The document summarizes several trends in technology, including:
1) Rich internet applications are becoming more common through technologies like AJAX and JavaScript, though challenges around different form factors and inputs remain.
2) Programming languages like Python, Ruby, and Scala are growing in popularity while Java's mindshare declines, and polyglot programming is increasing.
3) Cloud computing and NoSQL databases are becoming more widely adopted beyond early adopters, with NoSQL providing alternatives to relational databases for some applications.
4) REST and web services will compete inside enterprises, while trends like mashups, map reduce, and social networking are originating on the internet and moving into enterprises.
Cloud-computing applications are characterized by stateful access, with differentiated service levels, charged to the end user using the pay-per-use pricing model. Implicit in this model is the assumption that a cloud application is always on. Scaling the cloud delivery model to an Internet scale (millions of users) is a challenge that next-generation Layer 4–7 infrastructure needs to overcome.
Hugtakið hugbúnaðararkítektúr er yfirhlaðið orð og þýðir mismunandi hluti fyrir mismunandi fólk. Við ætlum í þessum fyrirlestri að skilgreina ýmis hugtök tengd arkítektúr til að fá betri skilning á þessu. Við munum einnig skilgreina hvað agile arkítektúr þýðir eða hvað það þýðir ekki. Þá skoðum við monolith arkítektúr sem er hinn hefðbundi arkítektúr sem flestir nota í dag. Vandinn er sá að í dag eru kröfurnar meiri en þessi arkítektúr ræður við og því hafa menn verið að skoða aðrar leiðir eins og lightweight Service Oriented Architecture og hvernig smíða má hugbúnað sem þjónustur eða microapps eða microservice.
Við skoðum einnig lagskiptingu en það er elsta trikkið í bókinni og byggir á deila og drottna aðferðinni.
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is an emerging computing technology that uses the Internet and central remote servers to maintain data and applications. Cloud computing allows consumers and business to use applications without installation and access their personal files at any computer with Internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.
Cloud-computing applications are characterized by stateful access, with differentiated service levels, charged to the end user using the pay-per-use pricing model. Implicit in this model is the assumption that a cloud application is always on. Scaling the cloud delivery model to an Internet scale (millions of users) is a challenge that next-generation Layer 4–7 infrastructure needs to overcome.
Hugtakið hugbúnaðararkítektúr er yfirhlaðið orð og þýðir mismunandi hluti fyrir mismunandi fólk. Við ætlum í þessum fyrirlestri að skilgreina ýmis hugtök tengd arkítektúr til að fá betri skilning á þessu. Við munum einnig skilgreina hvað agile arkítektúr þýðir eða hvað það þýðir ekki. Þá skoðum við monolith arkítektúr sem er hinn hefðbundi arkítektúr sem flestir nota í dag. Vandinn er sá að í dag eru kröfurnar meiri en þessi arkítektúr ræður við og því hafa menn verið að skoða aðrar leiðir eins og lightweight Service Oriented Architecture og hvernig smíða má hugbúnað sem þjónustur eða microapps eða microservice.
Við skoðum einnig lagskiptingu en það er elsta trikkið í bókinni og byggir á deila og drottna aðferðinni.
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is an emerging computing technology that uses the Internet and central remote servers to maintain data and applications. Cloud computing allows consumers and business to use applications without installation and access their personal files at any computer with Internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.
‘WebiOS ’ is a Cloud Computing Virtual Desktop that includes an integrated Office Suite, Groupware Applications and a toolkit to develop specific web applications that one might need.
Cloud computing notes unit I as per RGPV syllabusNANDINI SHARMA
Cloud Computing
Historical development ,Vision of Cloud Computing, Characteristics of cloud
computing as per NIST , Cloud computing reference model ,Cloud computing environments,
Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments
.Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene
Expression Data Analysis ,Satellite Image Processing ,CRM and ERP ,Social networking .
Report : Dpilot - A Cloud Based File Transfer Web ApplicationNidhi Chauhan
A Web Application to share your data over Cloud , making it secure and simple to transfer/ share your files, images or other documents over remote locations using MERN stack Development. Dpilot is a cloud based file transfer application that allows its user to upload data on cloud server and the receiver on the other hand can downlaod the data from the server. The Downlaod information is send to the receiver via mail service.
Other Features include:-
Secure Login system
Easy data Access
Lightening Fast Uploads and Downloads
Connect with your Facebook Or Gmail Account for easy access
Seminar_report on Microsoft Azure ServiceANAND PRAKASH
Executing applications in the clouds offer many advantages over the traditional way of running programs. Firstly, using cloud computing allows rapid service deployment and massive savings upfront because not having to invest in infrastructure. Secondly, cloud computing model allows computing power and storage to scale up with business growth. In addition to this, it’s also easy to dynamically adjust computing power up or down. As a customer, you end up paying for the actual usage of resources. The advantages of using the Azure cloud platform relate to the fact that Microsoft has tried to minimize the changes involved in migrating applications to the cloud. Effort required from developers already familiar with Microsoft’s technologies to utilize the Azure is minimal. In addition to this, upcoming releases of Azure are going to support applications written in languages such as Python and PHP. Another advantage in Microsoft’s solution is that the services provided can be used in a very flexible fashion. Not only are Azure services available to cloud applications, but also traditional on-premises applications are free to exploit them. What’s even better, Microsoft seems to be improving in terms of interoperability. Because all of the services are accessible via industry standard protocols, it is guaranteed exploiting them doesn’t force customers to use Microsoft’s operating systems on-premises. Although there are many advantages in cloud computing, there are also disadvantages that shouldn’t be ignored. The first and most obvious disadvantage is the fact that by running applications in the cloud you have to hand over your private data. Privacy and security concerns are direct consequences of this. Secondly, although cloud computing relieves customers from the burden of infrastructure management, it also takes away the possibility to be in total control of that infrastructure. In addition to loosing control on hardware, using compute clouds also ties the customer very tightly to the cloud service provider. Data, for example, is usually stored in a proprietary format which makes porting applications to competitors’ systems hard. As customers are locked in, they are also at the mercy of that certain service provider’s future pricing strategy.
Lotus Notes Meets the Workplace Rich Clientdominion
Workplace Client Technology is NEW stuff
Very few people are live with it yet, but its getting close!
IBM has been kind enough to make time to let me see the work in progress and talk with the developers
And they’ve allowed me to share nearly all of what I think is salient with you today
As Lotus Notes & Lotus Domino users, our perspective is very different.
So many “new” technologies are things we already do
Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet, basically a step on from Utility Computing
a collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform).
Using the Internet for communication and transport provides hardware, software and networking services to clients
Both Ember.js & Backbone.js are capable JavaScript frameworks. Are you confused to make selection between both?Hire a web development companies in PHP to reduce the amount of time and coding needed to carry out the development process.
‘WebiOS ’ is a Cloud Computing Virtual Desktop that includes an integrated Office Suite, Groupware Applications and a toolkit to develop specific web applications that one might need.
Cloud computing notes unit I as per RGPV syllabusNANDINI SHARMA
Cloud Computing
Historical development ,Vision of Cloud Computing, Characteristics of cloud
computing as per NIST , Cloud computing reference model ,Cloud computing environments,
Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments
.Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene
Expression Data Analysis ,Satellite Image Processing ,CRM and ERP ,Social networking .
Report : Dpilot - A Cloud Based File Transfer Web ApplicationNidhi Chauhan
A Web Application to share your data over Cloud , making it secure and simple to transfer/ share your files, images or other documents over remote locations using MERN stack Development. Dpilot is a cloud based file transfer application that allows its user to upload data on cloud server and the receiver on the other hand can downlaod the data from the server. The Downlaod information is send to the receiver via mail service.
Other Features include:-
Secure Login system
Easy data Access
Lightening Fast Uploads and Downloads
Connect with your Facebook Or Gmail Account for easy access
Seminar_report on Microsoft Azure ServiceANAND PRAKASH
Executing applications in the clouds offer many advantages over the traditional way of running programs. Firstly, using cloud computing allows rapid service deployment and massive savings upfront because not having to invest in infrastructure. Secondly, cloud computing model allows computing power and storage to scale up with business growth. In addition to this, it’s also easy to dynamically adjust computing power up or down. As a customer, you end up paying for the actual usage of resources. The advantages of using the Azure cloud platform relate to the fact that Microsoft has tried to minimize the changes involved in migrating applications to the cloud. Effort required from developers already familiar with Microsoft’s technologies to utilize the Azure is minimal. In addition to this, upcoming releases of Azure are going to support applications written in languages such as Python and PHP. Another advantage in Microsoft’s solution is that the services provided can be used in a very flexible fashion. Not only are Azure services available to cloud applications, but also traditional on-premises applications are free to exploit them. What’s even better, Microsoft seems to be improving in terms of interoperability. Because all of the services are accessible via industry standard protocols, it is guaranteed exploiting them doesn’t force customers to use Microsoft’s operating systems on-premises. Although there are many advantages in cloud computing, there are also disadvantages that shouldn’t be ignored. The first and most obvious disadvantage is the fact that by running applications in the cloud you have to hand over your private data. Privacy and security concerns are direct consequences of this. Secondly, although cloud computing relieves customers from the burden of infrastructure management, it also takes away the possibility to be in total control of that infrastructure. In addition to loosing control on hardware, using compute clouds also ties the customer very tightly to the cloud service provider. Data, for example, is usually stored in a proprietary format which makes porting applications to competitors’ systems hard. As customers are locked in, they are also at the mercy of that certain service provider’s future pricing strategy.
Lotus Notes Meets the Workplace Rich Clientdominion
Workplace Client Technology is NEW stuff
Very few people are live with it yet, but its getting close!
IBM has been kind enough to make time to let me see the work in progress and talk with the developers
And they’ve allowed me to share nearly all of what I think is salient with you today
As Lotus Notes & Lotus Domino users, our perspective is very different.
So many “new” technologies are things we already do
Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet, basically a step on from Utility Computing
a collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform).
Using the Internet for communication and transport provides hardware, software and networking services to clients
Both Ember.js & Backbone.js are capable JavaScript frameworks. Are you confused to make selection between both?Hire a web development companies in PHP to reduce the amount of time and coding needed to carry out the development process.
A presentation that I did along with a professor from the University of South Carolina Upstate (http://uscupstate.edu): Dr. Tina Herzberg.
The presentation covers information about a braille training grant that she was awarded, and my position on the team as creating universal design plugins for Omeka and WordPress, along with other web accessibility items.
List of CrowdFunding Websites and much more!Ari Massoudi
List of Crowd Funding Websites & Websites to Find & Connect with Angel Investors and Venture Capital-Private Equity firms + list of Outsourcing, Crowdsourcing and Open-Innovation Websites
Knowledge has been gathered from ten years of interdisciplinary addiction research as well as from two years of experience of the first German Alcohol and Baclofen Forum. This brochure aims at giving an overview of the present state of treatment methods of addiction, anxiety, and depression.
This „Blackbox“ and the matching „Whitebox“ contain more than forty authentic user reports covering their experiences over a period of 6 to 24 months. They provide a clear picture:
„The End of my Addiction“ remains no longer solely the individual experience of a French cardiologist (O. Ameisen, 2004). Moreover it is the reality as experienced by numerous patients and the doctors who treat them – out of necessity – relying on „off- label-use“.
If there is any trend that has created such a buzz in recent times, it has got be cloud computing. But does this mean that you should provide your software-plus-service from the cloud? Or should you tread with caution and wait for the market to stabilize? This paper attempts to provide Sanity-as-a-Service to ISV’s, Software-enabledbusinesses and Enterprises on cloud-enabling their software.
Cloud Web-Based Operating System (Cloud Web Os)ijcsit
The cloud computing is the most efficient technology that reduces the time, cost and resources which are
used by IT companies of any size from small to large companies. There are many cloud approaches existing
nowadays related to store the data files and synchronize file versions. However, few of these cloud models
let the user open or configure the file on cloud. Therefore, our new cloud model proposed in this paper
concentrate to let the user open, execute, configure, edit, delete, and update his files online, on the cloud. It
gives the user all the operating systems features and virtual desktop icons on the cloud. In addition, the
proposed cloud operating system offers variety of selected applications that allow the users to write
documents, draw graphs, and compile classes and programs.
In this research paper presents an design model for file sharing system for ubiquitos mobile
devices using both cloud and text computing. File sharing is one of the rationales for computer
networks with increasing demand for file sharing applications and technologies in small and
large enterprise networks and on the Internet. File transfer is an important process in any form
of computing as we need to really share the data across. The Wireless Network changed the way
we were sharing the files. Infra-Red and Bluetooth are the technology we use to share files in
mobile phones and Bluetooth is the successful one. In exisiting system there is no immediate
predecessor for the proposed system. Bluetooth file transfer is the already existing system.
Drawbacks of Existing System are Short Range , Slow transfer rate and Unsecure .But in our
research paper the idea is to use Both cloud and text computing network to transfer files.A
wireless network is created and the devices connected in this network can share files between
them. Benefits over the Existing System are more Secure , Range – upto 300 mts and Data rate
is 50-140 mbps. In future without internet connection we can transfer our information very
easily.Key words : cloud and text computing, Bluetooth, network, internet, system , file transfer.
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...cscpconf
In this research paper presents an design model for file sharing system for ubiquitos mobile devices using both cloud and text computing. File sharing is one of the rationales for computer
networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. File transfer is an important process in any form
of computing as we need to really share the data across. The Wireless Network changed the way we were sharing the files. Infra-Red and Bluetooth are the technology we use to share files in mobile phones and Bluetooth is the successful one. In exisiting system there is no immediate predecessor for the proposed system. Bluetooth file transfer is the already existing system.Drawbacks of Existing System are Short Range , Slow transfer rate and Unsecure .But in ourresearch paper the idea is to use Both cloud and text computing network to transfer files.A
wireless network is created and the devices connected in this network can share files betweenthem. Benefits over the Existing System are more Secure , Range – upto 300 mts and Data rate
is 50-140 mbps. In future without internet connection we can transfer our information veryeasily.Key words : cloud and text computing, Bluetooth, network, internet, system , file transfer.
Provides a primer to the technologies that paved the way for cloud computing and describes the current state of the art. The presentation provides an overview of IaaS, SaaS, PaaS, BaaS, and rich mobile device connectivity to the web.
The Cloud Deployment Toolkit (CDTK) project is a proposed open source project under the Eclipse Technology Project.
This proposal is in the Project Proposal Phase (as defined in the Eclipse Development Process) and is written to declare its intent and scope.
We solicit additional participation and input from the Eclipse community. Please send all feedback to the CDTK forum.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
27. I believe HTML5, CSS, Javascript, AJAX will dominate in the longer term for most but the most demanding client apps .. but thats a trend in progress
28. RIP : This site best viewed in Internet Explorer.
51. In computer science, functional programming is a programming paradigm that treats computation as the evaluation of mathematical functions and avoids state and mutable data. It emphasizes the application of functions, in contrast to the imperative programming style, which emphasizes changes in state. .. source - Wikipedia
52. One of the suggested reasons for ascendancy of functional programming is the upcoming multicore challenge.
53. It is also suggested that programs are much easier to write and maintain using functional programming techniques.
79. Some apps prefer to move intelligence (schema) away from the database and into the application. Thus some prefer NoSQL for its schemaless capabilities.
80. But much of the pressure is coming from large internet sites
81. For whom the RDBMS doesn't provide the right CAP tradeoffs
82. it is impossible for a distributed computer system to simultaneously provide all three of the following guarantees: Consistency Availability Partition Tolerance
83. The importance of C, A and P vary across different class of applications
84. Thus some particular approaches of NoSQL could be more or less applicable than others
86. However this audience focuses on financial software, and may find it more essential to prioritise C.
87. The key takeaway is to not treat C as always mandatory or required and deprioritise it where applicable – a process that requires some unlearning
88. Given a telecom analogy – the dawn of the stupid network, I find another reason why NoSQL is exciting.
89. According to that thought, internet won compared to POTS since it had a dumb network with intelligent endpoints compared to an intelligent network with dumb endpoints
96. While WS-* focuses on leveraging typical application design semantics including RPC, REST eschews complexity and focuses on simple document / resource access semantics
97. It is possible to talk at length on how REST leverages the very aspects that made other aspects of internet such as WWW successful.
98. But many coming from a more conventional distributed architecture background may find REST a little hard to find comfort with. Especially its lack of registries, no predefined metadata using IDL etc.
99. I find the arguments not too dissimilar from static vs. dynamically typed languages
100. REST makes it really easy for clients to leverage exposed API
101. Also Hypermedia as the engine of application state can actually help reduce many application state errors.
103. Inter application collaboration for servicing a particular user request including interaction with existing SaaS applications (eg. Google Maps) going to be increasingly important
106. 2PC / XA approaches of distributed transactions are simply impractical in large distributed services cloud especially on a WAN or across firewalls
107. Since technology is unlikely to help solve this problem, the solutions are going to come from remodeling the business logic.
114. The momentum of architectural evolution is squarely with the internet applications
115. Browser platforms, Web 2.0, Social Networking, Cloud, REST, Mashups, NoSQL, Map Reduce are all internet contributions finding their way into the enterprise