|
home » TechNews: up-to-date news & latest articles around the Web |
Mon, Aug 13, 2007 |
What's new in JAXP 1.3? Part 1
11/13/2004
|
For a mature technology, the XML space is surprisingly active. Java™ API for XML Processing (JAXP) 1.3 was recently finalized, and is the conduit through which many of the newest open standards relating to XML will enter the J2SE platform. In this installment of a two-part article describing the JAXP 1.3 API, authors Neil Graham and Elena Litani provide a brief overview of the JAXP specification, give details of the modifications to the javax.xml.parsers package, and describe a powerful schema caching and validation framework.
Read this article 
|
XML in localisation: Use XLIFF to translate documents
11/13/2004
|
The first article in this series briefly explained the most relevant XML standards used in the localisation industry. This second part focuses on XML Localisation Interchange File Format (XLIFF) and explains with practical examples how to use it for translating different kinds of documents. This article presents a step-by-step guide to translating multilingual documents using XLIFF as an intermediary file format, and provides useful resources for localizing Java applications.
Read this article 
|
Render dynamic graphs in SVG
11/13/2004
|
Scalable Vector Graphics (SVG) is an XML-based language for drawing two-dimensional graphics. The ability to render graphics on the fly lends itself naturally to using it for representing data such as graphs. But suppose the data being represented varies in its magnitude. You may want to graph values between 0 and 10 today, and between 0 and 100,000 tomorrow. Plotting these values on the same scales would be useless -- ideally, you want the ability to scale SVG graphs depending on their content. Author Brian Venn shows you how.
Read this article 
|
XMLOpen and more XML Hacks: An excellent conference, and more on a pretty good book
11/13/2004
|
Columnist Uche Ogbuji reflects on several noteworthy presentations at the recent XMLOpen conference in Cambridge, England, a rich technical symposium of XML processing topics. Noteworthy topics included XML metrics, Semantic Web, XML pipelines, Web Proper Names, and data types. He also makes one more practical observation on the book XML Hacks, a book of tips and tricks that he covered at length in his last column.
Read this article 
|
XML Security: Control information access with XACML
11/13/2004
|
Providing the right people with the right access to information is as important as (if not more important than) having the information in the first place. eXtensible Access Control Markup Language -- or XACML -- provides a mechanism to create policies and rules for controlling access to information. In this article, author Manish Verma continues his series on XML security issues by showing you how to incorporate XACML into your own applications.
Read this article 
|
Working XML: The Eclipse task list: And other considerations for Eclipse plug-ins
11/13/2004
|
After more than a year, Benoît returns to the XM (XSLT Make) project. He reports on changes with the Eclipse platform and embarks on a major update that will integrate XM more tightly with Eclipse. As a starting point, he looks into a simple interface enhancement that is often requested: support for the problem and task lists or, more specifically, support for markers. As you will see, working with these lists requires an indirection. He also looks into Eclipse's own resource management and discusses techniques for writing code that works equally well from within Eclipse and from the command line. Share your thoughts on this article with the author and other readers in the accompanying discussion forum. (You can also click Discuss at the top or bottom of the article to access the forum.)
Read this article 
|
Semantic request and response for standardized Web services
11/13/2004
|
Learn about the semantic communication that is necessary when developing and using geospatial Web services. Also find out how the concept of semantic request and response will significantly standardize the development and utilization of geospatial Web services.
Read this article 
|
Service-oriented modeling and architecture
11/13/2004
|
This article discusses the highlights of service-oriented modeling and architecture; the key activities that you need for the analysis and design required to build a Service-Oriented Architecture (SOA). The author stresses the importance of addressing the techniques required for the identification, specification and realization of services, their flows and composition, as well as the enterprise-scale components needed to realize and ensure the quality of services required of a SOA.
Read this article 
|
Web Services Transactions specifications
11/13/2004
|
The Web Services Transactions specifications define mechanisms for transactional interoperability between Web services domains and provide a means to compose transactional qualities of service into Web services applications.
Read this article 
|
A new approach to UDDI and WSDL, Part 5: Query from a Java application using the new OASIS UDDI WSDL Technical Note
11/13/2004
|
Learn how to apply the approach defined in the new OASIS UDDI Technical Note to query from a Java application in this fifth paper in a series that outlines a new approach to using WSDL and UDDI, as described in the Technical Note.
Read this article 
|
Use SLAs in a Web services context, Part 4: Secure multiple Web services with a SLA guarantee
11/13/2004
|
In Part 4 of this series, Judith M. Myerson explains how enterprises can put their security administration in a centralized location to better control the access control lists (ACLs) for multiple Web services and their associated services and applications in the Service-Oriented Architecture (SOA). She also illustrates why setting up ACLs for multiple Web services applications is important. Securing open, loosely coupled systems of Web services in a heterogeneous SOA requires a more sophisticated security approach involving multiple administrators than the traditional approach for the tightly coupled non-Web services and EAI applications. Security protocols for EAI applications are more mature those for Web services.
Read this article 
|
Use SLAs in a Web services context, Part 3: Integrate Web services into EAI with a SLA guarantee
11/13/2004
|
When Web services applications fail to integrate with an Enterprise Application Integration (EAI), it might indicate that they have not been tested adequately for all sorts of interoperability -- not just SOAP, but also middleware (including non-Web services in Service-Oriented Artchitecture (SOA)), business processes, design considerations, and network infrastructure. Judith M. Myerson helps you save time integrating Web services applications into EAI by explaining their limitations and helps you to better understand the major differences between EAI and Web services. She also shows you how to develop system interruption thresholds as a way of improving your Web services' chances of meeting the service-level agreement (SLA) guarantee for uptime availability of the resources that the SOA players consume and produce dynamically.
Read this article 
|
Web services programming tips and tricks: Learn simple, practical Web services design patterns, Part 2
11/13/2004
|
Part 2 of this series continues a discussion focusing on the application of well-defined and proven Web application design strategies to the world of Web services with an introductory look at the Command Facade Pattern.
Read this article 
|
Web services programming tips and tricks: Learn simple, practical Web services design patterns, Part 1
11/13/2004
|
Learn how to apply well-defined, proven Web application design strategies to the world of Web services. This first tip in a series shows you how to implement asynchronous query operations using Java Messaging Service (JMS) queues.
Read this article 
|
XML Data Type Support in ADO.NET 2.0: Handling XML from SQL Server 2005
11/13/2004
|
See how improvements to XML support in Microsoft ADO.NET 2.0 and Microsoft SQL Server 2005 work together to make handling XML data in your applications easier.
Read this article 
|
Exchange Data More Securely with XML Signatures and Encryption
11/13/2004
|
The XML Signature and XML Encryption standards are being used extensively as building-block technologies. Microsoft® Office InfoPath™ uses XML signatures to sign partial or whole forms. Web services use XML signatures to sign SOAP messages and XML encryption to encrypt them. The XML manifests for ClickOnce®-based applications, new in Visual Studio® 2005, also use XML signatures. The .NET Framework 1.x includes an object model for the XML Signature standard, and the .NET Framework 2.0 adds additional support, while adding an object model for XML encryption as well. This article explains the XML Signature and XML Encryption standards and shows you how to use them with .NET. For the actual XML Signature specification, see the W3C standard at XML-Signature Syntax and Processing.
Read this article 
|
The XML Litmus Test: Understanding When and Why to Use XML
11/13/2004
|
Dare Obasanjo provides some simple guidelines for determining when XML is the appropriate technology to use in a software application or architecture design.
Read this article 
|
Updated Specifications on Web Services Transactions
11/13/2004
|
Customer feedback has driven new updates to WS-AtomicTransaction, WS-BusinessActivity, and WS-Coordination. Learn about additional support for two-way initialization, security composition and more.
Read this article 
|
Check out the Updated WS-Discovery Specification
11/13/2004
|
This updated version of WS-Discovery incorporates customer implementation experience, a new co-author, revised security considerations and references to latest versions of other specifications.
Read this article 
|
Service Station: Improving Web Service Interoperability
11/13/2004
|
If interoperability is the main promise of Web services, why is it that so many developers and organizations have a difficult time achieving it in practice? Aaron Skonnard sheds some light on the issue.
Read this article 
|
Using the XML Features of the Access 2003 Object Model
11/13/2004
|
Microsoft Office 2003 adds a number of significant features for working with XML data. This article explores the XML-related objects, methods, and properties for Microsoft Office Access 2003. Detailed information on these new members is provided as well as code samples illustrating their use. After completing this article, you will have a better understanding of how you can put these features to use in your own solutions.
Read this article 
|
Using Customized Schema Constraints
11/10/2004
|
Last month we looked at XSLT's role in the reference implementation for Schematron, a schema language that lets you express many constraints that can't be expressed in RELAX NG (RNG) or the W3C Schema language (XSD). Instead of defining an entire schema, Schematron rules usually supplement the structural and typing rules described using one of the other two languages—or perhaps even written as a DTD—so that a Schematron rule set typically accompanies a schema written in one of the other languages.
Read this article 
|
Cutting and Sewing with XML
11/10/2004
|
Multi-source transformation and integration is a pathway to valuable applications. It's rarely a term of praise to compare an IT system to a quilt. In an IT context, I usually see the "q" word with a prefix like "patchwork" or even "crazy"—labeling a system as combining all sorts of independently developed elements with no coherent overall design.
Read this article 
|
StrikeIron Adds D&B Business Information to Roster of Premium Web Services: First On-Demand Web Services Access to Financial, Credit and Company Information from D&B
11/10/2004
|
StrikeIron™, Inc., a pioneer of online services and software to simplify working with Web services, today announced the availability of its StrikeIron D&B Business Information Premium Web Service. The offering is comprised of 8 reports available through the StrikeIron Web Services Business Network™ (WSBizNet™) and includes data such as D&B Ratings, Paydex scores, financial profiles, credit and payment information, credit scoring, risk assessment, company backgrounds and supplier evaluations.
Learn more about this news 
|
GT Software and Actional Partner to Provide Secure Mainframe Web Services Solutions
11/10/2004
|
Atlanta-based GT Software, a leading provider of mainframe integration solutions and Actional Corporation, a leading provider of SOA enablement solutions, today announced that Actional has joined the GT Software Partner program to give customers using the GT Software Ivory™ Web services product the ability to securely extend the benefits of native mainframe Web services. With this partnership, the two companies will leverage each other's sales channels.
Learn more about this news 
|
|
|