|
|
|
|
|
|
|
|
|
|
|
l |
Java
Applications
|
|
|
|
|
Untrusted
code: possibly malicious or buggy
|
|
|
|
|
Multiple
applications on behalf of multiple users
|
|
|
l |
Efficient use
of resources
|
|
|
|
|
Resource-constrained
environments: small systems
|
|
(handhelds,
embedded systems)
|
|
|
|
|
Increased
scalability
|
|