Welcome!

Industrial IoT Authors: Elizabeth White, Stackify Blog, Yeshim Deniz, SmartBear Blog, Liz McMillan

Related Topics: Machine Learning , AJAXWorld RIA Conference & Expo, Ajax World

Machine Learning : Article

Rich Internet Applications with OpenAjax Hub 1.1 & SMash Secure Mashups

Sumeer Bhola and Jon Ferraiolo's RIA Session at AJAXWorld, March 18-20, in New York City

In this session Jon and Sumeer will describe current work at OpenAjax Alliance on OpenAjax Hub 1.1 and secure mashups. Mashups have the potential for revolutionizing the way Web applications are developed, but there are security risks. In order to unleash the industry, OpenAjax Alliance is adding secure mashup features to its OpenAjax Hub 1.1 release. This new release will include a set of techniques called "SMash" that were originally developed by IBM Research and allows for secure mashups that run in today's browsers. The session will introduce mashups, OpenAjax Hub, and SMash, and will highlight related OpenAjax work around widget metadata standards.

Speaker Bios: Sumeer Bhola is a research staff member at the IBM T.J. Watson Research Center, where he investigates security for the Web. He has previously worked on distributed computing, computer supported collaborative work, autonomic computing, and realtime systems. He received a Ph.D. in computer science from Georgia Tech, and a BS from IIT Delhi.

Jon Ferraiolo is a member of IBM's Emerging Technologies group where he manages operations and leads various activities in the OpenAjax Alliance. Before joining IBM, Jon worked at Adobe for 13 years where he was an architect, engineering manager and product manager on multiple products and where he participated in various standards activities.

Register for AJAXWorld Conference & Expo
Submit Your Paper to Present a Session
Sponsor AJAXWorld Conference & Expo

2008  Will Be The Decision Year for RIAs
AJAXWorld Conference & Expo 2008 will provide delegates with the optimum balance between RIAs, Rich Web Technologies and AJAX, while underlining business needs, technology potential, and enhanced user experience.

This year at AJAXWorld the relentless focus is not only on where RIAs are now but also where Rich Web Technologies are headed, where Enterprise Web 2.0 and Social Applications are taking the software development industry and the end user, and how Rich Web Technologies are transforming our businesses and our lives.

Delegates will learn how RIAs are making money and gaining market-share for some of the leading businesses in the world.

The real-world questions that will be answered by this year's 140+ sessions are those that currently preoccupy working developers, architects, IT managers and business line managers. The 2008 tracks include:

  • Enterprise RIAs and AJAX
  • Rich-Web Case Studies and Mash-Ups
  • Enterprise Web 2.0 & Social Applications
  • Event-Driven Web
  • iPhone Developer Summit
  • Diamond Track

AJAXWorld is sponsored by the world’s leading RIA technology providers including.

Conference faculty includes the world’s top RIA experts.

More Stories By RIA News Desk

Ever since Google popularized a smarter, more responsive and interactive Web experience by using AJAX (Asynchronous JavaScript + XML) for its Google Maps & Gmail applications, SYS-CON's RIA News Desk has been covering every aspect of Rich Internet Applications and those creating and deploying them. If you have breaking RIA news, please send it to [email protected] to share your product and company news coverage with AJAXWorld readers.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.