InfoQ Homepage Architecture & Design Content on InfoQ
-
Interview: Jerry Cuomo Discusses Virtualization, Cloud Computing and WebSphere Virtual Enterprise
In this interview, Jerry Cuomo talks about Virtualization and Cloud Computing and what IBM is doing with WebSphere Virtual Enterprise to help virtualize middleware and application stack. He also explains the progression of virtualization using virtual servers, collection of servers, and virtual clusters. Jerry mentions that next release of WebSphere Version 7 will have a virtual appliance option.
-
Interview: Gregor Hohpe on Conversation Patterns and Cloud Computing
In this interview, recorded at QCon London, Google architect Gregor Hohpe talks to Stefan Tilkov about his new work on conversation patterns, building upon his earlier work on enterprise integration patterns. Gregor also talks about the similarities and differences in several approaches to cloud computing.
-
John Heintz on Adding Behavior to Java Annotations
Custom annotations are a great way to add common reusable behavior to Java applications. John Heintz from New Aspects discussed at the recent No Fluff Just Stuff (NFJS) Java Symposium, the design techniques for adding behavior to Java Annotations.
-
Comparing Virtual Machine Interfaces
Andrew John Hughes, one of the OpenJDK Innovators' Challenge finalists, has posted a multi-part comparison of the interface between OpenJDK, GNU Classpath, and their respective virtual machine implementations.
-
Presentation: Mock Roles Not Object States
In this presentation filmed during QCon London 2007, Nat Pryce and Steve Freeman talk about TDD using Mock Objects. In their opinion, Mock Objects improves the software design and makes the code more easier to maintain and adapt to changing requirements.
-
Security Vulnerabilities in Safe Level, WEBrick, Dl, DNS lookup
A few security vulnerabilities were discovered in Ruby 1.8.5 to 1.8.7 and 1.9.x. The vulnerabilities are found with safe levels, WEBrick has a DoS vulnerability in a particular regular expression, shared library API dl doesn't check taintedness and resolv.rb has a problem with DNS spoofing.
-
The Challenges in Java Benchmarking
Brent Boyer posted an article on IBM's DeveloperWorks that discusses the challenges in Java benchmarking and introduces a Java benchmarking framework.
-
Using Open Source in your Business: Myths and Clarifications
A white paper “10 Myths About Running Open Source Software in Your Business” was released by ActiveState. It promotes rational approach to open source software and refutes some common misconceptions about its quality, its usage and its place in today’s industry. The authors believe that open source adoption is inevitable but they advocate for a more structured approach to its implementation.
-
Open source workflow engines compared: jBPM, OpenWFE and Enhydra Shark
A new report looks at how open source workflow engines jBPM, OpenWFE and Enhydra Shark compare in support of standard Workflow Patterns, including how they stack up against their closed source alternatives Staffware, WebSphere MQ and Oracle BPEL PM.
-
Prioritizing (the Backlog) For Profit
Having difficulty prioritizing the backlog? Luke Hohmann has described a method to make quantitative decisions about which backlog items should be considered first. In addition to the usual attributes such as implementation effort, Luke suggested adding attributes to measure stakeholders needs, strategic alignment and to ask whether the item is driving profit.
-
Robert Bell on Java and Silverlight Interop
Robert Bell, Microsoft Solution Architect, introduces interoperability scenarios for using Silverlight from Java and provides architectural guidance using sample code snippets.
-
Gartner: Emerging SOA Patterns in the Enterprise
Gartner analysts have observed increased adoption of the following 5 SOA design patterns * Multi-channel Applications * Composite Applications * Business Process Orchestration * Service Oriented Enterprise * Federated SOA
-
Improving Web Service Security: Guidance for WCF
Microsoft patterns and practices group has released a WCF Security Guide. The 689 pages compendium offers a general introduction to Web Service security fundamentals as well as in-depth knowledge about several security threads and appropriate counter-measures.
-
XHTML 2 and HTML 5 continue to diverge
These two specs have quite different purposes and solve two distinct problems. XHTML 2 is document-centric. HTML 5 is targeted at sites that aren't best represented by a document. Both are supported by the W3C. Is another standards war brewing?
-
Is AMQP on the way to providing real business interoperability?
AMQP came from inside of JPMorgan, thanks to John O'Hara. But his vision was bigger than just a new way to do things internally. The standard and open source technologies around it have been gaining momentum. Jeff Gould and others shed some light on where AMQP came from, who is driving it, and where it might be going.