InfoQ Homepage SOA Platforms Content on InfoQ
-
Approximate Queries on WSO2 Stream Processor: Use of Approximation Algorithms in an Applied Setting
In this article, we describe an example real world application of API monitoring which benefits from using approximate stream processing. We developed the application on top of WSO2 Stream Processor as Siddhi extension. Siddhi is the complex event processing library which acts as the event processing engine of WSO2 Stream Processor.
-
Choosing the Right ESB for Your Integration Needs
Kai Wähner explains the differences between an integration framework, an ESB and an integration suite, following with advice for selecting the right one from existing commercial and open source solutions.
-
Cloud Computing Realigns Role of Service Oriented Architecture
From its inception Service Oriented Architecture (SOA) has been a source of dissension among enterprise, solution and application architects. Now cloud computing is changing the conversation.
-
The Top Five Challenges of Building Software Platforms in the Agile World
When scaling Agile to the enterprise new concerns arise that require revisiting the values and practices of Agile software development. One such concern relates to a common strategy to achieve reuse at the enterprise level - building software platforms. This article lists the top five challenges that an Agile organization should expect to face when deciding to adopt a software platform strategy.
-
Interview With Paul Fremantle On WSO2 Stratos
WSO2 recently released Stratos an Open Source Cloud Computing Platform for Enterprise Application Development. WSO2 Stratos is built on top of and extends WSO2 Carbon an OSGi-compliant middleware. InfoQ interviewed Paul Fremantle CTO of WSO2 to talk about the product offering and provide insights into the roadmap and development of Stratos.
-
Book Excerpt and Interview: Tuscany SCA in Action
A new "Tuscany SCA in Action" book by Simon Laws, Mark Combellack, Raymond Feng, Haleh Mahbod and Simon Nash provides a simple step-by-step guide on how to develop applications leveraging SCA and Apache Tuscany.
-
REST and SOAP: When Should I Use Each (or Both)?
Web developers today have a myriad of technologies they can choose from; for example, the two approaches for interfacing to the web with web services, namely SOAP and REST. Both approaches work, both have advantages and disadvantages to interfacing to web services, but it is up to the web developer to make the decision of which approach may be best for each particular case.
-
mySOA: Agile, Governed and Sustainable
William El Kaim, Lead Architect at Carlson Wagonlit, provides a rare glimpse at all the choices, and the rationale behind them, he and his colleagues have made while building their organization's Service Oriented Architecture. How does your SOA compare? What will be the major evolutions in the next few years? How will the Cloud impact current SOAs?
-
Book Excerpt and Interview: Dynamic SOA and BPM: Best Practices for Business Process Management and SOA Agility
Boris Lublinsky interviews Marc Fiammante as part of a review of Marc' new book, Dynamic SOA and BPM: Best Practices for Business Process Management and SOA Agility. The book is based on many years of practical experience obtained during dozens of enterprise SOA implementations and covers major steps of such implementations
-
Enhanced Detection of Malware
This article, from Intel, discusses significant new threats to host agents, outlines a generic architecture for malware detection, based on enhanced cloud computing, describes how Intel platform technologies can be used to enhance computing solutions, and ends with a threat analysis of the approaches presented. Malware that masks its presence from traditional security agents is the article focus.
-
Encrypting the Internet
The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic: new CPU instructions to accelerate cryptographic operations; a novel implementation of the RSA algorithm to accelerate public key encryption; and using SMT to balance web server and cryptographic operations. Their approach, they claim, leads to significant cost savings.
-
The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware
Botnets are the latest scourge to hit the Internet and this article defines a botnet (a collection of distributed computers or systems that has been taken over by rogue software), examines the botnet life cycle, and presents several promising anti-botnet defense strategies including canary detectors, white lists, and malware traces.