BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Architecture & Design Content on InfoQ

  • Comparing Virtual Machine Interfaces

    Andrew John Hughes, one of the OpenJDK Innovators' Challenge finalists, has posted a multi-part comparison of the interface between OpenJDK, GNU Classpath, and their respective virtual machine implementations.

  • Presentation: Mock Roles Not Object States

    In this presentation filmed during QCon London 2007, Nat Pryce and Steve Freeman talk about TDD using Mock Objects. In their opinion, Mock Objects improves the software design and makes the code more easier to maintain and adapt to changing requirements.

  • Security Vulnerabilities in Safe Level, WEBrick, Dl, DNS lookup

    A few security vulnerabilities were discovered in Ruby 1.8.5 to 1.8.7 and 1.9.x. The vulnerabilities are found with safe levels, WEBrick has a DoS vulnerability in a particular regular expression, shared library API dl doesn't check taintedness and resolv.rb has a problem with DNS spoofing.

  • The Challenges in Java Benchmarking

    Brent Boyer posted an article on IBM's DeveloperWorks that discusses the challenges in Java benchmarking and introduces a Java benchmarking framework.

  • Using Open Source in your Business: Myths and Clarifications

    A white paper “10 Myths About Running Open Source Software in Your Business” was released by ActiveState. It promotes rational approach to open source software and refutes some common misconceptions about its quality, its usage and its place in today’s industry. The authors believe that open source adoption is inevitable but they advocate for a more structured approach to its implementation.

  • Open source workflow engines compared: jBPM, OpenWFE and Enhydra Shark

    A new report looks at how open source workflow engines jBPM, OpenWFE and Enhydra Shark compare in support of standard Workflow Patterns, including how they stack up against their closed source alternatives Staffware, WebSphere MQ and Oracle BPEL PM.

  • Prioritizing (the Backlog) For Profit

    Having difficulty prioritizing the backlog? Luke Hohmann has described a method to make quantitative decisions about which backlog items should be considered first. In addition to the usual attributes such as implementation effort, Luke suggested adding attributes to measure stakeholders needs, strategic alignment and to ask whether the item is driving profit.

  • Robert Bell on Java and Silverlight Interop

    Robert Bell, Microsoft Solution Architect, introduces interoperability scenarios for using Silverlight from Java and provides architectural guidance using sample code snippets.

  • Gartner: Emerging SOA Patterns in the Enterprise

    Gartner analysts have observed increased adoption of the following 5 SOA design patterns * Multi-channel Applications * Composite Applications * Business Process Orchestration * Service Oriented Enterprise * Federated SOA

  • Improving Web Service Security: Guidance for WCF

    Microsoft patterns and practices group has released a WCF Security Guide. The 689 pages compendium offers a general introduction to Web Service security fundamentals as well as in-depth knowledge about several security threads and appropriate counter-measures.

  • XHTML 2 and HTML 5 continue to diverge

    These two specs have quite different purposes and solve two distinct problems. XHTML 2 is document-centric. HTML 5 is targeted at sites that aren't best represented by a document. Both are supported by the W3C. Is another standards war brewing?

  • Is AMQP on the way to providing real business interoperability?

    AMQP came from inside of JPMorgan, thanks to John O'Hara. But his vision was bigger than just a new way to do things internally. The standard and open source technologies around it have been gaining momentum. Jeff Gould and others shed some light on where AMQP came from, who is driving it, and where it might be going.

  • Enter the Cloud with Caution

    Cloud computing seems inevitable, simply because of its business case. Prof. Lewis wrote an article where he recommends caution and provides a series of questions that anyone should answer before using capabilities from the Cloud. Are you using Cloud Services in the Enterprise? What are the benefits and the drawbacks?

  • Presentation: Secure Programming with Static Analysis

    Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis can uncover the kinds of errors that lead directly to vulnerabilities and in this talk, Brian Chess frames the software security problem and shows how static analysis is part of the solution.

  • Compiled IronPython

    Shri Borde discuses the status of IronPython 2 and how it works with compiled code. He focuses on issues involving reflection and CLS compliance.

BT