Java Product News (updated February 22, 2002)
GemStone now supports JBoss; BCT Technology launches «Napster» for code; JeeWiz! whips up Web services; and more GemStone now supports JBoss February 22 — GemStone Systems has added JBoss support to GemStone Facets 1.1, a shared transactional Java workspace. By…
Accelerate EJB 2.0 development with EJBGen
Simplify development and maintenance in your EJB CMP 2.0 model Developers who have worked with Enterprise JavaBeans (EJB) technology since its inception have experienced the hassle of the EJB development lifecycle. When I started to work with EJB 1.1 containers,…
Will Big Blue eclipse the Java tools market?
IBM aims to overshadow Sun’s NetBeans with its $40 million gambit If you’re looking to create an alternative to Microsoft’s Visual Studio .Net, you may be able to do so in just four easy steps. First, look outside the United…
Take control with the Proxy design pattern
The Proxy design pattern substitutes a proxy for an object, making your apps more efficient A friend of mine — a medical doctor, no less — once told me that he convinced a friend to take a college exam for…
Chronic slip syndrome
What level of oversight and control produces the best R&D results? My series of columns has discussed how the CTO balances each of the key R&D factors comprising strategic technology management. In the last column in this series, we detailed…
Muddled concepts of privacy can bring muddled results
The first step in saving ‘privacy’ is to define what we mean by it What is this thing called “privacy”? We hear a lot about it. Some people are hard-liners about preserving it. Others are only too willing to trade…
DISA’s CTO views Demo offerings
With an eye to security, the CTO of Defense Information Systems Agency reports on Demo 2002 DAWN MEYERRIECKS, CTO of Defense Information Systems Agency, attended the Demo 2002 conference in Phoenix from Feb. 11 through Feb. 12. She took the…
Oblix focuses on identity management
CTO Enrique Salem explains his company’s approach to securing access privileges THE FIRST LINE of defense in any security plan is authorization. If an IT organization cannot identify its users, then anybody can gain access to its systems by usurping…
A one-man e-commerce site that pays off well
Simple design, plus usability, equals profitability. With all the moaning about “dot-bombs,” it’s nice to find e-businesses that are simple in design, small in scale, but still provide the owner with financial rewards. ISBN.nu is one such site. Operated out…
Farming out CRM
Outsourced CRM is poised to take off as companies look to avoid the frustrations and failures of implementing CRM in-house RATHER THAN saddle themselves with the difficult and expensive task of running their own CRM applications, many enterprises are opting…