Where Is Middleware?

Total Page:16

File Type:pdf, Size:1020Kb

Where Is Middleware? Toward Integration Where is Middleware? Steve Vinoski • IONA Technologies • [email protected] his column is all about middleware, and eventually need to integrate two or more systems ultimately, middleware is all about integra- that use different middleware. T tion. Middleware has existed in various forms for many years in systems such as the IBM Middleware Classification Customer Information Control System (CICS), We commonly classify (and debate) middleware numerous message queuing systems such as IBM’s systems along several dimensions. The following MQ Series, the Common Object Request Broker list is not exhaustive, but it still shows that many Architecture (Corba), Microsoft’s Component Object different types of middleware are possible and nec- Model (COM), Java 2 Enterprise Edition (J2EE), and essary to solve all the integration problems we face. the latest rage, Web services. Virtually every form of application, programming language, operating RPC vs. Asynchronous Messaging system, and hardware has been a target of an inte- At an abstract level, remote procedure calls enable gration effort involving these middleware systems programmers to invoke (possibly remote) services or their cousins. Middleware is everywhere. as if they were intra-application procedure calls. The many reasons we need middleware all boil Much like function or procedure calls in traditional down to one: As technology continues to evolve programming languages, RPCs block the caller’s at an accelerating rate, nontrivial computing sys- execution while the invoked service carries out the tems will remain diverse and heterogeneous.1 caller’s request. In other words, while the called ser- Computing systems grow over time, which means vice is busy handling the caller’s request, the call- hardware and applications purchased years ago ing thread stops executing and waits until the must work together with those purchased just yes- request either returns normally or encounters an terday. Add factors such as mergers, reorganiza- error such as a timeout condition. Messaging sys- tions, leadership changes, and e-business into the tems, on the other hand, are based on a queuing picture, and the heterogeneity in the overall sys- abstraction in which producers post data to queues tem rises sharply. As much as we might wish oth- for consumers to retrieve and act upon. Messaging erwise, the complexity caused by this diversity will systems are typically data- or document-oriented, not disappear anytime soon, if ever. while RPC systems are procedure- or object- We’re surrounded by examples of successfully oriented. Middleware applications based on mes- deployed middleware in cost-effective and effi- saging typically have key abstractions and design cient production computing systems. Neverthe- centers that revolve around information, whereas less, it’s interesting to note that while middle- applications based on RPC center around the objects ware eases the diversity and heterogeneity and functions that provide system services. problem, it does not completely solve it. It’s iron- ic that all forms of middleware attempt to reduce Language-Specific vs. Language-Independent complexity by introducing artificial homogene- Many middleware systems support the integration ity into the system, which only delays the of applications written in different programming inevitable collision between heterogeneous sys- languages. Corba is probably the best example tems. The very ab-stractions and simplifications because it explicitly supports several language that allow middleware to address integration mappings for its Interface Definition Language issues can also cause problems between middle- (IDL), which is used for defining contracts for Corba ware systems. After all, middleware systems dif- objects. The argument for such middleware is that fer from each other, and system administrators complex computing systems — perhaps involving IEEE INTERNET COMPUTING 1089-7801/02/$17.00 ©2002 IEEE http://computer.org/internet/ MARCH • APRIL 2002 83 Toward Integration everything from handheld devices to Embedded vs. Enterprise sive, achieving acceptable levels of Windows laptops to Unix servers and Middleware has historically targeted both can be tricky. Power users want mainframes — are rarely written in a enterprise systems, which typically in- hooks into all parts of the middleware single language. Nevertheless, many volve many disparate computing sys- so they can take control wherever they systems, such as J2EE, are based on the tems, usually including one or more deem necessary, but they also want simplifying assumption that one pro- mainframes, across multiple company their applications’ performance levels gramming language is in use. Other divisions. Such systems normally seek to be the same as if they were running single-language distributed systems to improve business process automa- directly on the operating system. Too have also been developed using C++, tion. Embedded systems, with their spe- many configuration “knobs,” on the Modula-3, and Smalltalk. cial hardware environments and typi- other hand, often frighten new users; cally stringent software requirements, they want to simply install the mid- Proprietary vs. Standards-Based were mostly off limits for middleware dleware and have it work. Finding a The argument for middleware stan- until recently. Advances in hardware suitable balance between these ex- dards is that by enabling interoper- and software have made embedded tremes is what keeps middleware ability and portability between prod- middleware viable, however, now that architects and designers up at night. ucts, they prevent “customer lock-in” developers can create embedded sys- As hardware performance has and allow users to select middleware tems using commercial off-the-shelf increased, so has the capacity to tune based on quality. In the real world, (COTS) components.2 Still, embedded middleware through configuration, however, this black-and-white stan- middleware faces real-time deadline rather than through programming. By dards ideal deteriorates into various and predictability constraints that often separating development from deploy- shades of gray as some vendors pay lip limit its size and available features. ment issues, this approach lowers main- tenance costs for middleware applica- tions. Our goal is to be able to affect the The most significant challenge...is facilitating application’s behavior without going Internet-scale application-to-application integration. back to modify, recompile, retest, and finally redeploy its source code. The deployment descriptor design of Enter- service to standards while still hook- Like its embedded counterpart, enter- prise Java Beans (EJB) is a prime exam- ing customers into lock-in. prise middleware also tends to address ple of this approach. An unfortunate On the other hand, even those mid- runtime overhead, but it can typically side effect of increasing the configura- dleware vendors that stay true to stan- ignore issues such as memory footprint. bility of applications, however, is that dards are typically forced to introduce Enterprise middleware also tends to be configuration has become nearly as proprietary features to cover areas the highly dynamically configurable, and it complicated as programming. standards do not address. No standard requires runtime management capabil- Reducing system complexity is in- can address all possible problems — ities that allow system operators to deed a significant challenge for middle- not even long-lived standards such as monitor for proper operation. Because ware suppliers. However, contemporary Corba or the collection created under it needs to integrate a wider array of middleware systems address such a wide the Java Community Process (www. disparate systems, users often judge variety of problems that they themselves jcp.org). Furthermore, standardization enterprise middleware mostly by how have become complicated, in some efforts can be lengthy, bureaucratic, easily it allows them to integrate new cases overly so. Clearly, middleware expensive, and political. Proprietary systems. On the other hand, users typi- designers need to make sure that their development efforts typically seek to cally judge real-time and embedded systems are flexible, but they need to avoid these negative aspects while middleware on memory footprint, per- establish reasonable default settings that protecting potentially lucrative secrets formance, and predictability. make reconfiguration unnecessary for from competitors. Very large compa- the most common cases. nies (such as Microsoft) or very small Middleware Challenges Perhaps the most significant chal- vendors are normally the ones that Despite the differences among com- lenge facing middleware today is facil- pursue proprietary efforts. The very peting systems, all middleware shares itating Internet-scale application-to- large believe their proprietary efforts some characteristics that make it chal- application integration. The World will eventually become actual or de lenging to build and deploy. Foremost Wide Web has shown us how the facto standards due to sheer volume, among these is that everyone wants Internet can be used to support suc- and the very small often believe their middleware to be as flexible as possi- cessful consumer-to-business interac- systems will be novel enough to dis- ble — and to provide high levels of tions. However, its browser-Web site rupt the market and force others to performance. Given that flexibility and architecture
Recommended publications
  • FUNDAMENTALS of COMPUTING (2019-20) COURSE CODE: 5023 502800CH (Grade 7 for ½ High School Credit) 502900CH (Grade 8 for ½ High School Credit)
    EXPLORING COMPUTER SCIENCE NEW NAME: FUNDAMENTALS OF COMPUTING (2019-20) COURSE CODE: 5023 502800CH (grade 7 for ½ high school credit) 502900CH (grade 8 for ½ high school credit) COURSE DESCRIPTION: Fundamentals of Computing is designed to introduce students to the field of computer science through an exploration of engaging and accessible topics. Through creativity and innovation, students will use critical thinking and problem solving skills to implement projects that are relevant to students’ lives. They will create a variety of computing artifacts while collaborating in teams. Students will gain a fundamental understanding of the history and operation of computers, programming, and web design. Students will also be introduced to computing careers and will examine societal and ethical issues of computing. OBJECTIVE: Given the necessary equipment, software, supplies, and facilities, the student will be able to successfully complete the following core standards for courses that grant one unit of credit. RECOMMENDED GRADE LEVELS: 9-12 (Preference 9-10) COURSE CREDIT: 1 unit (120 hours) COMPUTER REQUIREMENTS: One computer per student with Internet access RESOURCES: See attached Resource List A. SAFETY Effective professionals know the academic subject matter, including safety as required for proficiency within their area. They will use this knowledge as needed in their role. The following accountability criteria are considered essential for students in any program of study. 1. Review school safety policies and procedures. 2. Review classroom safety rules and procedures. 3. Review safety procedures for using equipment in the classroom. 4. Identify major causes of work-related accidents in office environments. 5. Demonstrate safety skills in an office/work environment.
    [Show full text]
  • IBM Research Report Proceedings of the IBM Phd Student Symposium at ICSOC 2006
    RC24118 (W0611-165) November 28, 2006 Computer Science IBM Research Report Proceedings of the IBM PhD Student Symposium at ICSOC 2006 Ed. by: Andreas Hanemann (Leibniz Supercomputing Center, Germany) Benedikt Kratz (Tilburg University, The Netherlands) Nirmal Mukhi (IBM Research, USA) Tudor Dumitras (Carnegie Mellon University, USA) Research Division Almaden - Austin - Beijing - Haifa - India - T. J. Watson - Tokyo - Zurich Preface Service-Oriented Computing (SoC) is a dynamic new field of research, creating a paradigm shift in the way software applications are designed and delivered. SoC technologies, through the use of open middleware standards, enable collab- oration across organizational boundaries and are transforming the information- technology landscape. SoC builds on ideas and experiences from many different fields to produce the novel research needed to drive this paradigm shift. The IBM PhD Student Symposium at ICSOC provides a forum where doc- toral students conducting research in SoC can present their on-going dissertation work and receive feedback from a group of well-known experts. Each presentation is organized as a mock thesis-defense, with a committee of 4 mentors providing extensive feedback and advice for completing a successful PhD thesis. This for- mat is similar to the one adopted by the doctoral symposia associated with ICSE, OOPSLA, ECOOP, Middleware and ISWC. The closing session of the symposium is a panel discussion where the roles are reversed, and the mentors answer the students’ questions about research careers in industry and academia. The symposium agenda also contains a keynote address on writing a good PhD dissertation, delivered by Dr. Priya Narasimhan, Assistant Professor at Carnegie Mellon University and member of the ACM Doctoral Dissertation Committee.
    [Show full text]
  • Top 10 Reasons to Major in Computing
    Top 10 Reasons to Major in Computing 1. Computing is part of everything we do! Computing and computer technology are part of just about everything that touches our lives from the cars we drive, to the movies we watch, to the ways businesses and governments deal with us. Understanding different dimensions of computing is part of the necessary skill set for an educated person in the 21st century. Whether you want to be a scientist, develop the latest killer application, or just know what it really means when someone says “the computer made a mistake”, studying computing will provide you with valuable knowledge. 2. Expertise in computing enables you to solve complex, challenging problems. Computing is a discipline that offers rewarding and challenging possibilities for a wide range of people regardless of their range of interests. Computing requires and develops capabilities in solving deep, multidimensional problems requiring imagination and sensitivity to a variety of concerns. 3. Computing enables you to make a positive difference in the world. Computing drives innovation in the sciences (human genome project, AIDS vaccine research, environmental monitoring and protection just to mention a few), and also in engineering, business, entertainment and education. If you want to make a positive difference in the world, study computing. 4. Computing offers many types of lucrative careers. Computing jobs are among the highest paid and have the highest job satisfaction. Computing is very often associated with innovation, and developments in computing tend to drive it. This, in turn, is the key to national competitiveness. The possibilities for future developments are expected to be even greater than they have been in the past.
    [Show full text]
  • Design and Architectures for Signal and Image Processing
    EURASIP Journal on Embedded Systems Design and Architectures for Signal and Image Processing Guest Editors: Markus Rupp, Dragomir Milojevic, and Guy Gogniat Design and Architectures for Signal and Image Processing EURASIP Journal on Embedded Systems Design and Architectures for Signal and Image Processing Guest Editors: Markus Rupp, Dragomir Milojevic, and Guy Gogniat Copyright © 2008 Hindawi Publishing Corporation. All rights reserved. This is a special issue published in volume 2008 of “EURASIP Journal on Embedded Systems.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Editor-in-Chief Zoran Salcic, University of Auckland, New Zealand Associate Editors Sandro Bartolini, Italy Thomas Kaiser, Germany S. Ramesh, India Neil Bergmann, Australia Bart Kienhuis, The Netherlands Partha S. Roop, New Zealand Shuvra Bhattacharyya, USA Chong-Min Kyung, Korea Markus Rupp, Austria Ed Brinksma, The Netherlands Miriam Leeser, USA Asim Smailagic, USA Paul Caspi, France John McAllister, UK Leonel Sousa, Portugal Liang-Gee Chen, Taiwan Koji Nakano, Japan Jarmo Henrik Takala, Finland Dietmar Dietrich, Austria Antonio Nunez, Spain Jean-Pierre Talpin, France Stephen A. Edwards, USA Sri Parameswaran, Australia Jurgen¨ Teich, Germany Alain Girault, France Zebo Peng, Sweden Dongsheng Wang, China Rajesh K. Gupta, USA Marco Platzner, Germany Susumu Horiguchi, Japan Marc Pouzet, France Contents
    [Show full text]
  • Open Dissertation Draft Revised Final.Pdf
    The Pennsylvania State University The Graduate School ICT AND STEM EDUCATION AT THE COLONIAL BORDER: A POSTCOLONIAL COMPUTING PERSPECTIVE OF INDIGENOUS CULTURAL INTEGRATION INTO ICT AND STEM OUTREACH IN BRITISH COLUMBIA A Dissertation in Information Sciences and Technology by Richard Canevez © 2020 Richard Canevez Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2020 ii The dissertation of Richard Canevez was reviewed and approved by the following: Carleen Maitland Associate Professor of Information Sciences and Technology Dissertation Advisor Chair of Committee Daniel Susser Assistant Professor of Information Sciences and Technology and Philosophy Lynette (Kvasny) Yarger Associate Professor of Information Sciences and Technology Craig Campbell Assistant Teaching Professor of Education (Lifelong Learning and Adult Education) Mary Beth Rosson Professor of Information Sciences and Technology Director of Graduate Programs iii ABSTRACT Information and communication technologies (ICTs) have achieved a global reach, particularly in social groups within the ‘Global North,’ such as those within the province of British Columbia (BC), Canada. It has produced the need for a computing workforce, and increasingly, diversity is becoming an integral aspect of that workforce. Today, educational outreach programs with ICT components that are extending education to Indigenous communities in BC are charting a new direction in crossing the cultural barrier in education by tailoring their curricula to distinct Indigenous cultures, commonly within broader science, technology, engineering, and mathematics (STEM) initiatives. These efforts require examination, as they integrate Indigenous cultural material and guidance into what has been a largely Euro-Western-centric domain of education. Postcolonial computing theory provides a lens through which this integration can be investigated, connecting technological development and education disciplines within the parallel goals of cross-cultural, cross-colonial humanitarian development.
    [Show full text]
  • Middleware-Based Database Replication: the Gaps Between Theory and Practice
    Appears in Proceedings of the ACM SIGMOD Conference, Vancouver, Canada (June 2008) Middleware-based Database Replication: The Gaps Between Theory and Practice Emmanuel Cecchet George Candea Anastasia Ailamaki EPFL EPFL & Aster Data Systems EPFL & Carnegie Mellon University Lausanne, Switzerland Lausanne, Switzerland Lausanne, Switzerland [email protected] [email protected] [email protected] ABSTRACT There exist replication “solutions” for every major DBMS, from Oracle RAC™, Streams™ and DataGuard™ to Slony-I for The need for high availability and performance in data Postgres, MySQL replication and cluster, and everything in- management systems has been fueling a long running interest in between. The naïve observer may conclude that such variety of database replication from both academia and industry. However, replication systems indicates a solved problem; the reality, academic groups often attack replication problems in isolation, however, is the exact opposite. Replication still falls short of overlooking the need for completeness in their solutions, while customer expectations, which explains the continued interest in developing new approaches, resulting in a dazzling variety of commercial teams take a holistic approach that often misses offerings. opportunities for fundamental innovation. This has created over time a gap between academic research and industrial practice. Even the “simple” cases are challenging at large scale. We deployed a replication system for a large travel ticket brokering This paper aims to characterize the gap along three axes: system at a Fortune-500 company faced with a workload where performance, availability, and administration. We build on our 95% of transactions were read-only. Still, the 5% write workload own experience developing and deploying replication systems in resulted in thousands of update requests per second, which commercial and academic settings, as well as on a large body of implied that a system using 2-phase-commit, or any other form of prior related work.
    [Show full text]
  • Scheduling Many-Task Workloads on Supercomputers: Dealing with Trailing Tasks
    Scheduling Many-Task Workloads on Supercomputers: Dealing with Trailing Tasks Timothy G. Armstrong, Zhao Zhang Daniel S. Katz, Michael Wilde, Ian T. Foster Department of Computer Science Computation Institute University of Chicago University of Chicago & Argonne National Laboratory [email protected], [email protected] [email protected], [email protected], [email protected] Abstract—In order for many-task applications to be attrac- as a worker and allocate one task per node. If tasks are tive candidates for running on high-end supercomputers, they single-threaded, each core or virtual thread can be treated must be able to benefit from the additional compute, I/O, as a worker. and communication performance provided by high-end HPC hardware relative to clusters, grids, or clouds. Typically this The second feature of many-task applications is an empha- means that the application should use the HPC resource in sis on high performance. The many tasks that make up the such a way that it can reduce time to solution beyond what application effectively collaborate to produce some result, is possible otherwise. Furthermore, it is necessary to make and in many cases it is important to get the results quickly. efficient use of the computational resources, achieving high This feature motivates the development of techniques to levels of utilization. Satisfying these twin goals is not trivial, because while the efficiently run many-task applications on HPC hardware. It parallelism in many task computations can vary over time, allows people to design and develop performance-critical on many large machines the allocation policy requires that applications in a many-task style and enables the scaling worker CPUs be provisioned and also relinquished in large up of existing many-task applications to run on much larger blocks rather than individually.
    [Show full text]
  • Runtime Monitoring of Web Service Choreographies Using Streaming XML
    Runtime Monitoring of Web Service Choreographies Using Streaming XML ∗ Sylvain Hall´e Roger Villemaire University of California, Santa Barbara Universit´edu Qu´ebec `aMontr´eal Department of Computer Science C.P. 8888, Succ. Centre-ville Santa Barbara, CA 9310-65110 Montreal, Canada H3C 3P8 [email protected] [email protected] ABSTRACT web services. Since most web services exchange XML mes- A wide range of web service choreography constraints on sages, one can refer to a recorded trace as an XML “docu- the content and sequentiality of messages can be translated ment” that can be analyzed using standard XML tools, us- into Linear Temporal Logic (LTL). Although they can be ing for example the XML Query Language (XQuery) [19,28]. checked statically on abstractions of actual services, it is However, most works attempting to tap on the resources desirable that violations of these specifications be also de- available in XQuery engines operate in a post mortem fash- tected at runtime. In this paper, we show that, given a ion: an instance of a choreography must be finished be- suitable translation of LTL formulæ into XQuery expres- fore analysis can take place on a complete XML document. sions, such runtime monitoring of choreography constraints While in some cases, a post mortem analysis on recorded is possible by feeding the trace of messages to a streaming traces is appropriate, there exist situations where violations XQuery processor. The forward-only fragment of LTL is in- of a specification must be addressed as soon as they are troduced; it represents the fragment of LTL supported by discovered.
    [Show full text]
  • Advanced Digital Broadcast Holdings S.A. Annual Report
    ADVANCED DIGITAL BROADCAST HOLDINGS S.A. ANNUAL REPORT 2006 Art Director: Ireneusz Golka Contents To Our Shareholders ……………… 6 Business, Operations and Strategy … 9 Corporate Governance …………… 29 Consolidated Financial Statements … 57 Statutory Financial Statements … 101 2006 : a technology year Business Highlights Revenue growing 5% to US$ 262 million Record half-year revenue at US$ 164.3 million 6 new Set-Top Box customers Hansenet (Germany, IPTV), Island Media (US, Satellite), ITI Neovision (Poland, Satellite), Telefonica O2 Czech Republic (Czech Republic, IPTV), Telecom Project 5 (Russia, Terrestrial), Jazztel (Spain, IPTV) Shift to high-end: HD-MPEG4 products at 20% of 2006 Revenue First significant sales in Americas 6% of the Group’s full-year revenue Long-term strategic partnership with ITI Neovision of Poland encompassing full-fledge collaboration, exclusivity and financial arrangements IPTV up 41%, Satellite up 140%, SW & Services up 220% compensated weak Italian DTT market and technical delays Awarded in Europe’s 500 - Entrepreneurs for Growth ranked 173 of 500 companies selected amongst 28 countries, for having achieved 58% annual compound average growth rate and the creation of more than 190 jobs, primarily in Europe, over 2002-2005 4 o ADB HOLDINGS o ANNUAL REPORT 2006 Strengthening ADB Group : High-End Focus a technology leader IN % OF 2006 DIGITAL TV EQUIPMENT SEGMENT REVENUE HD products in Italian RAI and UK BBC HD trials n MPEG2 SD, Others 62% n MPEG4 SD 16% World’s first hybrid, single-chip, n MPEG4 HD 22% advanced video coding,
    [Show full text]
  • From Ethnomathematics to Ethnocomputing
    1 Bill Babbitt, Dan Lyles, and Ron Eglash. “From Ethnomathematics to Ethnocomputing: indigenous algorithms in traditional context and contemporary simulation.” 205-220 in Alternative forms of knowing in mathematics: Celebrations of Diversity of Mathematical Practices, ed Swapna Mukhopadhyay and Wolff- Michael Roth, Rotterdam: Sense Publishers 2012. From Ethnomathematics to Ethnocomputing: indigenous algorithms in traditional context and contemporary simulation 1. Introduction Ethnomathematics faces two challenges: first, it must investigate the mathematical ideas in cultural practices that are often assumed to be unrelated to math. Second, even if we are successful in finding this previously unrecognized mathematics, applying this to children’s education may be difficult. In this essay, we will describe the use of computational media to help address both of these challenges. We refer to this approach as “ethnocomputing.” As noted by Rosa and Orey (2010), modeling is an essential tool for ethnomathematics. But when we create a model for a cultural artifact or practice, it is hard to know if we are capturing the right aspects; whether the model is accurately reflecting the mathematical ideas or practices of the artisan who made it, or imposing mathematical content external to the indigenous cognitive repertoire. If I find a village in which there is a chain hanging from posts, I can model that chain as a catenary curve. But I cannot attribute the knowledge of the catenary equation to the people who live in the village, just on the basis of that chain. Computational models are useful not only because they can simulate patterns, but also because they can provide insight into this crucial question of epistemological status.
    [Show full text]
  • Cloud Computing and E-Commerce in Small and Medium Enterprises (SME’S): the Benefits, Challenges
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Cloud Computing and E-commerce in Small and Medium Enterprises (SME’s): the Benefits, Challenges Samer Jamal Abdulkader1, Abdallah Mohammad Abualkishik2 1, 2 Universiti Tenaga Nasional, College of Graduate Studies, Jalan IKRAM-UNITEN, 43000 Kajang, Selangor, Malaysia Abstract: Nowadays the term of cloud computing is become widespread. Cloud computing can solve many problems that faced by Small and medium enterprises (SME’s) in term of cost-effectiveness, security-effectiveness, availability and IT-resources (hardware, software and services). E-commerce in Small and medium enterprises (SME’s) is need to serve the customers a good services to satisfy their customers and give them good profits. These enterprises faced many issues and challenges in their business like lake of resources, security and high implementation cost and so on. This paper illustrate the literature review of the benefits can be serve by cloud computing and the issues and challenges that E-commerce Small and medium enterprises (SME’s) faced, and how cloud computing can solve these issues. This paper also presents the methodology that will be used to gather data to see how far the cloud computing has influenced the E-commerce small and medium enterprises in Jordan. Keywords: Cloud computing, E-commerce, SME’s. 1. Introduction applications, and services) that can be rapidly provisioned and released with minimal management effort or service Information technology (IT) is playing an important role in provider interaction.” [7]. From the definition of NIST there the business work way, like how to create the products, are four main services classified as cloud services which are; services to the enterprise customers [1].
    [Show full text]
  • Web Services, CORBA and Other Middleware
    Web Services, CORBA and other Middleware © Copyright IONA Technologies 2002 Dr. Seán Baker IONA Technologies Web Services For The Integrated Enterprise, OMG Workshop, Munich Feb 2003 Overview • There a number of different types of middleware – So what does Web Services offer? © Copyright IONA Technologies 2002 IONA © Copyright 2 2 Middleware • Middleware enables integration, but there are multiple – competing – choices: –CORBA –J2EE –.NET © Copyright IONA Technologies 2002 IONA © Copyright – Various MoM & EAI proprietary middleware – Web Sevices – the new kid on the block. 3 3 There’s lots of choice • Some based on technical grounds, including: – RPC versus message passing – Java specific versus multi-language – Direct versus indirect communication – Permanent versus occasional connection © Copyright IONA Technologies 2002 IONA © Copyright – Platform versus integration middleware • Some based on personal choice 4 4 Intra-enterprise versus inter-enterprise • Most middleware has been designed for intra- enterprise • Inter-enterprise adds at least two challenges – Firewalls ( & inter-enterprise security in general) © Copyright IONA Technologies 2002 IONA © Copyright – Different middleware may be used at the two ends • As well as different operating system, languages, etc 5 5 Web Services • Aims to address both of these issues – Its protocol is layered on HTTP • So it can flow through a firewall • This “cheat” raises security and other concerns, but ones that need to be addressed in any case – It uses XML to format messages © Copyright IONA
    [Show full text]