Pages: pp. 50-54, 56
Foundations of Java EE 5 and .NET 2 Interoperability, Adam G. Neat. Set for publication in November, this book explores interfacing Java/Java EE 5 applications to .NET-based applications and shows how you can benefit from blending these technologies.
In the book, Neat explores the differences among application architectures and the implications for the physical platforms they operate on. He also provides reference implementation and application code examples.
A component architect, Neat also focuses on the architectural implications of various approaches, solutions, and technology implementations. He provides supporting code examples and detailed guidelines for implementing a cohesive system.
This book will interest developers trying to integrate Java EE 5 and .NET architectures into enterprise environments while still maintaining application integrity, performance, robustness, and domain compartmentalization.
Apress; ISBN 1-590-59649-8; 400 pp.; $54.99.
Pro Drools: Declarative Programming with Java, Jan Machacek. Drools is a rules engine, which is a program that can sort through mounds of data using rules-based criteria. Declarative programming breaks these rules into bite-sized chucks, which an engine like Drools can string together to sift thorough business data. Because Drools allows for this type of programming, it's flexible enough to match the semantics of a problem domain. Declarative programming deals with the "what is" instead of the usual "how to" of programming languages. Therefore, you can use a single "what is" to solve a variety of problems with different "how to" elements.
The book blends theory with explanations of rule engines' inner workings and looks at the bigger picture of rules usage, including how it applies to testing and debugging. The book also covers the Drools engine, discussing such topics as its syntax and integration in plain Java applications. Readers can become proficient with a rule's various parts, which are extendible to lend domain-specific sense to the rule.
Apress; ISBN 1-590-59595-5; 400 pp.; $59.99.
16–19 May 2006
Through tutorials, panels, case studies, and other engaging approaches, this year's JavaOne Conference will cover Java Standard Edition, Enterprise Edition, and Micro Edition platforms as well as innovative applications and tools.
Java SE provides a complete environment for developing applications on desktops and servers, and for deploying them in embedded environments. Java EE offers a scalable environment for building, deploying, and managing enterprise applications. And Java ME provides a development and deployment environment for mobile data services and content in consumer and enterprise markets. The conference's Mobility and Devices track will introduce developers to Java ME and Java Card technologies, and advanced techniques for Java-based mobile content.
The Cool Stuff track will cover what the organizers have dubbed the coolest stuff in Java technology. Sessions will describe innovative uses of the Java programming language in applications and extensions to the Java platform.
30 August-1 September 2006
Organized by the University of Mannheim, PPPJ 06 invites researchers, teachers, practitioners, and programmers who study or work with Java to discuss the principles and practice of its use. Topics include optimization, virtual machine design, Java verification, aspect orientation, and Java-specific metrics, software engineering with Java, tools for Java programming, Java-based model-driven development and model-driven architecture, applications in science, engineering, and business, novel applications, domain-specific frameworks, Java-based tools, Java-based enterprise computing, mobile Java, Java and financial services, Java and the manufacturing industry, teaching Java programming, teleteaching applications, and program design, implementation, testing, and performance.
Concurrency: State Models and Java Programs, 2nd ed., Jeff Magee and Jeff Kramer. The authors offer an updated approach to the basic concepts and techniques behind concurrent programming.
Concurrent programming is complex and demands a much more formal approach than sequential programming. To develop a thorough understanding of the topic, the authors present concepts, techniques, and problems through various formats: informal descriptions, examples, abstract models, and concrete Java examples. These combine to provide problem patterns and associated solution techniques.
Due out in May, the second edition includes new features such as a verification chapter and more student exercises. In addition, the book comes with an updated version of the Labeled Transition System Analyzer tool; this update is easier to use and incorporates extended capabilities.
Wiley; ISBN 0-470-09355-2; 416 pp.; $34.65.
The European Conference on Object-Oriented Programming is celebrating its 20th anniversary. The conference aims to bring together people from industry and academia who are interested in a wide spectrum of technologies related to object-oriented programming.
The main conference will feature technical papers on broad topics such as program query and persistence, ownership and concurrency, languages, type theory, tools, and modularity.
The numerous workshop topics include formal techniques for Java-like programs, program analysis for security and safety, reviving dynamic languages, domain-specific program development, languages and execution support for grid application development, and semantic modeling of complex information systems.
A guide to developing applications on the Java 2 Platform Enterprise Edition Software Developer's Kit, this site includes a tutorial section that covers topics such as the Java EE 5 Platform, the J2EE 1.4 Platform, the J2EE 1.3 Platform, and the J2EE for the Sun ONE Platform.
The Code Camps section provides information on Sun's Worldwide Developer Events, including links to the Tech Days homepage, locations, speakers, sponsors, presentations, and agendas and abstracts.
In the site's left-side navigation, the Reference section links to API specifications, documentation, FAQs, code samples and applications, BluePrints, technical articles and tips, white papers, case studies, and a glossary. The Community section links to newsletters, forums, books and authors, and a bug database. The Learning section links to a section for users who are new to the Java Center, tutorials, training (including a Java EE learning path), certification, and quizzes.
This site is an extensive collection of links to tutorials covering computer and technology topics. Featured links include sites such as Learnthat.com, which provides free Web-based tutorials and training to users of all levels in topics that include Web design, software, and networking. Learnthat.com also designs online courses and offers consulting on computer and professional education. The homepage links to the Computer Technology Documentation Project site, which includes tutorials targeting beginners to experts in several categories, including networking, markup languages, and Linux.
A secondary collection of links categorizes tutorials into subjects such as applications, basic-general, databases, e-commerce, hardware, Internet issues, IT management, networking, operating systems, programming, servers, typing, and webmaster.
The Design and Management of Effective Distance Learning Programs, Richard Discenza, Caroline Howard, and Karen Schenk. As computers, telecommunications technology, and other electronic media have reduced the constraints imposed by geographic location, more organizations use information technology to geographically disperse education. As distance learning programs increase, a variety of challenges and issues develop. These issues include costs for remote space and equipment, the loss of traditional evaluation methods, and the potential losses of academic integrity. The Design and Management of Effective Distance Learning Programs explores those issues, challenges, and solutions related to distance education.
The book explores topics such as the use of distance education in higher education in the US, the implications for higher education in an online world, the attraction of online distance education for telecommuting, and the future of distance learning in the traditional university. It also covers faculty perceptions and participation in distance education, effective teaching from offsite locations, social needs in distance education, and institutional and library services for distance education courses and programs.
Idea Group Publishing; ISBN 1-931777-80-2; 312 pp.; $59.95.
Adult Learning in the Digital Age: Information Technology and the Learning Society, Neil Selwyn, Stephen Gorard, and John Furlong, eds. Many view learning with technology as crucial to establishing a skilled workforce and empowering citizens by offering opportunities to those otherwise excluded. Many governments have set targets and developed policies to help all adults learn, work, and live with the support of information and communications technologies (ICTs).
The book looks at how adults use ICTs for learning at home, at work, and in the wider community. Based on an academic research projects in this area, Adult Learning in the Digital Age explores using new technology in a learning environment.
The book examines why ICTs can affect positive change in adult learning, the drawbacks and limits of ICT in adult education, and what makes a lifelong learner. It discusses what people use ICT for; and the wider social, economic, cultural, and political realities of the information age and the learning society.
Addressing these questions and providing a foundation for the existing debate, the book highlights what the authors describe as the "messy" realities of the learning society and e-learning rhetoric. It also tells the story of those the authors say are excluded from the learning society. The book offers recommendations for practitioners, policymakers, and politicians, as well as researchers and students.
Routledge; ISBN 041-535699-7; 229 pp.; $39.95.
Higher Education in the Internet Age: Libraries Creating a Strategic Edge, Patricia Senn Breivik and E. Gordon Gee. Campus libraries offer resources that could help achieve institutional visions and priorities, but these resources sometimes go unused.
Breivik and Gee highlight campus leaders who have made extensive and successful use of library resources and personnel, seeking to inspire others to view their libraries strategically.
This book addresses challenges of today's information-overloaded culture while responding to the significant changes that have occurred on campuses during the past 15 years. Chief among these changes are pervasive Internet use and a growing emphasis on community engagement, distance education, and hands-on learning.
The authors use a series of issue statements to introduce topics that have emerged in today's wired society; vignettes highlight best practices extracted from interviews with leaders in education, business, and government.
Praeger; ISBN 0-275-98194-0;340 pp.; $49.95.
11–14 June 2006
Palm Springs, Calif.
Training magazine's Training Directors Forum targets attendees who play a part in making strategic and tactical decisions concerning an organization's development of e-learning. To serve this audience, the conference offers an Online Learning Management Certificate on it first day. This certificate program examines managing e-learning, including designing a plan, aligning learning objectives with business goals, navigating purchasing decisions, selling the program to others, and evaluation.
The Rapid E-Learning certificate program focuses on tactics and technologies to cut costs and time. The session will explore the functions of content, instructional design, production processes, and the roles of trainers, chief learning officers, and subject matter experts. Attendees will learn about cases where rapid e-learning has made contributions; new practices and processes in rapid content development and delivery; rapid e-learning production processes, models, templates, reusable tools, and expandable technologies; and financial and return-on-investment accounting for e-learning.
Randstad USA selected a learning-management system provider to provide training to its geographically dispersed organization. The "Critical Success Factors to Launching an LMS" session discusses how the project developed. Attendees can learn how the US learning organization is responsible for leading the global system implementation.
Service-Oriented Architecture Compass: Business Value, Planning, and Enterprise Roadmap, Norbert Bieberstein and colleagues. In this book, IBM Enterprise Integration Team experts present a guide to planning, implementing, and managing SOAs. Drawing on their experience helping enterprise customers migrate to SOA, the authors share lessons and best practices for architects, project managers, and software development leaders.
Service-Oriented Architecture Compass offers a blend of principles and how-to guidance for transitioning your infrastructure to SOA. The authors explain what SOA is, the opportunities it offers, and how it differs from earlier approaches. Using detailed examples from IBM consulting engagements, they show how to deploy SOA solutions that tightly integrate with your processes and operations, delivering flexibility and value. Topics range from policy-based management to workflow implementation.
IBM Press; ISBN 0131870025; 272 pp.; $44.99.
The Joy of SOX: Why Sarbanes-Oxley and Service-Oriented Architecture May Be the Best Thing That Ever Happened to You, Hugh Taylor. The Sarbanes-Oxley (SOX) Act was passed in 2002 in response to a series of high-profile corporate scandals and requires that public companies implement internal controls over financial reporting, operations, and assets. These controls depend heavily on installing or improving information technology and business methods.
Written by one of the most visible personalities on the tech-business side of the SOX discussion, The Joy of SOX provides a road map for integrating SOX compliance into the fabric of everyday IT infrastructure and business practice. It shows you how to leverage and use SOA—a set of technologies that enables interoperation of heterogeneous computer systems—to achieve the level of internal controls over IT that SOX mandates.
The book covers issues such as agility, outsourcing, ramifications of SOX 404, internal controls and business processes, Cobit (Control Objectives for Information and Related Technologies) components, maturity models, organizational changes, contractual relationships, and application development and integration.
Wiley; ISBN 0-471-77274-7; 312 pp.; $45.00.
17–19 July 2006
This Open Group IT Architecture Practitioners Conference will focus on IT architecture's different disciplines and the industry's need for an accepted definition of IT architects' expected technical competencies in professional architecture fields. Just what is it about a security specialist's knowledge, skills, and experience that warrants the title of architect? If the scope of an enterprise architect's responsibilities is enterprise-wide, just how much technical knowledge does that imply for a particular area such as SOA, networking, or application integration?
The conference will cover the requirements for technical disciplines in IT architecture, appropriate technical skills and experience, the importance of full lifecycle experience, and sample architecture disciplines.
Calling itself "The Web's best Web-services-specific information resource for enterprise IT professionals," Search WebServices.com features resources such as news, tips, webcasts, white papers, and product listings and reviews.
Interactive highlights include an Ask the Experts service, where you can get your Web services-related questions answered by authorities in the field. The site's experts were chosen for their knowledge of specific technology areas. In addition, the ITKnowledge Exchange lets you create your own personal help desk each time you ask a question. You can send your question to a large audience, a small audience, or just one person who fits your criteria.
The site also provides free access to comprehensive directories. The SearchWebServices Webcast Directory offers webcasts from a range of IT vendors. Browse the directory to hear presentations on topics including XML, SOA, and SOAP. The Web Services Product Directory features product literature, data sheets, product overviews, and software demos to help you implement Web services technology solutions in your enterprise.
The Business Case for Enterprise-Class Wireless LANs, H. David Castaneda, Oisin Mac Alasdair, and Christopher A.L. Vinckier. The evolution of wireless LANs and the subsequent penetration into the enterprise market has moved at a faster rate than expected and is projected to accelerate further in the next couple years. IT executives need reference material that can help them establish a solid business case and form a financially sound implementation plan while appreciating the benefits, as well as the risks, of this technology.
The Business Case for Enterprise-Class Wireless LANs takes a business approach to wireless networking. It focuses on the strategic and business justifications associated with WLAN deployment and less on the intricacies of the underlying technology. However, it includes a baseline analysis of wireless LAN technologies.
The book provides advice to decision makers on issues they should consider, recommends strategies for dealing with important issues, and provides specific advice, including templates, checklists, and flowcharts covering how they should proceed. Throughout the book, reader-friendly descriptions, quick reference sheets, diagrams, and visual layouts offer further explanations, and sidebar interviews provide authoritative business perspectives.
Cisco Press; ISBN 1-58720-125-9; $45.00.
25–28 June 2006
According to conference chair Chandra Kintala, the 2006 International Conference on Dependable Systems and Networks (DSN 2006) will focus on topics related to the question: How can you make our computer systems and networks more dependable, reliable, and trustworthy as a means to making our businesses, homeland, and society more safe and secure? The conference program features a keynote talk by a business and technology leader, research papers, industry sessions, panels, tutorials, workshops, fast abstracts, and a student forum.
Highlights include tutorials on reliability-aware microprocessor architectures, dependable computing over sensor networks, erasure codes for fault tolerant storage, and software dependability—what you didn't learn in kindergarten. Research paper sessions will cover real-time and embedded systems, safety-critical systems, architecture and operating systems, dependable storage, attack prevention and mitigation, dependability models, byzantine faults, consensus and leader election, storage systems, attack analysis, intrusion detection and tolerance, measuring and modeling, complex and large-scale systems, networking, multiple-server systems, and distributed algorithms.
11 June 2006
Ann Arbor, Michigan
NetEcon merges two workshops held in previous years: P2PEcon (Economics of Peer-to-Peer Systems) and PINS (Practice and Theory of Incentives in Networked Systems). Held at the ACM Conference on Electronic Commerce, the workshop aims to promote a cross-disciplinary exchange of ideas on the role of game-theoretic and economic principles in the design and analysis of networked systems.
Solicited topics include