BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Architecture & Design Content on InfoQ

  • Interview: Jerry Cuomo Discusses Virtualization, Cloud Computing and WebSphere Virtual Enterprise

    In this interview, Jerry Cuomo talks about Virtualization and Cloud Computing and what IBM is doing with WebSphere Virtual Enterprise to help virtualize middleware and application stack. He also explains the progression of virtualization using virtual servers, collection of servers, and virtual clusters. Jerry mentions that next release of WebSphere Version 7 will have a virtual appliance option.

  • Interview: Gregor Hohpe on Conversation Patterns and Cloud Computing

    In this interview, recorded at QCon London, Google architect Gregor Hohpe talks to Stefan Tilkov about his new work on conversation patterns, building upon his earlier work on enterprise integration patterns. Gregor also talks about the similarities and differences in several approaches to cloud computing.

  • John Heintz on Adding Behavior to Java Annotations

    Custom annotations are a great way to add common reusable behavior to Java applications. John Heintz from New Aspects discussed at the recent No Fluff Just Stuff (NFJS) Java Symposium, the design techniques for adding behavior to Java Annotations.

  • Comparing Virtual Machine Interfaces

    Andrew John Hughes, one of the OpenJDK Innovators' Challenge finalists, has posted a multi-part comparison of the interface between OpenJDK, GNU Classpath, and their respective virtual machine implementations.

  • Presentation: Mock Roles Not Object States

    In this presentation filmed during QCon London 2007, Nat Pryce and Steve Freeman talk about TDD using Mock Objects. In their opinion, Mock Objects improves the software design and makes the code more easier to maintain and adapt to changing requirements.

  • Security Vulnerabilities in Safe Level, WEBrick, Dl, DNS lookup

    A few security vulnerabilities were discovered in Ruby 1.8.5 to 1.8.7 and 1.9.x. The vulnerabilities are found with safe levels, WEBrick has a DoS vulnerability in a particular regular expression, shared library API dl doesn't check taintedness and resolv.rb has a problem with DNS spoofing.

  • The Challenges in Java Benchmarking

    Brent Boyer posted an article on IBM's DeveloperWorks that discusses the challenges in Java benchmarking and introduces a Java benchmarking framework.

  • Using Open Source in your Business: Myths and Clarifications

    A white paper “10 Myths About Running Open Source Software in Your Business” was released by ActiveState. It promotes rational approach to open source software and refutes some common misconceptions about its quality, its usage and its place in today’s industry. The authors believe that open source adoption is inevitable but they advocate for a more structured approach to its implementation.

  • Open source workflow engines compared: jBPM, OpenWFE and Enhydra Shark

    A new report looks at how open source workflow engines jBPM, OpenWFE and Enhydra Shark compare in support of standard Workflow Patterns, including how they stack up against their closed source alternatives Staffware, WebSphere MQ and Oracle BPEL PM.

  • Prioritizing (the Backlog) For Profit

    Having difficulty prioritizing the backlog? Luke Hohmann has described a method to make quantitative decisions about which backlog items should be considered first. In addition to the usual attributes such as implementation effort, Luke suggested adding attributes to measure stakeholders needs, strategic alignment and to ask whether the item is driving profit.

  • Robert Bell on Java and Silverlight Interop

    Robert Bell, Microsoft Solution Architect, introduces interoperability scenarios for using Silverlight from Java and provides architectural guidance using sample code snippets.

  • Gartner: Emerging SOA Patterns in the Enterprise

    Gartner analysts have observed increased adoption of the following 5 SOA design patterns * Multi-channel Applications * Composite Applications * Business Process Orchestration * Service Oriented Enterprise * Federated SOA

  • Improving Web Service Security: Guidance for WCF

    Microsoft patterns and practices group has released a WCF Security Guide. The 689 pages compendium offers a general introduction to Web Service security fundamentals as well as in-depth knowledge about several security threads and appropriate counter-measures.

  • XHTML 2 and HTML 5 continue to diverge

    These two specs have quite different purposes and solve two distinct problems. XHTML 2 is document-centric. HTML 5 is targeted at sites that aren't best represented by a document. Both are supported by the W3C. Is another standards war brewing?

  • Is AMQP on the way to providing real business interoperability?

    AMQP came from inside of JPMorgan, thanks to John O'Hara. But his vision was bigger than just a new way to do things internally. The standard and open source technologies around it have been gaining momentum. Jeff Gould and others shed some light on where AMQP came from, who is driving it, and where it might be going.

BT