Wonderland Of SOA Governance

InfoQ, 2009 Introduction – Down to the Rabbit Hole One man, Harry W., once said “Alice does not fall down the hole. She sees the white rabbit, is intrigued, and willingly follows him down the deep rabbit hole.” Yes, the secret of Wonderland is about the meaning of the words: Harry has insisted that Alice ‘willingly follow[s]’ into …

Collecting Financial Market Data with Thread Pool

SOA & WOA, 2006 READS: 20,545 In this article I’ll share my experience in using the new features in Java 5 for solving an old industry problem, the problem of collecting constantly published financial data in reliable way. The business case example I’m going to discuss relates to the acquisition of some sort of market …

Service Versioning for SOA

SOA Magazine, 2006 READS: 37,497 Policy-based version control for SOA services SOA development practice isn’t much different from other software development practices except for design and maintenance. Multiple self-containing and aggregated services that interact with others have their own life-cycle and evolution. The loosely coupling model of SOA services significantly simplifies design but creates additional …

Assured Delivery of Audit Data With SOA and Web Services

J2EE Journal, 2006 Reliable messaging via Web services and JMS READS: 24,548 This article describes two techniques that may be used for assured delivery of important data, specifically, audit data, in distributed systems. We will review design that leads from assured to guaranteed delivery. This task gets more and more important in light of modern …

If a Resource Thread Hangs in the Portal

WebLogic Journal, 2006 READS: 26,326 This article describes a workaround design that allows a Portal to survive if its resource starts hanging request threads. Business TaskHow frequently does your Portal experience user requests hanging in the resource? Not frequently, I hope. However, if this happens and the resource continues hanging user requests, the Portal is …

Entitlement to Data

J2EE Journal, 2008 The requirements for different user-facing applications frequently say something like: “User has to see/read/be shown only funds/records/itineraries/policies he or she is entitled to.” Permissions in these cases usually depend on multiple factors related to the user profile (job role, locale, etc.), to the protected data (data origin, storage, approval status, etc.), or …

Dealing with Architectural Security

J2EE Journal   OCTOBER 15, 2005 10:30 AM EDT READS: 32,681        Application architects have heard about the increased importance of security, but in many cases they really don’t know how to approach this issue. In this article, I’ll share my experience and define a few basic steps and checkpoints for building application architecture with …

Finding Services with the Novell Trader

by MIKHAIL ZLOCHEVSKIY Software Engineer, Novell Trader Java Technologies Group 1 Dec 1997, Provo, USA Focuses on the basic query method for the lookup of distributed objects with the Novell trader. Explains the query parameters and how to successfully locate objects registered with the Trader. Introduction Simple Client Code for Novell Trader TraderQuery Class Methods …

Why Managers Admire Ambiguity

Any Architecture is based on answers to five core question: WHY, WHAT, WHO/WHOM-FOR, WHERE, and WHEN. Any architecture comprises models and structures that detail the answers. If any answer to aforementioned questions is vague it becomes apparent immediately because it brings uncertainty and can lead to multiple versions of architecture with no criteria for comparison. …

We do not need SOA 3.0… we never needed SOA 2.0 as well

This BLOG is a reaction to the post by Scott Andersen, IASA Fellow, published on 29 Oct., 2012, at IASA’s Thoughts on Enterprise and Technology Architecture. In the BLOG, Scott points to new fantastic gadgets – Meta-Watch and BlackBerry connected watch – that are on their way to the consumers and expected by the end of this …