THIS IS A TEST INSTANCE. ALL YOUR CHANGES WILL BE LOST!!!!
Unable to render {include} The included page could not be found.
Java SCA Documentation
The following guides are available for SCA Java.
- User Guide
This introduces you to SCA concepts and describes the various features of the Apache Tuscany Java SCA runtime.- Getting Started with Tuscany using a Tuscany Distribution from the Command Line
This is a quick getting started guide that shows you how to download the latest release, run the calculator sample and then how to use the calculator sample project as a basis for you own projects - Getting Started with Tuscany using a Tuscany Distribution In Eclipse
This is a quick getting started guide that go trough the steps of building the store scenario using the Tuscany SCA distribution manually installed into Eclipse - Getting Started with Tuscany using the Tuscany Eclipse plugin
This is a quick getting started guide that go trough the steps of building the store scenario using the Tuscany Eclipse plugin. - First Steps - Building your first web services using Tuscany
This is a quick guide that go trough the steps of exposing your pojo component as web services.
- Getting Started with Tuscany using a Tuscany Distribution from the Command Line
- Developer Guide
If you would like to contribute to the project, this guide explains how to build Java SCA and how to contribute code back to the project.- Architecture Guide
This guide provides a high level view of SCA Java architecture. - Extension Development Guide
This guide explains how to develop code that extends Tuscany SCA Java. - Data binding guide
This guide gives an overview of the Tuscany Data Binding framework. - Security aware programming guide
This guide shows the Tuscany developer how to write core and extension code that correctly employs the Java security features - Running Tuscany with Java 2 Security Enabled
This guide describes how to run Apache Tuscany and SCA applications in various environments while enabling Java 2 security and ensuring the application is running in a secured environment.
- Architecture Guide