NonStop Server for Java 5.1 Programmer's Reference
..
job.print(doc, null);
..
..
Dynamic Saveabend File Creation
The Dynamic Saveabend File Creation feature allows you to create a saveabend file of a running Java program,
without abending (aborting) the Java program, by issuing a signal to the process. This feature allows the Java
program to continue after the abend file is created. The time taken to create the abend file, that is, application pause
time is low (measurable in milliseconds).
The saveabend file enables you to analyze any observed Java runtime problems, such as observed high memory
consumption, low responsiveness, without impacting the running Java process.
To create a saveabend file in the working directory of the process, complete the following steps:
Export DUMP_CORE=1.1.
Start the Java application.2.
Press Ctrl-break while the process is running.3.
Creating Child Process Using the
-Dnsk.java.fastExec=true Option
For applications that use the Runtime.exec method to create a child process, NSJ 5.1 and later versions provide
a faster method to create a child process using the -Dnsk.java.fastExec=true option. The
Runtime.exec method forks a child process and overlays its image with the new executable. Forking the child
process duplicates the parent process image, which is discarded when the exec is executed. The
-Dnsk.java.fastExec=true option builds the child process image from the executable; it does not inherit
the parent process image, thereby reducing the time required to create a child process.
Java Authentication and Authorization
Service (JAAS)
The Java Authentication and Authorization Service (JAAS) is integrated into the NonStop Server for Java 5.1.
JAAS augments the core Java 2 platform with facilities to authenticate and enforce access controls upon users.
JAAS, also, has the ability to enforce access controls based on who runs the code.
JAAS implements a Java version of the standard Pluggable Authentication Module (PAM) framework. This
pluggability permits applications to remain independent from underlying authentication technologies. New or
updated authentication technologies can be plugged in without requiring modifications to the application itself.