MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
JavaWorld
May 2002
Zhong & Lehr
US Department of Energy signs on to J2EE If you architect many secure Web applications, authentication and authorization are always important concerns. Defining an architecture so that users can sign on to many n-tier Web applications only once---regardless of who built the applications, when they were built, or what kind of OSs and application servers they run on---is always a big challenge. This article presents a single sign-on architecture. mark for My Articles similar articles
JavaWorld
September 2001
Jian Zhong
Step into the J2EE architecture and process By reading this article, you will better understand many important J2EE architecture topics, and be able to apply that knowledge to extend and modify this simple methodology to solve your special business problems... mark for My Articles similar articles
JavaWorld
December 2001
Humphrey Sheil
To EJB, or not to EJB? Our industry has spawned folklore and rules of thumb to guide us how best to use EJB -- some true, some out of date, and some pure fabrication. When and how to use EJB in your J2EE application, as well as how to know when EJBs are not the right solution for you... mark for My Articles similar articles
New Architect
January 2003
Amit Asaravala
A Question of Identity Passport, Liberty, and the single sign-on race mark for My Articles similar articles
JavaWorld
March 2003
Frank Sommers
The first taste of Liberty The Liberty Alliance Project specifications provide a single sign-on mechanism for both Websites and Web services. This article explores how Liberty helps federate a user's identities from different service providers and uses that federated network identity to authenticate a user. mark for My Articles similar articles
D-Lib
June 2006
Teets & Murray
Metasearch Authentication and Access Management The NISO Metasearch Initiative Task Group on Access Management makes suggestions to institutions in the process of acquiring new electronic resources to control access to their electronic resources and support metasearch. mark for My Articles similar articles
Insurance & Technology
September 26, 2009
Akhil Tripathi
CIO: Insurers Must Build Capabilities on the Four Tiers of Architecture CIOs must answer business's needs armed with appreciation of the different levels of enterprise architecture -- business, information, application and technical -- in order to avoid a proliferation of disconnected point solutions. mark for My Articles similar articles
PC Magazine
September 7, 2004
Robert P. Lipschutz
A Better Blueprint for Business Service-oriented architecture frees you from binding relationships with high-priced software consultants. mark for My Articles similar articles
JavaWorld
August 2000
Sanjay Mahapatra
Programming restrictions on EJB Sanjay provides an overview of the programming restrictions on EJB component code that developers should adhere to and lists the features in Java that you'd be wise to avoid in order to write reliable and portable EJB 1.1 components.. mark for My Articles similar articles
JavaWorld
October 2000
Siva Visveswaran
Dive into connection pooling with J2EE Connection pooling is a technique used for sharing server resources among requesting clients. This article focuses on support for connection pooling of both database resources and nondatabase resources in a J2EE environment... mark for My Articles similar articles
Wall Street & Technology
June 13, 2006
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. mark for My Articles similar articles
Insurance & Technology
May 3, 2006
Deena M. Amato-McCoy
Service-Oriented Change Heterogeneous systems are at the core of many insurance carriers' IT infrastructures. Yet, companies still struggle with how to seamlessly integrate these often disparate systems across their enterprise. Now, a rapidly evolving architectural strategy is quickly changing the landscape. mark for My Articles similar articles
JavaWorld
September 2002
Musser & Feuer
All that JAAS JAAS, the Java Authentication and Authorization Service API, provides flexible and scalable mechanisms for securing your client- and server-side Java applications. mark for My Articles similar articles
JavaWorld
May 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. mark for My Articles similar articles
JavaWorld
February 2002
Todd E. Sundsted
With Liberty and single sign-on for all An archipelago of disconnected authentication systems fractures your online persona into dozens or even hundreds of fragmentary identities. The Liberty Alliance Project seeks to solve this identity crisis with a single sign-on solution that will federate these independent authentication systems. But, will the benefits outweigh the costs? mark for My Articles similar articles
CIO
August 27, 2010
Kim S. Nash
How Cloud Computing and Mobile Devices Are Changing Your Application Strategy Delivering applications on any device - whether desktops or smartphones - and from any location calls for rethinking your enterprise architecture. mark for My Articles similar articles
CIO
January 15, 2004
Todd Datz
Service-Oriented Architecture SOAs promise to speed development and decrease integration time and effort -- but only if you implement them correctly. mark for My Articles similar articles
Wall Street & Technology
January 22, 2008
Penny Crosman
Buy Side Firms Start Taking Enterprise Architectures Live Asset management firms have begun not only building formal enterprise architectures, but benchmarking them against others' as well. mark for My Articles similar articles
JavaWorld
August 2001
Scott Stark
Integrate security infrastructures with JBossSX The current Enterprise JavaBean and Servlet specifications omit integration between the application server and existing security infrastructures. This article describes how version 2.4 of the open source JBoss application server security extension project (JBossSX) uses Java Authentication and Authorization Service (JAAS) login modules as its integration API. mark for My Articles similar articles
InternetNews
May 21, 2004
Clint Boulton
Microsoft Indigo Architect John Shewchuk One of the builders behind the Indigo messaging platform talks up how it works and how it fits into the OS puzzle. mark for My Articles similar articles
D-Lib
Jul/Aug 2002
Mairead Martin
Federated Digital Rights Management A proposed drm solution for research and education. mark for My Articles similar articles
InternetNews
February 15, 2006
Erin Joyce
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. mark for My Articles similar articles
Wall Street & Technology
January 23, 2007
Cory Levine
VASCO Bolsters Tokens The strong authentication vendor has bolstered its hardware authentication offerings with the release of two new user authentication products for online commerce. mark for My Articles similar articles
Wall Street & Technology
September 24, 2007
Anne Rawland Gabriel
Glenmede Trust Company Streamlines With Imprivata SSO Solution Imprivata enables Glenmede to streamline productivity and security with One-Sign single sign-on solution. mark for My Articles similar articles
Bank Technology News
October 2005
Glen Fest
Uncle Sam Comes Knocking The U.S. government's interest in having banks help it form networks of federated identity, thus allowing vetted, shared user-credentials between government and private industry, is obvious. The looming question: What's in it for banks? mark for My Articles similar articles
Wall Street & Technology
February 19, 2008
Penny Crosman
The Future of SOA on Wall Street Read on to uncover the next SOA innovation on The Street for those companies that are ready to deploy next-generation solutions, and want to make it a top IT priority. mark for My Articles similar articles
JavaWorld
September 2002
Visveswaran & Abulsorour
Business process automation made easy with Java, Part 1 Business process automation initiatives are transforming today's enterprises by optimizing efficiencies, reducing costs, and increasing shareholder value. This article explains existing J2EE-centric rule engine solutions, as well as where and how they fit within an enterprise architecture. mark for My Articles similar articles
Insurance & Technology
August 12, 2005
Anthony O'Donnell
Journey to Service-Oriented Architecture Fireman's Fund turns to service-oriented architecture in an effort to consolidate up to 70 percent of its technology applications with the goal of transforming its IT organization into a more efficient and more flexible operation. mark for My Articles similar articles
InternetNews
July 23, 2010
Oracle Offers New Identity Management Suite Oracle Identity Management 11g is designed to "radically" simplify application security. mark for My Articles similar articles
Insurance & Technology
July 9, 2008
Nathan Conz
Insurers Target Single Sign-On Capabilities There is little evidence of centralized depositories for user IDs and log-ons that consolidate the number of passwords that an employee, business partner or customer needs to access a carrier's systems. mark for My Articles similar articles
CIO
June 15, 2003
Larry Downes
Unleashing Killer Architecture: The Shape of Things to Come The coauthor of Unleashing the Killer App deconstructs the new-order IT architecture that will connect tomorrow's information supply chain. mark for My Articles similar articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
Wall Street & Technology
March 21, 2006
Paul Allen
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. mark for My Articles similar articles
InternetNews
February 26, 2004
Michael Singer
Government Groups Tout Single Sign-On Version GSA and OASIS demonstrate Single Sign-On for a federated identity, which some say is years ahead of Liberty or WS-Federated. mark for My Articles similar articles
CIO
October 15, 2003
Ben Worthen
Identity Crisis Identity management projects promise big returns, but be prepared for long, complex implementations. mark for My Articles similar articles
Bank Systems & Technology
January 30, 2005
Phillip Britt
Who Goes There? The nation's third-largest bank, Bank of America has grown largely through M&As. Among the many integration challenges faced by the bank, standardizing employee authentication procedures has been a critical issue. mark for My Articles similar articles
Insurance & Technology
September 14, 2004
Anthony O'Donnell
Carriers Give OK to SOA A services-oriented architecture carries a hefty initial price tag, but can reduce the time and cost of application development for insurers and open doors to business partners. mark for My Articles similar articles
InternetNews
November 8, 2005
Clint Boulton
Liberty Needs to Know Who You Are The Liberty Alliance Project creates a group to help companies bring authentication into their folds. mark for My Articles similar articles
Wall Street & Technology
November 19, 2008
Melanie Rodier
Case Study: Loomis Sayles Implements Multifactor Authentication Loomis Sayles deploys the Imprivata OneSign Authentication Management solution, enabling authentication via password, fingerprint and token. mark for My Articles similar articles
Insurance & Technology
May 18, 2007
Nathan Conz
SOA Adopters Discuss Best Practices Industry IT executives, analysts and vendors all have different opinions on just how pervasive SOA has become in insurance. mark for My Articles similar articles
JavaWorld
October 2000
Anil Hemrajani
Do you really need Enterprise JavaBeans? Anil Hemrajani offers his opinions on whether Enterprise JavaBeans are really necessary... mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 4 1999
Kenneth J. Klingenstein
Middleware: The Second Layer of IT Infrastructure A second wave of network invention and deployment has begun. Riding on top of the physical Internet protocol (IP) connectivity that drove the first generation of networking, this effort adds "logical" connectivity to the networked infrastructure.... mark for My Articles similar articles
InternetNews
February 14, 2005
Michael Singer
VeriSign Revamps Security Lineup The security vendor makes renewed pitch for two-factor authentication to protect against security threats. mark for My Articles similar articles
CRM
February 2006
Marshall Lager
SOA Simple An examination of service-oriented architecture and its growing impact on the applications landscape. mark for My Articles similar articles
JavaWorld
April 2001
Bin Yang
E++: A pattern language for J2EE applications, Part 1 E++, an Alexandrian pattern language, describes the process for creating a J2EE framework. Compared with a loose pattern collection, E++ provides rules for design patterns to work together in solving a set of related problems... mark for My Articles similar articles
Bank Systems & Technology
May 1, 2006
Lisa Valentine
Collaboration Is Job One An interview with Financial Services Technology Consortium executive director Daniel Schutzer on fostering a more collaborative environment regarding technology in the financial services industry. mark for My Articles similar articles
CIO
August 15, 2005
Christopher Lindquist
A New Blueprint for IT A service-oriented architecture can be a powerful tool for changing your business-or a good way to boil the ocean. The keys to a successful SOA project are setting limits, mitigating risks, and giving the business what it wants and needs. mark for My Articles similar articles
JavaWorld
April 18, 2003
Coen & Nanduri
Jump the hurdles of Struts development Building and maintaining enterprise applications is very difficult. Designing elegant and easily maintainable user interfaces for these applications can be the most daunting task of all. mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
New Architect
August 2002
Jim Jagielski
What You Get Is What You See Keeping an eye on web performance. mark for My Articles similar articles