Sean McGrath, CTO, Propylon
"Your problems lie in two fundamental concepts that need to be central to how you think about business processes in a distributed world - (a) event driven execution and (b) temporal decoupling."Amen!
"Your problems lie in two fundamental concepts that need to be central to how you think about business processes in a distributed world - (a) event driven execution and (b) temporal decoupling."Amen!
There's a terrible sense of dread filtering across America at the moment and it's not simply because of the continuing fear of terrorism and the fact that the nation is at war. It's more frightening than that. It grows out of the suspicion that we all may be passengers in a vehicle that has made a radically wrong turn and is barreling along a dark road, with its headlights off and with someone behind the wheel who may not know how to drive.
"'To announce that there must be no criticism of the president ... right or wrong, is not only unpatriotic and servile, but is morally treasonable to the American public.' -- Teddy Roosevelt, 1918"Damn straight! I am sooo sick of the administration's lackeys (right-wing pundits), and certain of its principle members (e.g. Cheney), suggesting that it is either unpatriotic or counter-productive to question its (in)actions and/or policies. How can we hope to spread American democracy and ideals to the likes of Iraq when those who have taken it upon themselves to impose that freedom and democracy (by force) have such disregard and/or ignorance of those very ideals?
"There will probably come a day when security is seamless, invisible and automatic, but that day isn't here yet"That day will never come. Security is not just about technology and writing more secure software, although the software industry can do much to improve in this regard. Cybersecurity cannot be completely automated. Effective security begins with management policies and a real commitment on the part of management to enforcing those policies. Effective security begins with a risk assessment to ascertain the value of each information asset (some of which may be intangible), identification of the risks should the asset become compromised, and identification of appropriate countermeasures to mitigate the identified risks. As there is a cost associated with the deployment of countermeasures, this must be weighed against the value of the asset in determining which countermeasures to apply in a given situation.
"But I wonder why, if there are differing ideas on how to solve this problem, and there is a standards organization at work, the differing ideas aren’t being hashed out in the standards organization."Maybe he should read his own blog to find the answer;-)
"When committees get together either in an informal cabal or an official standards process, and go about inventing new technologies, the results are usually pretty bad. ODA (Never heard of it? Exactly); OSI Networking; W3C XML Schemas. The list goes on and on."I've cited his post before and I agreed then, and still believe, that a standards group is no place to do development. Successful standards are those where the technology is proven and is well along the way to broad adoption before a committee is formed to produce a standard.
"Actual spot prices for gasoline between early April and the first week of May increased by 20 cents per gallon or more (depending on the region), indicating that factors in addition to higher crude oil prices are now playing an important role in setting gasoline prices. Demand increases and lower-than-expected imports have put strong pressure on domestic producers and gasoline stocks to help meet the incremental demand for gasoline, contributing to higher production and acquisition costs. "It's actually an increase of $0.25/gal here, now averaging over $2.00/gal in Mass. for the first time ever. No reason is given for the "lower-than-expected imports". Was someone asleep at the switch and forgot to order crude for May? OPEC production was actually exceeded production quotas by 2.3 million barrels a day according to the same report.
Today when integrating various bits and types of software, combining programs written using different languages and/or middleware systems, you have to know what it is you're invoking and figure out how to structure your data into the arguments associated with the particular method or program name. I don't think that's very productive, at least not for those integrating services into appliations and flows.+1!
Senator John McCain, of Arizona, said, “If this is true, it certainly increases the dimension of this issue and deserves significant scrutiny. I will do all possible to get to the bottom of this, and all other allegations.”This reads like a Clancey novel and explains why it is that a couple of bumpkins fresh out of High School knew that sexual humiliation would be an effective interrogation "enabler".
"go with the W3C endorsed stuff and we'll get convergence down the road."Except that WS-MD isn't endorsed by the W3C. It is a Member Submission. From the W3C Member Submission page:
The acknowledgment of a Submission request does not imply that any action will be taken by W3C. It does not imply an endorsement by W3C, including the W3C Team, any of the Members, or any of the Host Institutes. It merely records publicly that the Submission request has been made by the submitting Member. The specification may not be referred to as "work in process" of the W3C.Emphasis mine.
"Matters got so frustrating that in May and October 2003, eight senior JAG officers took the rare step of going outside the chain of command to meet secretly with the New York City Bar Association, warning of a "disaster waiting to happen".I suppose now the administration will respond that these JAG officers are just a bunch of disgruntled employees?
"They felt that there had been a conscious effort to create an atmosphere of legal ambiguity surrounding these detention facilities, and that it had been done to give interrogators the broadest possible latitude in their conduct of operations," Scott Horton, former chair of the New York City Bar Association's Committee on International Human Rights, told ABCNEWS. Horton's meeting with the JAG officers was first reported by Salon.com. "
Standards, however, bear watching, and Rhys Jenkins described why WSCI (Web Services Choreography Interface standard), originated by IBM and Microsoft, enjoys an upper hand over a rival backed by BEA Systems, Intalio, SAP and Sun Microsystems.Bzzzt. I don't know whether the article's author is confused about the origins of WSCI or whether Rhys Jenkins is the one who is confused. Clearly, neither the author nor his editor bothered to do any fact checking. WSCI was authored by BEA, Intalio, SAP and Sun not by IBM and Microsoft. I believe that the "rival" mentioned here is BPEL which had its origins with IBM and Microsoft and which has the broad support of the industry as the emerging standard for orchestration.
“Don’t wait for the standards battle to finish; pick one, because you can always generate new WSDL later that will pick up standards you do choose to go with,” he advised. That’s done via WSIF (Web Services Invocation Framework), which lets programmers interact with Web services through WSDL descriptions, allowing switches among SOAP, RMI, IIOP and EJBs.Just "pick one"? Does it matter which one? Is anyone really that naive?
People started to build a lot of software using SwA, and as a result had to model applications as an XML message + attachments.Of course, I don't believe for a moment that they had to model their applications in this manner; but indeed many did which is why we are where we are today. I don't consider this a failing of SOAP Messages with Attachments; I consider it a failure of those who simply refuse to model their applications as being on the Web.
<html>
<head>
<title>Foo</title>
</head>
<body>
<img src="http://example.org/images/img.jpeg"/>
</body>
</html>
The big problem that Microsoft faces in this space is that developers tend to want all their tools to come from a single vendor.Bzzzzt.
0 Comments:
Post a Comment
<< Home