domingo, 9 de outubro de 2011
Apple's Tim Cook: "No words can adequately express our sadness at Steve's death"
Apple's Tim Cook: "No words can adequately express our sadness at Steve's death"
Tim Cook, who took over for Steve Jobs as Apple CEO in August of 2011, has sent a new e-mail to employees in the wake of Steve Jobs' recent death. Cook addresses Apple's employees to announce that Jobs has passed and offers reflections on Jobs' influence on the company. Below is the full text of the e-mail (Apple posted the text of the letter to its Press Info page):
Team,
I have some very sad news to share with all of you. Steve passed away earlier today.
Apple has lost a visionary and creative genius, and the world has lost an amazing human being. Those of us who have been fortunate enough to know and work with Steve have lost a dear friend and an inspiring mentor. Steve leaves behind a company that only he could have built, and his spirit will forever be the foundation of Apple.
We are planning a celebration of Steve’s extraordinary life for Apple employees that will take place soon. If you would like to share your thoughts, memories and condolences in the interim, you can simply email rememberingsteve@apple.com.
No words can adequately express our sadness at Steve’s death or our gratitude for the opportunity to work with him. We will honor his memory by dedicating ourselves to continuing the work he loved so much.
Tim
sábado, 2 de outubro de 2010
Inside the mind of a Russian hacker
Andrei is a young man with immense power at his fingertips. He's a reformed Russian hacker.
Back hunched, eyes fixed on the computer screen in front of him, he demonstrates what he can do.
"Look, here's the log-in and the password," he says, pulling up a Georgian government website.
"This site has already been hacked, I'm just demonstrating the vulnerability. But it's easy if you know how."
At just 20 years old, Andrei works for an information security firm. He says he does nothing illegal now, but he used to.
"I started when I was 14. I hacked a series of military resources, the US army, some Russian departments. I wanted to examine how well protected they were."
Andrei sees nothing wrong with what he did, as he made no money from it. Hacking for him is all about the technical challenge and the thrill.
"It's like when you have a maths problem," he says. "You don't know what tools to use, you know nothing. But you want to master it, understand it, and then use that knowledge in the future."
Technical skill
Andrei is not alone in his passion. Yevgeny Kaspersky describes Russia as a nation of "super hackers" and he should know.
Mr Kaspersky has made his name battling the world's cyber criminals. The computer security guru says hackers in China and Latin America generate the greatest number of cyber-attacks.
The most sophisticated come from his own country.
"Russian attacks look more professional. The malware and design is more complicated and more technical," Mr Kaspersky says.
"I think it's thanks to Russia's technical education. Its graduates are probably the best."
Four hours flight east of Moscow, the next generation of those graduates is in training.
In the snow-coated Siberian city of Tomsk, one in every five residents is a student. Information security is what they excel in. But in college corridors here, students talk of hacking with respect, even reverence.
"Hacking is an art, the art of breaking-in," Alexei says. "A true hacker strives to learn something new. It's the art of constantly achieving new heights of expertise."
The students don't learn this art directly in class. Alexei says his institute only "helps him in the right direction". But there are plenty of opportunities to hone your hacking skills on campus.
One, is when the Sibears do battle.
The cyber-warriors of Tomsk university consistently finish among the top three teams in international information protection contests. They train each week, hunting for flaws in each others cyber defences.
"I've found lots of flags! It was a successful attack," Zheniya whoops as he identifies a weak spot in his opponent's system. "Now I can get access to their database," he grins and prepares to swoop.
Cash call
For these Siberian students, hacking is a test of their knowledge and ingenuity. As Zheniya explained, you can't defend a system unless you understand the principles of attack. But there is another illegal market for their undoubted skills.
The team members say they've never been tempted but back in Moscow, Andrei admits that when he started hacking, he was constantly approached and offered money to hire his services.
First, friends and relatives wanted him to break into e-mail accounts, or destroy websites.
Then the demands became more serious.
"There were people who wanted me to infect a large number of users who were clients of a certain bank, so they could use their computers to transfer money," Andrei remembers, but says he refused. "That's not ethical."
For those who are lured by the promise of riches, Russia's cyber police insist there's no such thing as anonymity in the internet. The department claims it has uncovered more than 7,000 cybercrimes in the past nine months.
Others fear that's only scraping the surface in the fight against a crime that knows no international boundaries.
That's why Mr Kaspersky is arguing for some form of government control of cyberspace.
"We depend on this network now, and we don't control it," he says, and suggests the introduction of internet passports for every user. For him, security concerns are more important than preserving full freedom.
That would certainly have complicated life for Andrei once. But he says he's abandoned criminal hacking now, and makes a living out of internet security services instead.
"It's still hacking, but because I get paid it gives me more pleasure. It's better than hacking illegally - and for nothing," he says.
But he estimates there are at least a hundred serious Russian hackers still at work.
And now a whole new generation of cyber-specialists is working its way through the country's colleges.
Soon, they too will be faced with a choice: whether to set their minds to creating sophisticated information protection systems, or join the ranks of Russia's hackers for hire.
Story from BBC NEWS:
http://j.mp/96iUnE
Back hunched, eyes fixed on the computer screen in front of him, he demonstrates what he can do.
"Look, here's the log-in and the password," he says, pulling up a Georgian government website.
"This site has already been hacked, I'm just demonstrating the vulnerability. But it's easy if you know how."
At just 20 years old, Andrei works for an information security firm. He says he does nothing illegal now, but he used to.
"I started when I was 14. I hacked a series of military resources, the US army, some Russian departments. I wanted to examine how well protected they were."
Andrei sees nothing wrong with what he did, as he made no money from it. Hacking for him is all about the technical challenge and the thrill.
"It's like when you have a maths problem," he says. "You don't know what tools to use, you know nothing. But you want to master it, understand it, and then use that knowledge in the future."
Technical skill
Andrei is not alone in his passion. Yevgeny Kaspersky describes Russia as a nation of "super hackers" and he should know.
Mr Kaspersky has made his name battling the world's cyber criminals. The computer security guru says hackers in China and Latin America generate the greatest number of cyber-attacks.
The most sophisticated come from his own country.
"Russian attacks look more professional. The malware and design is more complicated and more technical," Mr Kaspersky says.
"I think it's thanks to Russia's technical education. Its graduates are probably the best."
Four hours flight east of Moscow, the next generation of those graduates is in training.
In the snow-coated Siberian city of Tomsk, one in every five residents is a student. Information security is what they excel in. But in college corridors here, students talk of hacking with respect, even reverence.
"Hacking is an art, the art of breaking-in," Alexei says. "A true hacker strives to learn something new. It's the art of constantly achieving new heights of expertise."
The students don't learn this art directly in class. Alexei says his institute only "helps him in the right direction". But there are plenty of opportunities to hone your hacking skills on campus.
One, is when the Sibears do battle.
The cyber-warriors of Tomsk university consistently finish among the top three teams in international information protection contests. They train each week, hunting for flaws in each others cyber defences.
"I've found lots of flags! It was a successful attack," Zheniya whoops as he identifies a weak spot in his opponent's system. "Now I can get access to their database," he grins and prepares to swoop.
Cash call
For these Siberian students, hacking is a test of their knowledge and ingenuity. As Zheniya explained, you can't defend a system unless you understand the principles of attack. But there is another illegal market for their undoubted skills.
The team members say they've never been tempted but back in Moscow, Andrei admits that when he started hacking, he was constantly approached and offered money to hire his services.
First, friends and relatives wanted him to break into e-mail accounts, or destroy websites.
Then the demands became more serious.
"There were people who wanted me to infect a large number of users who were clients of a certain bank, so they could use their computers to transfer money," Andrei remembers, but says he refused. "That's not ethical."
For those who are lured by the promise of riches, Russia's cyber police insist there's no such thing as anonymity in the internet. The department claims it has uncovered more than 7,000 cybercrimes in the past nine months.
Others fear that's only scraping the surface in the fight against a crime that knows no international boundaries.
That's why Mr Kaspersky is arguing for some form of government control of cyberspace.
"We depend on this network now, and we don't control it," he says, and suggests the introduction of internet passports for every user. For him, security concerns are more important than preserving full freedom.
That would certainly have complicated life for Andrei once. But he says he's abandoned criminal hacking now, and makes a living out of internet security services instead.
"It's still hacking, but because I get paid it gives me more pleasure. It's better than hacking illegally - and for nothing," he says.
But he estimates there are at least a hundred serious Russian hackers still at work.
And now a whole new generation of cyber-specialists is working its way through the country's colleges.
Soon, they too will be faced with a choice: whether to set their minds to creating sophisticated information protection systems, or join the ranks of Russia's hackers for hire.
Story from BBC NEWS:
http://j.mp/96iUnE
terça-feira, 27 de julho de 2010
Vulnerabilidade no protocolo de segurança de redes sem-fio WPA2
Especialistas em segurança da AirTight Networks descobriram uma falha de segurança no protocolo de rede Wi-Fi WPA2. Potencialmente, permite ataques homem-no-meio (man-in-the-middle). Segundo o engenheiro Kaustubh Phanse, da AirTight, "não há nada no padrão 802.11 que permita criar um patch ou consertar a vulnerabilidade".
A falha foi chamada de "Hole 196", em referência à página 196 do manual de padrões da IEEE - entidade que regulamenta o setor.
Nessa página, o padrão IEEE explica as chaves usadas pelo WPA2: a PTK (Pairwise Transient Key), que é única para cada cliente Wi-Fi e usada para tráfego unidirecional e a GTK (Group Temporal Key), para broadcast.
Enquanto falsificações de dados e de endereços MAC podem ser detectados pela PTK, a GTK não oferece essa funcionalidade.
Os especialistas da AirTight dizem que essa é a questão central, porque permite a um cliente gerar pacotes arbitrários de broadcast, para que outros clientes respondam com informação sobre suas PTKs secretas, que podem ser decodificadas pelos atacantes.
A AirTight disse que bastam 10 linhas extras de código disponível na web para o driver open source Madwifi para fazer um PC com uma placa de rede comum simular o endereço MAC de um Acess Point (AP) e passar-se por gateway para o envio de tráfego.
Atacantes podem explorar isso para derrubar a rede, via ataque de negação de serviço (DoS). O único porém é que eles precisam estar dentro da rede Wi-Fi como usuários autorizados.
FONTE: Wi-Fi Networking News
A falha foi chamada de "Hole 196", em referência à página 196 do manual de padrões da IEEE - entidade que regulamenta o setor.
Nessa página, o padrão IEEE explica as chaves usadas pelo WPA2: a PTK (Pairwise Transient Key), que é única para cada cliente Wi-Fi e usada para tráfego unidirecional e a GTK (Group Temporal Key), para broadcast.
Enquanto falsificações de dados e de endereços MAC podem ser detectados pela PTK, a GTK não oferece essa funcionalidade.
Os especialistas da AirTight dizem que essa é a questão central, porque permite a um cliente gerar pacotes arbitrários de broadcast, para que outros clientes respondam com informação sobre suas PTKs secretas, que podem ser decodificadas pelos atacantes.
A AirTight disse que bastam 10 linhas extras de código disponível na web para o driver open source Madwifi para fazer um PC com uma placa de rede comum simular o endereço MAC de um Acess Point (AP) e passar-se por gateway para o envio de tráfego.
Atacantes podem explorar isso para derrubar a rede, via ataque de negação de serviço (DoS). O único porém é que eles precisam estar dentro da rede Wi-Fi como usuários autorizados.
FONTE: Wi-Fi Networking News
terça-feira, 6 de julho de 2010
Top 10 SOA and Web services tutorials and articles
A listing of the SOA and Web services zone's most popular content
Sarah Duffy (duffys@us.ibm.com), WebSphere and SOA Web Producer, IBM
Sarah Duffy is the editor of the developerWorks SOA and Web services zone. She currently divides her time between working on deverloperWorks content and producing the Web content for the SOA solutions and Application Infrastructure category pages.
You can contact Sarah at duffys@us.ibm.com.
Summary: Check out which SOA and Web services tutorials and articles developerWorks readers found most interesting last month.
Tags for this article: access, access_control, ajax, application_and_information_integration, application_development, architecture, architecture_-_application, architecture_-_enterprise, architecture_-_information, architecture_-_integration
Tutorials
1. SOA fundamentals in a nutshell
Thinking about getting certified in Service-Oriented Architecture (SOA)? Want to catch the wave of interest in SOA? Take this tutorial to prepare for the IBM SOA fundamentals test leading to your certification as an IBM Certified SOA Associate. Even if you're not planning for certification right now, this tutorial is a good place to start learning about what SOA is and what it can do for your organization.
2. Design and develop JAX-WS 2.0 Web services
Using Java API for XML Web Services (JAX-WS) technology to design and develop Web services yields many benefits, including simplifying the construction of Web services and Web service clients in Java, easing the development and deployment of Web services, and speeding up Web services development. This tutorial walks you through how to do all of this and more by developing a sample order-processing application that exposes its functionality as Web services. After going through this tutorial, you'll be able to apply these concepts and your newly acquired knowledge to develop Web services for your application using JAX-WS technology.
3. Understanding Web Services specifications, Part 1: SOAP
The current emphasis on Service-Oriented Architectures (SOA) has put the spotlight on Web services, but it's easy to get lost in all the information being bandied about. This first in a series of tutorials on the major Web services specifications describes the basic concepts of Web services and SOAP. You'll learn how to build a SOAP server and client.
4. Build Web services with transport-level security using Rational Application Developer V7, Part 1
Build secure Web services with transport-level security using IBM® Rational® Application Developer V7 and IBM WebSphere® Application Server V6.1. Follow this three-part series for step-by-step instructions about how to develop Web services and clients, configure HTTP basic authentication, and configure HTTP over SSL (HTTPS). This first part of the series walks you through building a Web service for a simple calculator application. You generate and test two different types of Web services clients: a Java™ Platform, Enterprise Edition (Java EE) client and a stand-alone Java client. You also handle user-defined exceptions in Web services.
5. IBM Certified SOA Solution Designer certification prep, Part 1: SOA best practices
Service-Oriented Architecture (SOA) is the next step in software development, leveraging XML technologies and Web services that went before. This best practices tutorial teaches you how to use SOA techniques in system design effectively. Use this tutorial, along with the other educational resources listed below, to help prepare for IBM Certified SOA Solution Designer certification.
6. Build HTTPS Web services with Rational Application Developer, Part 1: Web services and Web services clients
Build secure Web services using transport-level security (HTTPS) with IBM Rational Application Developer Version 6.0.1.1 and later. In Part 1 of this series, you will build Web services for a calculator application. You will generate and test two different types of Web services clients: a J2EE client and a J2SE client.
7. Understanding Web Services specifications, Part 4: WS-Security
This tutorial, Part 4 of the Understanding Web services specifications series, explains the concepts behind WS-Security and related standards such as XML Signature, which combine to make security in the Web services world not just possible, but practical.
8. Build HTTPS Web services with Rational Application Developer, Part 2: Configure HTTPS Web services
In Part 2 of this series, we configure HTTPS for a Web services application. We create a self-signed certificate using iKeyman and configure SSL settings using IBM WebSphere Admin Console. Finally, we test HTTPS Web services from both a Java 2 Enterprise Edition (J2EE) and Java 2 Platform, Standard Edition (J2SE) client.
9. Build Web services with transport-level security using Rational Application Developer V7, Part 2
Part 1 of this tutorial series gave you step-by-step instructions for building a Web service for a simple calculator application. You generated Web services and tested two different types of Web services clients—a Java Platform, Enterprise Edition (Java EE) client and a stand-alone Java client—and handled user-defined exceptions in Web services. This second installment in the three-part series shows you how to configure HTTP basic authentication for your Web services and Web services client, and monitor the HTTP basic authentication information using the TCP/IP monitor.
10. Build Web services with transport-level security using Rational Application Developer V7, Part 3
Part 1 and Part 2 of this three-part tutorial series showed you how to develop Web services and clients, and configure HTTP basic authentication. In this final installment, you create a self-signed certificate, key store, trust store, and Secure Sockets Layer (SSL) configuration using the IBM WebSphere Administrative Console. Then you configure HTTPS for your Web services and Web services client, and test HTTPS Web services from both a Java Platform, Enterprise Edition (Java EE) client and a stand-alone Java client.
Back to top
Articles
1. Which style of WSDL should I use?
A Web Services Description Language (WSDL) binding style can be RPC or document. The use can be encoded or literal. How do you determine which combination of style and use to use? The author describes the WSDL and SOAP messages for each combination to help you decide.
2. Invoking Web services with Java clients
In this article, IBM developer Bertrand Portier describes the different types of Java Web services clients and explains how to write portable, vendor independent code. There are two families of Web services clients in the Java world: unmanaged and J2EE container-managed clients. The article starts by briefly describing the Web services invocation process and the Web services standards for Java environments. The two families of Java Web services clients are then described, including their similarities and differences for the two steps they need to perform: service lookup and access.
3. New to SOA and Web services
Introduction to SOA and Web services through entry points, scenarios and real customer case study scenarios.
4. Call SOAP Web services with Ajax, Part 1: Build the Web services client
Implement a Web browser-based SOAP Web services client using the Asynchronous JavaScript + XML (Ajax) design pattern.
5. Service-oriented modeling and architecture
This article discusses the highlights of service-oriented modeling and architecture; the key activities that you need for the analysis and design required to build a Service-Oriented Architecture (SOA). The author stresses the importance of addressing the techniques required for the identification, specification and realization of services, their flows and composition, as well as the enterprise-scale components needed to realize and ensure the quality of services required of a SOA.
6. Using WSDL in SOAP applications
Web Services Description Language (WSDL) is a new specification to describe networked XML-based services. It provides a simple way for service providers to describe the basic format of requests to their systems regardless of the underlying protocol (such as SOAP or XML) or encoding (such as Multipurpose Internet Messaging Extensions). WSDL is a key part of the effort of the Universal Description, Discovery and Integration (UDDI) initiative to provide directories and descriptions of such on-line services for electronic business. This article provides a brief background and technical introduction to WSDL. Knowledge of XML and XML Namespaces is required and some familiarity with XML Schemas and SOAP is useful.
7. Web services hints and tips: JAX-RPC versus JAX-WS, Part 1
JAX-WS 2.0 is the successor to JAX-RPC 1.1. This article introduces a series that compares these two Java™ Web services programming models.
8. Deploying Web services with WSDL: Part 1
In the Deploying Web services with WSDL series, Bilal will explore all major technical aspects of creating, deploying, and publishing Web services—from Web Services Markup Language (WSDL), to SOAP, and Universal Description Discovery and Integration (UDDI) registries. Part 1 focuses on WSDL authoring: You will learn how to manually create a WSDL interface, and then compare your effort with the output of a WSDL authoring tool.
9. Service-oriented modeling and architecture
This article discusses the highlights of service-oriented modeling and architecture; the key activities that you need for the analysis and design required to build a Service-Oriented Architecture (SOA).
10. Get ahead with Java Web services
Java developers who are interested in getting started with Web services should check out the Java Web Services Developers Pack (WSDP). In this article, James McCarthy takes you on a quick tour of this package. You'll learn what the tools in this package can do for you, and find out which components are just for testing and which are ready for production use as-is.
Resources
* Browse the technology bookstore for books on these and other technical topics.
* Check out developerWorks blogs and get involved in the developerWorks community.
* Download IBM product evaluation versions or explore the online trials in the IBM SOA Sandbox and get your hands on application development tools and middleware products from DB2®, Lotus®, Rational®, Tivoli®, and WebSphere®.
About the author
Sarah Duffy is the editor of the developerWorks SOA and Web services zone. She currently divides her time between working on deverloperWorks content and producing the Web content for the SOA solutions and Application Infrastructure category pages. You can contact Sarah at duffys@us.ibm.com.
FONTE: IBM developerWorks > SOA and Web services > Technical library
Sarah Duffy (duffys@us.ibm.com), WebSphere and SOA Web Producer, IBM
Sarah Duffy is the editor of the developerWorks SOA and Web services zone. She currently divides her time between working on deverloperWorks content and producing the Web content for the SOA solutions and Application Infrastructure category pages.
You can contact Sarah at duffys@us.ibm.com.
Summary: Check out which SOA and Web services tutorials and articles developerWorks readers found most interesting last month.
Tags for this article: access, access_control, ajax, application_and_information_integration, application_development, architecture, architecture_-_application, architecture_-_enterprise, architecture_-_information, architecture_-_integration
Tutorials
1. SOA fundamentals in a nutshell
Thinking about getting certified in Service-Oriented Architecture (SOA)? Want to catch the wave of interest in SOA? Take this tutorial to prepare for the IBM SOA fundamentals test leading to your certification as an IBM Certified SOA Associate. Even if you're not planning for certification right now, this tutorial is a good place to start learning about what SOA is and what it can do for your organization.
2. Design and develop JAX-WS 2.0 Web services
Using Java API for XML Web Services (JAX-WS) technology to design and develop Web services yields many benefits, including simplifying the construction of Web services and Web service clients in Java, easing the development and deployment of Web services, and speeding up Web services development. This tutorial walks you through how to do all of this and more by developing a sample order-processing application that exposes its functionality as Web services. After going through this tutorial, you'll be able to apply these concepts and your newly acquired knowledge to develop Web services for your application using JAX-WS technology.
3. Understanding Web Services specifications, Part 1: SOAP
The current emphasis on Service-Oriented Architectures (SOA) has put the spotlight on Web services, but it's easy to get lost in all the information being bandied about. This first in a series of tutorials on the major Web services specifications describes the basic concepts of Web services and SOAP. You'll learn how to build a SOAP server and client.
4. Build Web services with transport-level security using Rational Application Developer V7, Part 1
Build secure Web services with transport-level security using IBM® Rational® Application Developer V7 and IBM WebSphere® Application Server V6.1. Follow this three-part series for step-by-step instructions about how to develop Web services and clients, configure HTTP basic authentication, and configure HTTP over SSL (HTTPS). This first part of the series walks you through building a Web service for a simple calculator application. You generate and test two different types of Web services clients: a Java™ Platform, Enterprise Edition (Java EE) client and a stand-alone Java client. You also handle user-defined exceptions in Web services.
5. IBM Certified SOA Solution Designer certification prep, Part 1: SOA best practices
Service-Oriented Architecture (SOA) is the next step in software development, leveraging XML technologies and Web services that went before. This best practices tutorial teaches you how to use SOA techniques in system design effectively. Use this tutorial, along with the other educational resources listed below, to help prepare for IBM Certified SOA Solution Designer certification.
6. Build HTTPS Web services with Rational Application Developer, Part 1: Web services and Web services clients
Build secure Web services using transport-level security (HTTPS) with IBM Rational Application Developer Version 6.0.1.1 and later. In Part 1 of this series, you will build Web services for a calculator application. You will generate and test two different types of Web services clients: a J2EE client and a J2SE client.
7. Understanding Web Services specifications, Part 4: WS-Security
This tutorial, Part 4 of the Understanding Web services specifications series, explains the concepts behind WS-Security and related standards such as XML Signature, which combine to make security in the Web services world not just possible, but practical.
8. Build HTTPS Web services with Rational Application Developer, Part 2: Configure HTTPS Web services
In Part 2 of this series, we configure HTTPS for a Web services application. We create a self-signed certificate using iKeyman and configure SSL settings using IBM WebSphere Admin Console. Finally, we test HTTPS Web services from both a Java 2 Enterprise Edition (J2EE) and Java 2 Platform, Standard Edition (J2SE) client.
9. Build Web services with transport-level security using Rational Application Developer V7, Part 2
Part 1 of this tutorial series gave you step-by-step instructions for building a Web service for a simple calculator application. You generated Web services and tested two different types of Web services clients—a Java Platform, Enterprise Edition (Java EE) client and a stand-alone Java client—and handled user-defined exceptions in Web services. This second installment in the three-part series shows you how to configure HTTP basic authentication for your Web services and Web services client, and monitor the HTTP basic authentication information using the TCP/IP monitor.
10. Build Web services with transport-level security using Rational Application Developer V7, Part 3
Part 1 and Part 2 of this three-part tutorial series showed you how to develop Web services and clients, and configure HTTP basic authentication. In this final installment, you create a self-signed certificate, key store, trust store, and Secure Sockets Layer (SSL) configuration using the IBM WebSphere Administrative Console. Then you configure HTTPS for your Web services and Web services client, and test HTTPS Web services from both a Java Platform, Enterprise Edition (Java EE) client and a stand-alone Java client.
Back to top
Articles
1. Which style of WSDL should I use?
A Web Services Description Language (WSDL) binding style can be RPC or document. The use can be encoded or literal. How do you determine which combination of style and use to use? The author describes the WSDL and SOAP messages for each combination to help you decide.
2. Invoking Web services with Java clients
In this article, IBM developer Bertrand Portier describes the different types of Java Web services clients and explains how to write portable, vendor independent code. There are two families of Web services clients in the Java world: unmanaged and J2EE container-managed clients. The article starts by briefly describing the Web services invocation process and the Web services standards for Java environments. The two families of Java Web services clients are then described, including their similarities and differences for the two steps they need to perform: service lookup and access.
3. New to SOA and Web services
Introduction to SOA and Web services through entry points, scenarios and real customer case study scenarios.
4. Call SOAP Web services with Ajax, Part 1: Build the Web services client
Implement a Web browser-based SOAP Web services client using the Asynchronous JavaScript + XML (Ajax) design pattern.
5. Service-oriented modeling and architecture
This article discusses the highlights of service-oriented modeling and architecture; the key activities that you need for the analysis and design required to build a Service-Oriented Architecture (SOA). The author stresses the importance of addressing the techniques required for the identification, specification and realization of services, their flows and composition, as well as the enterprise-scale components needed to realize and ensure the quality of services required of a SOA.
6. Using WSDL in SOAP applications
Web Services Description Language (WSDL) is a new specification to describe networked XML-based services. It provides a simple way for service providers to describe the basic format of requests to their systems regardless of the underlying protocol (such as SOAP or XML) or encoding (such as Multipurpose Internet Messaging Extensions). WSDL is a key part of the effort of the Universal Description, Discovery and Integration (UDDI) initiative to provide directories and descriptions of such on-line services for electronic business. This article provides a brief background and technical introduction to WSDL. Knowledge of XML and XML Namespaces is required and some familiarity with XML Schemas and SOAP is useful.
7. Web services hints and tips: JAX-RPC versus JAX-WS, Part 1
JAX-WS 2.0 is the successor to JAX-RPC 1.1. This article introduces a series that compares these two Java™ Web services programming models.
8. Deploying Web services with WSDL: Part 1
In the Deploying Web services with WSDL series, Bilal will explore all major technical aspects of creating, deploying, and publishing Web services—from Web Services Markup Language (WSDL), to SOAP, and Universal Description Discovery and Integration (UDDI) registries. Part 1 focuses on WSDL authoring: You will learn how to manually create a WSDL interface, and then compare your effort with the output of a WSDL authoring tool.
9. Service-oriented modeling and architecture
This article discusses the highlights of service-oriented modeling and architecture; the key activities that you need for the analysis and design required to build a Service-Oriented Architecture (SOA).
10. Get ahead with Java Web services
Java developers who are interested in getting started with Web services should check out the Java Web Services Developers Pack (WSDP). In this article, James McCarthy takes you on a quick tour of this package. You'll learn what the tools in this package can do for you, and find out which components are just for testing and which are ready for production use as-is.
Resources
* Browse the technology bookstore for books on these and other technical topics.
* Check out developerWorks blogs and get involved in the developerWorks community.
* Download IBM product evaluation versions or explore the online trials in the IBM SOA Sandbox and get your hands on application development tools and middleware products from DB2®, Lotus®, Rational®, Tivoli®, and WebSphere®.
About the author
Sarah Duffy is the editor of the developerWorks SOA and Web services zone. She currently divides her time between working on deverloperWorks content and producing the Web content for the SOA solutions and Application Infrastructure category pages. You can contact Sarah at duffys@us.ibm.com.
FONTE: IBM developerWorks > SOA and Web services > Technical library
segunda-feira, 7 de junho de 2010
No evento anual da Apple, Steve Jobs anuncia iPhone 4 e cita venda de 2 milhões de iPads em 2 meses - 1 a cada 3 segundos
"Steve, we love you!". Assim o CEO da Apple foi recebido esta tarde, ao subir no palco do Moscone Center, em São Francisco, durante a WWDC - Worldwide Developers Conference. Tradicionalmente, é neste evento anual que são anunciados os novos produtos que a Apple colocará à disposição do mercado. O discurso de Jobs começou com uma menção ao iPad, lançado há pouco mais de 2 meses. Neste curto espaço de tempo, 2 milhões de aparelhos foram vendidos - 1 a cada 3 segundos. Até julho, 19 países deverão ter o produto comercializado de forma legal, e mais de 8500 aplicativos estarão disponíveis para os usuários.
iBook Store:
A loja de livros virtuais da Apple também demonstrou ser um sucesso, de acordo com Jobs. Em 65 dias, mais de 5 milhões de livros foram baixados - média de 2,5 títulos por iPad. A loja da Apple já é responsável por 22% do mercado de ebooks, um índice respeitável para qualquer empresa recém-chegada em qualquer mercado. Uma novidade, agora, é a possibilidade de leitura de PDF nos iPads (algo curioso, já que Apple e Adobe só trocaram farpas nos últimos meses). Também é possível marcar textos e páginas, adicionar notas e visualizar os livros como se estivessem em uma estante virtual.
iPhone App Store:
A App Store é a maior loja de aplicativos do mundo. São 225 mil softwares à disposição do usuário, e mais de 5 bilhões de downloads já foram feitos desde o início das operações. A cada semana, 15 mil novos aplicativos são enviados para aprovação, entre novidades e updates. Jobs ressaltou alguns novos aplicativos que deverão estar disponíveis em breve, como o Netflix (americanos - e só eles, já que não temos Netflix no Brasil - poderão gerenciar toda a biblioteca de filmes via iPhone), Farmville e outros jogos da Zynga para iPhone (com o uso do zoom, é possível realizar qualquer atividade no joguinho que é hit no Facebook).
iPhone 4:
No momento mais esperado do evento, Steve Jobs finalmente anunciou o iPhone 4. E parece que o pessoal do Gizmodo realmente teve em mãos o protótipo do aparelho. A primeira característica apontada é o design, bem parecido com o publicado pelo site americano. Com apenas 9,3 mm, cobertura de aço inox e extremidades menos arredondadas, é o smartphone mais fino do planeta no momento. A câmera na frente permite a realização de video-chamadas, e a traseira, agora, traz um flash LED e possui 5 MP. Além disso, o aparelho consegue gravar vídeos em HD ( qualidade 720p e 30 frames por segundo). E mais: basta um "tapinha" na tela para o foco ser ajustado automaticamente!
A câmera frontal permite videochamada (ou "timeface", como Jobs preferiu chamar). A diferença, aqui, é que é possível utilizar a rede Wi-Fi e conversar com outros usuários do aparelho, em voz e imagem, sem pagar por isso.
A tela tem definição de 326 pixels por polegada (o olho humano só consegue perceber 300 pixels por polegada). Isso faz com que o iPhone 4 seja o aparelho com o melhor display do mercado. Se comparado com o iPhone 3GS, ele possui 4 vezes mais resolução (960 x 640 pixels), 4 vezes mais taxa de contraste (800:1), traz o processador Apple A4 (mesmo do iPad) e utiliza tecnologia IPS que, de acordo com Jobs, é melhor que o OLED. A bateria segura 7 horas de conversação, 6 horas de navegação em 3G, 10 horas de navegação em Wi-Fi e até 300 horas em standby.
Outro detalhe implementado no novo iPhone é o giroscópio. Agora, o aparelho tem noção dos 3 eixos, e isso abre toda uma nova área para desenvolvedores de games explorarem.
O lançamento do iMovie para iPhone (US$4,99) promete revolucionar a forma como os usuários trabalham os vídeos no aparelho. Será possível incluir transições entre clipes, efeitos, títulos e música. A localização geográfica também pode ser utilizada para personalizar temas. Ao final da edição, o vídeo pode ser exportado em diversas resoluções.
iOS4:
Sim, este é o novo nome do iPhone OS 4, disponível para o público ainda este mês. Ele é quem vai permitir o já esperado multitasking. "Pessoas questionaram: 'vocês não são os primeiros a ter a função', mas a minha resposta para elas é que primeiro, decidimos aprimorar a técnica, senão mataríamos a bateria em um segundo", defende Jobs. Agora, o usuário do iPhone, iPod Touch e iPad também pode organizar seus ícones e aplicativos em pastas. A adição do buscador Bing pode parecer algo pouco importante, mas imprime mais um capítulo à outra briga: Google vs Apple (iPhone vs Android). Na apresentação, Jobs se desmanchou em elogios para o buscador da Microsoft.
O iOS4 estará disponível gratuitamente para iPhone 3GS, iPhone 3G e iPod Touch, a partir de 21 de junho.
iAds:
Nova plataforma de publicidade no iPhone. Por meio de links patrocinados, os desenvolvedores poderão ganhar dinheiro com a exibição e o download de seus aplicativos. A Apple é responsável pela venda e hospedagem dos anúncios, 60% do lucro será revertido para os desenvolvedores e o pagamento será feito via iTunes Connect.É só torcermos para que os apps gratuitos não apresentem pop-ups chatos a cada 5 minutos...
Preço:
No mercado americano, os aparelhos custarão $199 no modelo de 16GB e $299 no modelo de 32GB, e estarão disponíveis a partir de 24 de junho. Ainda não há uma data oficial de lançamento no Brasil, mas a expectativa é de que eles cheguem por aqui, no máximo, até setembro.
FONTE: Olhar Digital
iBook Store:
A loja de livros virtuais da Apple também demonstrou ser um sucesso, de acordo com Jobs. Em 65 dias, mais de 5 milhões de livros foram baixados - média de 2,5 títulos por iPad. A loja da Apple já é responsável por 22% do mercado de ebooks, um índice respeitável para qualquer empresa recém-chegada em qualquer mercado. Uma novidade, agora, é a possibilidade de leitura de PDF nos iPads (algo curioso, já que Apple e Adobe só trocaram farpas nos últimos meses). Também é possível marcar textos e páginas, adicionar notas e visualizar os livros como se estivessem em uma estante virtual.
iPhone App Store:
A App Store é a maior loja de aplicativos do mundo. São 225 mil softwares à disposição do usuário, e mais de 5 bilhões de downloads já foram feitos desde o início das operações. A cada semana, 15 mil novos aplicativos são enviados para aprovação, entre novidades e updates. Jobs ressaltou alguns novos aplicativos que deverão estar disponíveis em breve, como o Netflix (americanos - e só eles, já que não temos Netflix no Brasil - poderão gerenciar toda a biblioteca de filmes via iPhone), Farmville e outros jogos da Zynga para iPhone (com o uso do zoom, é possível realizar qualquer atividade no joguinho que é hit no Facebook).
iPhone 4:
No momento mais esperado do evento, Steve Jobs finalmente anunciou o iPhone 4. E parece que o pessoal do Gizmodo realmente teve em mãos o protótipo do aparelho. A primeira característica apontada é o design, bem parecido com o publicado pelo site americano. Com apenas 9,3 mm, cobertura de aço inox e extremidades menos arredondadas, é o smartphone mais fino do planeta no momento. A câmera na frente permite a realização de video-chamadas, e a traseira, agora, traz um flash LED e possui 5 MP. Além disso, o aparelho consegue gravar vídeos em HD ( qualidade 720p e 30 frames por segundo). E mais: basta um "tapinha" na tela para o foco ser ajustado automaticamente!
A câmera frontal permite videochamada (ou "timeface", como Jobs preferiu chamar). A diferença, aqui, é que é possível utilizar a rede Wi-Fi e conversar com outros usuários do aparelho, em voz e imagem, sem pagar por isso.
A tela tem definição de 326 pixels por polegada (o olho humano só consegue perceber 300 pixels por polegada). Isso faz com que o iPhone 4 seja o aparelho com o melhor display do mercado. Se comparado com o iPhone 3GS, ele possui 4 vezes mais resolução (960 x 640 pixels), 4 vezes mais taxa de contraste (800:1), traz o processador Apple A4 (mesmo do iPad) e utiliza tecnologia IPS que, de acordo com Jobs, é melhor que o OLED. A bateria segura 7 horas de conversação, 6 horas de navegação em 3G, 10 horas de navegação em Wi-Fi e até 300 horas em standby.
Outro detalhe implementado no novo iPhone é o giroscópio. Agora, o aparelho tem noção dos 3 eixos, e isso abre toda uma nova área para desenvolvedores de games explorarem.
O lançamento do iMovie para iPhone (US$4,99) promete revolucionar a forma como os usuários trabalham os vídeos no aparelho. Será possível incluir transições entre clipes, efeitos, títulos e música. A localização geográfica também pode ser utilizada para personalizar temas. Ao final da edição, o vídeo pode ser exportado em diversas resoluções.
iOS4:
Sim, este é o novo nome do iPhone OS 4, disponível para o público ainda este mês. Ele é quem vai permitir o já esperado multitasking. "Pessoas questionaram: 'vocês não são os primeiros a ter a função', mas a minha resposta para elas é que primeiro, decidimos aprimorar a técnica, senão mataríamos a bateria em um segundo", defende Jobs. Agora, o usuário do iPhone, iPod Touch e iPad também pode organizar seus ícones e aplicativos em pastas. A adição do buscador Bing pode parecer algo pouco importante, mas imprime mais um capítulo à outra briga: Google vs Apple (iPhone vs Android). Na apresentação, Jobs se desmanchou em elogios para o buscador da Microsoft.
O iOS4 estará disponível gratuitamente para iPhone 3GS, iPhone 3G e iPod Touch, a partir de 21 de junho.
iAds:
Nova plataforma de publicidade no iPhone. Por meio de links patrocinados, os desenvolvedores poderão ganhar dinheiro com a exibição e o download de seus aplicativos. A Apple é responsável pela venda e hospedagem dos anúncios, 60% do lucro será revertido para os desenvolvedores e o pagamento será feito via iTunes Connect.É só torcermos para que os apps gratuitos não apresentem pop-ups chatos a cada 5 minutos...
Preço:
No mercado americano, os aparelhos custarão $199 no modelo de 16GB e $299 no modelo de 32GB, e estarão disponíveis a partir de 24 de junho. Ainda não há uma data oficial de lançamento no Brasil, mas a expectativa é de que eles cheguem por aqui, no máximo, até setembro.
FONTE: Olhar Digital
quinta-feira, 13 de maio de 2010
Viswanathan Anand retained the title of the World Chess Champion
The last classical game of the FIDE World Chess Championship was opened with Lasker variation of the Queen's Gambit Declined as Viswanathan Anand sought for a solid defence in which White would have only minimal chances to score a victory.
The opening went quietly until Anand moved the slightly unusual 16...Nf6. This was the moment where Veselin Topalov took a bit longer to decide on the middlegame plan.
Topalov allowed Black to trade the Be4 and in return he forced an isolated pawn on c5. But is was not easy to besiege this pawn as Black successfully coordinated pieces and obtained excellent counterplay.
White took some time to consolidate the position and avoid tactics on the back-rank and against the Knight on d2. Anand silently offered a moves repetition with Bd3-a6, but Topalov snubbed the offer.
White established the Knight on c4, while Black Bishop possessed a long diagonal from a8.
Exactly in this moment, Topalov erred in an attempt to prevent Black's e5-e4. He played e4 himself, but Anand did not hesitate long before breaking the formation with 30...f5 and 31...e4.
Topalov carelessly traded the pawn on e4 and fell under a strong attack. The Black battery Queen-Rook-Bishop worked perfectly in the pursuit after White King.
It looked like the game was over, and even Anand admitted that he couldn't see a defence for White, but Topalov found some remarkable resources and managed to prolong the game.
But with a series of precise moves, Anand managed to convert the advantage and bring victory home on move 56. The final score is 6,5:5,5.
Thus Anand retained the title of the World Chess Champion! Congratulations!
Official website
The opening went quietly until Anand moved the slightly unusual 16...Nf6. This was the moment where Veselin Topalov took a bit longer to decide on the middlegame plan.
Topalov allowed Black to trade the Be4 and in return he forced an isolated pawn on c5. But is was not easy to besiege this pawn as Black successfully coordinated pieces and obtained excellent counterplay.
White took some time to consolidate the position and avoid tactics on the back-rank and against the Knight on d2. Anand silently offered a moves repetition with Bd3-a6, but Topalov snubbed the offer.
White established the Knight on c4, while Black Bishop possessed a long diagonal from a8.
Exactly in this moment, Topalov erred in an attempt to prevent Black's e5-e4. He played e4 himself, but Anand did not hesitate long before breaking the formation with 30...f5 and 31...e4.
Topalov carelessly traded the pawn on e4 and fell under a strong attack. The Black battery Queen-Rook-Bishop worked perfectly in the pursuit after White King.
It looked like the game was over, and even Anand admitted that he couldn't see a defence for White, but Topalov found some remarkable resources and managed to prolong the game.
But with a series of precise moves, Anand managed to convert the advantage and bring victory home on move 56. The final score is 6,5:5,5.
Thus Anand retained the title of the World Chess Champion! Congratulations!
Official website
quarta-feira, 12 de maio de 2010
FIDE World Chess Championship Match - Anand Retains the Title!
The FIDE World Chess Championship match between the reigning World Champion Viswanathan Anand of India and his challenger Former World Champion Veselin Topalov of Bulgaria is set to start on the 21st April with the official opening ceremony.
The match is taking place at the Central Military Club in Sofia, Bulgaria. The total prize fund 2.000.000 EUR, full regulations can be found here, the updated playing schedule is posted bellow.
Viswanathan Anand won the World Championship in 2000 under knockout system and held the title until 2002. In 2007 he reclaimed the throne by winning the double round-robin World Championship tournament in Mexico. He successfully defended the title in the match against Vladimir Kramnik, which was held in 2008 in Bonn, Germany.
Veselin Topalov became the World Champion after winning the first double round-robin World Championship Tournament in 2005 in San Luis, Argentina. He lost the title in 2006, following the unification match against Vladimir Kramnik in Elista, Russia. He again earned the right to challenge the World Champion by winning the 2009 match versus Gata Kamsky.
Anand has arrived to Sofia by car and asked for a three day postponement. Closed German airspace prevented him from flying by plane.
FIDE Deputy President Georgios Makropoulos in his capacity of FIDE Supervisor for the match decided to postpone the first game for one day.
The final inspection took place on Wednesday morning, followed by the press conference with both players.
Official website / Photo gallery
The match is taking place at the Central Military Club in Sofia, Bulgaria. The total prize fund 2.000.000 EUR, full regulations can be found here, the updated playing schedule is posted bellow.
Viswanathan Anand won the World Championship in 2000 under knockout system and held the title until 2002. In 2007 he reclaimed the throne by winning the double round-robin World Championship tournament in Mexico. He successfully defended the title in the match against Vladimir Kramnik, which was held in 2008 in Bonn, Germany.
Veselin Topalov became the World Champion after winning the first double round-robin World Championship Tournament in 2005 in San Luis, Argentina. He lost the title in 2006, following the unification match against Vladimir Kramnik in Elista, Russia. He again earned the right to challenge the World Champion by winning the 2009 match versus Gata Kamsky.
Anand has arrived to Sofia by car and asked for a three day postponement. Closed German airspace prevented him from flying by plane.
FIDE Deputy President Georgios Makropoulos in his capacity of FIDE Supervisor for the match decided to postpone the first game for one day.
The final inspection took place on Wednesday morning, followed by the press conference with both players.
Official website / Photo gallery
Assinar:
Comentários (Atom)