Archive for the ‘arch’ Category.

Funk to ship 802.1x server solution in February

Funk to ship 802.1x server solution in February [Network Fusion World]: Funk’s software is apparently a full implementation of the 802.1x draft standard, according to the article. The writer says that the server completes three separate tasks, but in my understanding those tasks are all part of the 802.1x spec: secure exchange of authentication information handed to and from a RADIUS server, with the AP acting as a relay instead of an authenticator itself.

[80211b News]

Apache XML project releases Xerces 2.0.0

Apache XML project releases Xerces 2.0.0. Xerces 2 for Java, the Apache XML Project’s second generation XML parser, has now finished its beta phase and is considered production quality. [xmlhack]

Gnome to be based on .NET – de Icaza

Gartner on IT Architecture

Gartner on IT Architecture:

requires a Gartner “seat” — send me mail if you’re at UR and want to see the reports

The Architecture Engagement Process
[PDF]
TU-14-9766,
15 January 2002,
Greta James, John Roberts

What Do IT Architects Do?
[PDF]
COM-13-2153, 8 May 2001,
Nick Jones, Simon Mingay

A perspective on IT architecture as an investment principle helps to define the purpose and role of architects.

The IDL That Isn’t

The IDL That Isn’t

“The web service model is a very good one. But it will only be adopted if interoperability is easy to achieve. The best way to do that is to move to the IDL-centric model used by the classic RPC technologies of the past. Ultimately, web service toolkits will have to support a development model that starts with WSDL and web service developers will have to embrace and use that language. To facilitate that, WSDL should be radically reworked by the W3C and ultimately simplified (preferably along the lines we described in last month’s column). Until then, WSDL will remain the IDL that isn’t.”

Gosling: Why Microsoft’s C# isn’t

Sun’s James Gosling on .NET: “You find stuff in it that has essentially loopholes for everything. They had this problem in their design rules that they had to support C and C++, which means you have to have a memory model where you can access everything at all times. It’s the existence of those loopholes that is the source of security, reliability and productivity problems for developers. So on the one hand, they copied Java, and on the other hand, they added gratuitous things and other things that are outright stupid. That’s amusing.”   [Scripting News]

Using IPSec in Windows 2000 and XP

Chris Weber, SecurityFocus:
Using IPSec in Windows 2000 and XP
[
Part 1
]
[
Part 2
]
[
Part 3
]

Creating the Next-Generation IS Organization

Gartner: Creating the Next-Generation IS Organization
(Goodhue, Chris)
[Requires direct access to Gartner web site.
Within UR, contact me for a copy of this presentation.]

OPML is going to be as big or bigger as anything we’ve done at UserLand, including SOAP, XML-RPC and RSS

Dave Winer, Scripting News:

BTW, I promise you, OPML is going to be as big or bigger as anything we’ve done at UserLand, including SOAP, XML-RPC and RSS. It’s a source of cold water and it’s killer. We have the hot water to balance it, I hope, if not, Omni might be a good bet, or JOE. See how it works? Users who have choice move. Users who are locked in wait. I don’t care how big you are, you’re still in the same ecosystem

Troubleshooting L2TP/IPSec VPN connections in Win2K

TechRepublic:
Troubleshooting L2TP/IPSec VPN connections in Win2K

Working with Windows 2000’s L2TP/IPSec VPN connections is a whole different ball game from managing PPTP. Take a look at these valuable tips for troubleshooting L2TP/IPSec issues.