BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Enterprise Architecture Content on InfoQ

  • Encrypting the Internet

    The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic: new CPU instructions to accelerate cryptographic operations; a novel implementation of the RSA algorithm to accelerate public key encryption; and using SMT to balance web server and cryptographic operations. Their approach, they claim, leads to significant cost savings.

  • Patterns from "SOA Design Patterns" by Thomas Erl, Part 2

    Patterns from Thomas Erl’s book, “SOA Design Patterns”. Today, we present Chapter 16, Service Governance Patterns, comprising a number of 8 patters. Compatible Change, Version Identification, Termination Notification, Service Refactoring, Service Decomposition, Proxy Capability, Decomposed Capability, and Distributed Capability.

  • Building FlightCaster's Frontends for the Web and Smartphones

    In part two of InfoQ's interview with the FlightCaster team, we discuss scaling Rails on Heroku, the problems of integrating data from multiple providers and mobile smartphone applications.

  • Getting started with AMQP and RabbitMQ

    Joern Barthel introduces the Advanced Message Queuing Protocol (AMQP), and illustrates it's useage with Ruby-based client and an EDA-style app. The open source RabbitMQ server is used on the backend (which is written in Erlang).

  • Book Review: Understanding SCA

    Four years after the publication of the first SCA specification draft, SCA remains a technology that is not well known or understood. Yet IBM and Oracle have built key product suites with it.Jim Marino and Michael Rowley, both co-authors of the SCA specifications, have published a practical guide to get started with SCA which covers the entire programming model from persistence to presentation.

  • Patterns from SOA Design Patterns by Thomas Erl, Part 1

    In this article we present 3 Inventory Governance Patterns from chapter 10 of the book SOA Design Patterns by Thomas Erl: Canonical Expression, Metadata Centralization, and Canonical Versioning. They are part of an 85 patterns catalog that serves enterprise architects and developers to find and build strong SOA solutions based on tested and proven SOA practices.

  • Orchestrating RESTful Services With Mule ESB And Groovy

    In this article, David Dossot, co-author of Mule in Action, examines the power of Mule RESTpack and Groovy in orchestrating RESTful services in the Mule messaging platform. The article detail the interactions for each of these steps and will consider what particular Mule moving parts and Groovy features we have used to achieve such an interaction.

  • RESTful HTTP in practice

    Gregor Roth overviews the basics of RESTful HTTP and discusses typical issues that developers face when they design RESTful HTTP applications, showing how to apply the REST architecture style in practice. Gregor describes commonly used approaches to name URIs, discusses how to interact with resources through the Uniform interface, when to use PUT or POST and how to support non-CRUD operations.

  • Book Review: Ladder to SOE

    A review of Michael Poulin's book, Ladder to SOE. Michael's book shows how to use the principles of service orientation to align IT with the business, and the business with market dynamics - creating the Service Oriented Enterprise. Becoming an SOE requires new habits of service-oriented thinking and Michael points these out along with techniques for effectively using them.

  • Supporting Advanced User Interaction Patterns in jBPM

    Boris Lublinsky discusses task management in the jBPM and then demonstrates how to implement four advanced user interaction patterns(4-eyes principle, nomination, escalation, and chained execution) using JBoss and the jBPM. He also notes the advantages and limitations of these patterns.

  • The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware

    Botnets are the latest scourge to hit the Internet and this article defines a botnet (a collection of distributed computers or systems that has been taken over by rogue software), examines the botnet life cycle, and presents several promising anti-botnet defense strategies including canary detectors, white lists, and malware traces.

  • Service Dynamics: the lazy man's way

    This article describes "the hardest topic in OSGi, how to deal with service dynamics," based on personal experience. Two factors, concurrency and direct service references, make the problem "fiendishly hard." An import and an export policy should form a comprehensive doctrine for dealing with service dynamics and the article explores two export policies with their corresponding doctrines.

BT