Welcome!

Innovative Technologies and Approaches for the Government

Tieu Luu

Subscribe to Tieu Luu: eMailAlertsEmail Alerts
Get Tieu Luu via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Tieu Luu

The adoption of Service Oriented Architecture (SOA) promises to further decouple monolithic applications by decomposing business functions and processes into discrete services. While this makes enterprise computing assets more accessible and reusable, SOA implementation patterns are primarily an iteration over previous application development models. Like most application development evolutions, SOA approaches inject more layers and flexibility into the application tier, but have often neglected the most fundamental building block of all applications: the underlying data. Current Data Environment of Most IT Organizations The condition of a typical organization's data environment is usually not where it needs to be before the organization can begin a SOA transformation - from an enterprise perspective, there's often a lack of authoritative sources and a wide array of ... (more)

Considering a RESTful Approach to Net-Centricity

In May of 2003, the CIO of the Department of Defense established the Net-Centric Data Strategy [NCDS] as part of its transformation to Net-Centricity.   The DoD's goal of Net-Centricity is the creation of a network of people, processes, systems, and infrastructure that enables a new approach to warfighting and business operations with improved military situational awareness, better access to business information, and dramatically shortened decision cycles.  The Net-Centric Data Strategy addresses the key element that is required to make all this happen—information-sharing. Its ... (more)

Don't Forget Security on the Way Out

Typically when we think about security for a Web service, our focus is on how to protect it from unauthorized and malicious users. Thus, we tend to concentrate on such things as authentication of the requestor, checking to see that the requestor is authorized to access the service, validation of the request message, and so forth - all things that happen on the way in or during a request for the service. However, there is an equally important set of security functions that need to occur on the way out or after the service has finished processing the request. Because these securit... (more)

Ten Things Your Enterprise Information Intergration Vendor May Not Tell You

Enterprise information integration (EII) is getting a lot of hype these days, and the vendors are giving you very compelling reasons for why you need an enterprise data access layer based on their EII product. However, a lot of the scenarios and case studies they present are very targeted or are simple examples of how their product works that don't delve into the complexities of a real-world environment. This article presents some of those complexities and demonstrates how some of the EII products may not provide adequate functionality for an environment with such complexities. ... (more)

Loosely Coupled Flex and JS Widgets

It has become very popular to build web sites that use and embed widgets from various providers. For example, MySpace and Facebook let their users easily embed various JavaScript widgets and Flash-based applications and videos onto their personal pages. In most cases, the widgets act in a standalone fashion, unaware of the other widgets contained on the same page. Standalone widgets are fine for simple portal pages but for more targeted applications some level of interaction among the components on the page is needed. When such interactions are needed, they are usually achieved t... (more)