IBM DevWorks

Java development 2.0: Twitter mining with Objectify-Appengine, Part 2

Google App Engine doesn't just scale apps: it can also help you build them really fast, using tools that you really like. Andrew Glover wraps up the domain model for his Twitter-mining application, adding hooks for indexing and caching. He then wires it together with Twitter's OAuth authorization mechanism, GAE's queues, and a splash of JSON and Ajax via everyone's favorite JavaScript library, JQuery.

GAE storage with Bigtable, Blobstore, and Google Storage

Google App Engine eschews the relational database in favor of several non-relational datastores: Bigtable, Blobstore, and the newest kid on the block, Google Storage for Developers. Author John Wheeler explores the pros and cons of GAE's three big-data storage options, while walking you through an application scenario that will familiarize you with setting up and using each one.

What's new in IBM Rational Business Developer Version 8

New features found in the IBM Rational Business Developer Version 8.0.1 are designed to benefit business developers, project managers and enterprise architects. You can build better Web 2.0 user interfaces for your business applications using improved layouts and new widgets based on the open source Dojo toolkit. In addition, you can build UI forms and tables automatically from EGL records -- now derived from XML, JSON, and JSON schemas. Finally, you can help improve application quality using improved Enterprise Generation Language (EGL) generation and debugging, with support for conditional breakpoints.

Java web services: The state of web service security

WS-Security and related standards provide a wide range of options for web service security. Of this wide range, web services stacks test only a limited number of security configurations, and even fewer configurations for interoperability, on their own. Find out what the industry has done to promote interoperability among web services stacks, and read a summary comparison of how the three main open source Java stacks handle security.

JSF 2 fu: HTML5 composite components, Part 2

In this JSF 2 fu installment, series author David Geary continues to demonstrate the power of combining JavaServer Faces (JSF) 2 technology with HTML5. This time you'll see how to implement JSF composite components that encapsulate HTML5 drag and drop.

5 things you didn't know about ... multithreaded Java programming

Multithreaded programming is never easy, but it does help to understand how the JVM processes subtly different code constructs. Steven Haines shares five tips that will help you make more informed decisions when working with synchronized methods, volatile variables, and atomic classes.

Java development 2.0: Twitter mining with Objectify-Appengine, Part 1

Objectify-Appengine is one of an emerging class of tools that extend the convenience of NoSQL, in this case by providing a Hibernate-style mapping layer between your application and the GAE datastore. Get started this month with Objectify's handy, JPA-friendly (but not dependent) API. Andrew Glover walks through the steps of mapping Twitter retweets into Bigtable, in preparation for deploying it in Google App Engine.

Bonita for business process management, Part 2: Configure forms and variables

Bonita Open Solution, an open source Java-based business process management (BPM) tool, lets you model, configure, and execute business workflows without writing a single line of Java code. This article concludes a two-part series demonstrating use of Bonita to design a workflow for booking hotel rooms. Picking up where Part 1 leaves off, you'll configure variables and design user-interaction forms for the workflow, then connect it with a database and a reporting engine. When configuration is complete, you'll see the room-booking process in action.

Java web services: Understanding WS-Policy

WS-Policy provides a general structure for configuring features and options that apply to a web service. You've seen it used for WS-Security configurations in this series, and perhaps elsewhere for other extension technologies such as WS-ReliableMessaging. In this article, you'll learn about the structure of WS-Policy documents and the ways you can attach policies to services in Web Service Description Language (WSDL), with security-configuration examples tried on Apache Axis2, Metro, and Apache CXF.

Automate virtual machine discovery and self-connectivity

In a virtual data center the deployment and the dismissal of complex appliances require that multiple configuration steps be executed. Reconfiguration requirements include establishing and removing communication between different components of the same product running in different virtual machines (VMs) as well as different products running in different VMs. Traditionally this process has been burdensomely manual or somewhat inflexible via the invoking of predefined scripts with static values. In this article, the authors propose StereoCable, automated plug-and-play support of complex virtual appliances in a virtual data center, to solve this issue. This way VMs are able to discover and automatically connect to each other based on predefined connections policies.

IBM and Oracle change the game: A surprising alliance on OpenJDK

The Oracle-IBM alliance on OpenJDK has ripple effects across the entire Java industry, with some commentators divided on what it means for the health of the Java ecosystem. With this overview and commentary roundup, former JavaWorld Editor Athen O'Shea gets to the heart of the issue: what it means for Project Harmony, the JCP, and the future of open source, open standards-based development on the Java platform.