Data management..........................................................................................................................................................................
Access to memory...........................................................................................................................................................................
Persistent data storage..................................................................................................................................................................
Create a persistent data store...............................................................................................................................................
Store persistent data..............................................................................................................................................................
Retrieve persistent data.........................................................................................................................................................
Remove persistent data.........................................................................................................................................................
MIDP record storage......................................................................................................................................................................
Create an MIDP record store................................................................................................................................................
Add a record to a record store..............................................................................................................................................
Collections.......................................................................................................................................................................................
Runtime storage..............................................................................................................................................................................
Retrieve the runtime store.....................................................................................................................................................
3 Creating connections..................................................................................................................................................................
Network gateways..........................................................................................................................................................................
Connections.....................................................................................................................................................................................
Use HTTP authentication......................................................................................................................................................
Use an HTTPS connection.....................................................................................................................................................
Use a socket connection........................................................................................................................................................
Use a datagram connection..................................................................................................................................................
45
45
46
46
46
47
47
48
48
48
48
48
49
49
50
50
51
51
51
52
52
52
53
54
54
54
54
54
55
55
56
57
58
60