chapter 3: CLDC API and Reference Implementation.
Chapter 4: MIDP-MIDlet Implementation with Case Studies.
Chapter 5: Handling and Parsing XML in J2ME.
Chapter 6: Project 1: Online Testing Engine.
Chapter 7: Project 2: Online Ordering System.
Chapter 8: Project 3: MP3 Player for Pocket PC.
Chapter 9: Project 4 : Peer-to-Peer Search Application.
Chapter 10: Project 5: Mobile Web Services.
Chapter 11: Project 6: Target Practice Game.
Chapter 12: Converting J2SE Applications to J2ME.
Appendix A: About the CD-ROM.
What's on the CD.
End User License Agreement.
Sun Microsystems, Inc. Binary Code License Agreement.
License Agreement: Forte for Java, Release 2.0 Community Edition for All Platforms.
Amendment No. 1 to Binary License and Redistribution Agreement.
Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTOS Web Applications DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTLead Software EngineerSA
- FTTechnical Business AnalystNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
Integrated Computing Platforms, such as EMC VSPEX RAs, provide a solution by eliminating the time (and cost) of designing, testing, and engineering integrated environments with components built independently of one ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Malware roundup: Tiffany's, Tibetans, iOs are targeted
- Schnucks wants federal court to handle data breach lawsuit
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- CITRIX SYNERGY ’13: Qureshi addresses the trend of ‘mojility’
- CITRIX SYNERGY ’13: IT needs to be empowered, says Sallam
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia