Anne Thomas Manes wrote:
> Dan,
>
> Perhaps you aren't aware, but Sanjiva and Eric are two of the
> originators of web services. And they have been providing examples.
I wasn't aware, and can you or they provide references to those
examples, please?
> Admittedly, the plug-fests are contrived scenarios, but I think it's
> still saying a lot that a dozen companies can get together in a room and
> demonstrate interoperability among all their products within a day. Yes
> -- they were using the latest versions and/or previews of the next
> release of their products. But pretty much any product released in the
> last two years supports basic interoperability via web services.
>
We'll have to agree to differ here - if it's contrived as you say.
Real-world examples are what I measure on, rightly or wrongly.
> One of Sanjiva's points is that the vendors need to develop better
> tooling, but experience to date has shown that if the tooling is too
> focused on language APIs, it reduces interoperability. On the other
> hand, if you work within a reasonable set of constraints ( e.g., from
> the Java perspective, convert all Collection classes into arrays)
So, am I as a coder expected to do all this work myself or can I have a
tool to do it? I'd prefer an automated approach as per Sanjiva because
I wouldn't want this sort of cruft leaking into my codebase.
> interoperability turns out to be pretty seamless -- even when working
> with advanced infrastructure requirements, such as asynchronicity,
> reliable messaging, security, and transactions.
>
> One of the features of SOAP is that it supports clean separation of
> infrastructure and application functionality, so the application code
> doesn't really need to be concerned with issues like knitting together
> authentication/access models -- all that can be handled external to the
> application using policy enforcement points ( i.e., mediators).
>
Hmmm, so how would I ensure that a given piece of application code is
executed with an appropriate set of privileges and with a certain user
id? i.e. How do I restrict the code executing on a particular box to
the right set of security constraints?
> As for integrating SOAP with CORBA, OMG has defined two specifications:
> - CORBA To WSDL/SOAP Interworking [1] and
> - WSDL/SOAP To CORBA Interworking [2]
>
Thanks for those - after a quick skim I can see that this is very
similar to how I'd achieve the same thing in Jini.
Dan.
Yahoo! Groups Links
<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/service-orientated-architecture/
<*> To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]
<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/