Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in Mico


Book Description

The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols. Griffin, Robert I. and Lopez, Isaac (Technical Monitor) Glenn Research Center NASA/CR-2002-211979, NAS 1.26:211979, E-13648




Mastering Enterprise JavaBeans


Book Description

Includes more than 30 percent revised material and five new chapters, covering the new 2.1 features such as EJB Timer Service and JMS as well as the latest open source Java solutions The book was developed as part of TheServerSide.com online EJB community, ensuring a built-in audience Demonstrates how to build an EJB system, program with EJB, adopt best practices, and harness advanced EJB concepts and techniques, including transactions, persistence, clustering, integration, and performance optimization Offers practical guidance on when not to use EJB and how to use simpler, less costly open source technologies in place of or in conjunction with EJB




Embedded System Design


Book Description

Until the late 1980s, information processing was associated with large mainframe computers and huge tape drives. During the 1990s, this trend shifted toward information processing with personal computers, or PCs. The trend toward miniaturization continues and in the future the majority of information processing systems will be small mobile computers, many of which will be embedded into larger products and interfaced to the physical environment. Hence, these kinds of systems are called embedded systems. Embedded systems together with their physical environment are called cyber-physical systems. Examples include systems such as transportation and fabrication equipment. It is expected that the total market volume of embedded systems will be significantly larger than that of traditional information processing systems such as PCs and mainframes. Embedded systems share a number of common characteristics. For example, they must be dependable, efficient, meet real-time constraints and require customized user interfaces (instead of generic keyboard and mouse interfaces). Therefore, it makes sense to consider common principles of embedded system design. Embedded System Design starts with an introduction into the area and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, like real-time operating systems. The book also discusses evaluation and validation techniques for embedded systems. Furthermore, the book presents an overview of techniques for mapping applications to execution platforms. Due to the importance of resource efficiency, the book also contains a selected set of optimization techniques for embedded systems, including special compilation techniques. The book closes with a brief survey on testing. Embedded System Design can be used as a text book for courses on embedded systems and as a source which provides pointers to relevant material in the area for PhD students and teachers. It assumes a basic knowledge of information processing hardware and software. Courseware related to this book is available at http://ls12-www.cs.tu-dortmund.de/~marwedel.




Enterprise Service Bus


Book Description

This text provides an architectural overview of the Enterprise Service Bus, showing how it can bring the task of integration of enterprise application and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of everyday IT professionals.







Patterns for E-business


Book Description

Get an inside look at how successful businesses build their e-business architectures. In this book, four IBM e-business experts capture years of experience into easy-to-follow guidelines. Deliberately focusing on Business patterns, Integration patterns, and Application patterns, the authors share with you proven architectural patterns that can help get you up and running quickly, while at the same time reducing your risks. Because today's economy demands that e-business initiatives emphasize profitability and return on investment, the authors also offer guidance on methods to minimize cost, yet ensure quality. Many e-business applications and initiatives fail because of the lack of a comprehensive look at e-business architectures. For example, the recent crashes of many e-business applications costing millions of dollars could have been avoided if all aspects of operational issues had been addressed properly. This book offers a blueprint for avoiding such mistakes and for achieving success in the new digital economy. It also includes case studies, examples, references, and pointers to other materials at the IBM Web site www.ibm.com/framework/patterns.




Fundamental Networking in Java


Book Description

The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments. After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.




Internet Protocols


Book Description

Internet Protocols (IP) covers many of the newer internet technologies being developed and explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by applications so that readers can better understand the uses of IP technology. Included are details of implementation issues as well as several state-of-the-art equipment and software. Unique features include coverage of: -VPN's, IKE, Mobile IP, 802.11b, 802.1x, 3G, Bluetooth, Zero-Conf, SLP, AAA, iFCP, SCTP, GSM, GPRS, CDMA2000, IPv6, DNSv6, MPLS and more. -Actual implementation strategies for routers through descriptions of Cisco 12410 GSR and Juniper M160. -IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux.




Building Java Enterprise Systems with J2EE


Book Description

PLEASE PROVIDE COURSE INFORMATION PLEASE PROVIDE




Digital Transformation of Enterprise Architecture


Book Description

"In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture ... this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's library." —John D. McDowall, Author of Complex Enterprise Architecture Digital Transformation of Enterprise Architecture is the first book to propose Enterprise Architecture (EA) as the most important element (after Business Models) for digital transformation of enterprises. This book makes digital transformation more tangible by showing the rationale and typical technologies associated with it, and these technologies in turn reveal the essence of digital transformation. This book would be useful for analysts, designers and developers of future-ready agile application systems. This book proposes that it is the perennial quest for interoperability & portability, scalability, availability, etc., that has directed and driven the evolution of the IT/IS industry in the past 50 years. It is this very quest that has led to the emergence of technologies like service-oriented, cloud, and big data computing. In addition to the conventional attributes of EA like interoperability, scalability and availability, this book identifies additional attributes of mobility, ubiquity, security, analyticity, and usability. This pragmatic book: Identifies three parts effort for any digital transformation: Business Models, Enterprise Architectures and Enterprise Processes. Describes eight attributes of EA: interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability. Explains the corresponding technologies of service-oriented, cloud, big data, context-aware, Internet of Things (IoT), blockchain, soft, and interactive computing. Briefs on auxiliary technologies like integration, virtualization, replication, spatio-temporal databases, embedded systems, cryptography, data mining, and interactive interfaces that are essential for digital transformation of enterprise architecture. Introduces interactive interfaces like voice, gaze, gesture and 3D interfaces. Provides an overview of blockchain computing, soft computing, and customer interaction systems. Digital Transformation of Enterprise Architecture proposes that to withstand the disruptive digital storms of the future, enterprises must bring about digital transformation, i.e. a transformation that affects an exponential change (amplification or attenuation) in any aspect of the constituent attributes of EA. It proposes that each of these technologies (service-oriented, cloud, big data, context-aware, IoT, blockchain, soft, and interactive computing) bring about digital transformation of the corresponding EA attribute viz. interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability.