ADS BY GOOGLE

Vol: 1 Iss: 2

Read Back Issues

Within today's vast Web infrastructure businesses run distributed systems. These distributed systems serve an array of content, more often than not in a web descriptive form such as HTML. The challenge for client-side Java applications is to display this rich Web content in a meaningfu...
There must be 50 ways to Web services-enable a legacy system, and at least 500 ways for consultants to make money off companies attempting to do so. While I don't mean to knock the consulting profession (I am one myself, after all), there are some things companies should be able to do ...
Steve Jones is the managing director for engineering and support at PointBase. He is responsible for PointBase product development, which includes an innovative family of 100% Java, SQL Relational Database Management (RDBMS), and Synchronization products that are ideal for embedding in...
It's a fact of life: different developers like to write code in different styles. Show me code written by 10 different developers, and I will show you 10 different coding styles. So why try to develop and enforce coding standards? There are two core reasons: Adopting a set of coding st...
Imagine sitting at a computer and controlling the physical operations of a building that's located miles away. Like something out of a James Bond movie, you can unlock/lock and open/close doors, adjust the temperature in the building control the building's security, and even adjust ai...
Rushed to deployment under the mantra of 'now or never' in the late 1990s, many corporate Web sites have received major makeovers in the last few years. The driving force behind these efforts has been the increased use of the Web to create an active channel of communication with consum...
Understanding the potential benefits and risks of information technology (IT) - particularly information security - has become a mission-critical imperative for today's business leaders. Cyber-attacks, computer abuse, privacy issues, identity theft, and fraud have not only raised the l...
Utility computing (UC) is a concept in which storage hardware resources are pooled within a shared infrastructure of storage management and made available as needed in a pay-as-you-go model. Ultimately, the end goal that UC promises is to help companies more efficiently manage the reso...
In today's IT environment, complex data represents an ever-increasing proportion of enterprise data. Companies are struggling to transform and integrate complex data and often turn to costly IT development. Business drivers, such as customer self-service, regulatory compliance (e.g., S...
Open source has gained broad acceptance among enterprises as a reliable source of infrastructure software. The Linux operating system and the Apache Web server are only two examples of open source technologies that are depended upon to power the world's mission-critical servers and web...
Challenges of Building Web Pages from XML Data in XSL Technology Developing professional Web pages based on XML data using XSL has historically been a time-consuming and expensive task due to the following challenges: Basic knowledge of XSL is insufficient for implementing fully-featur...

ADS BY GOOGLE