11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

310 middlewareBott, Ed, Carl Siechert, <strong>and</strong> Craig Stinson. Micros<strong>of</strong>t Windows VistaInside Out. Redmond, Wash.: Micros<strong>of</strong>t Press, 2007.Minasi, Mark, <strong>and</strong> Byron Hynes. Administering Windows VistaSecurity: The Big Surprises. Indianapolis: Wiley/SYBEX, 2007.Simpson, Alan. Alan Simpson’s Windows XP Bible. 2nd ed. Indianapolis:Wiley, 2005.———. Alan Simpson’s Windows Vista Bible. Indianapolis: Wiley,2007.Smith, Ben, <strong>and</strong> Brian Komar. Micros<strong>of</strong>t Windows Security ResourceKit. 2nd ed. Redmond, Wash.: Micros<strong>of</strong>t Press, 2005.“Windows Products <strong>and</strong> Technologies History.” Micros<strong>of</strong>t. Availableonline. URL: http://www.micros<strong>of</strong>t.com/windows/WinHistoryIntro.mspx. Accessed August 15, 2007.middlewareOften two applications that were originally created for differentpurposes must later be linked together in order toaccomplish a new purpose. For example, a company sellingscientific instruments may have a large database <strong>of</strong> productspecifications, perhaps written in COBOL some years ago.The company has now started selling its products on theInternet, using its Web server <strong>and</strong> e-commerce applications(see e-commerce). Prospective customers <strong>of</strong> the Web siteneed to be able to access detailed information about theproducts. Unfortunately, the Web s<strong>of</strong>tware (perhaps writtenin Java) has no easy way to get information from the company’sold product database. Rather than trying to convert theold database to a more modern format (which might taketoo long or be prohibitively expensive), the company maychoose to create a middleware application that can mediatebetween the old <strong>and</strong> new applications.There are a variety <strong>of</strong> types <strong>of</strong> middleware applications.The simplest <strong>and</strong> most general type <strong>of</strong> facility is the RPC(Remote Procedure Call), which allows a program runningon a client computer to execute a program running on theserver. DCE (Distributed Computing Environment) is amore robust <strong>and</strong> secure implementation <strong>of</strong> the RPC conceptthat provides file-related other operating system services aswell as executing remote programs.More elaborate architectures are used to link complexapplications such as databases where a program running onone computer on the network must get data from a server.For example, an Object Request Broker (ORB) is used in aCORBA (Common Object Request Broker Architecture) systemto take a data request generated by a user <strong>and</strong> find serverson the network that are capable <strong>of</strong> fulfilling the request(see coRBA).Middleware is <strong>of</strong>ten inserted into a program to allowfor better monitoring or control <strong>of</strong> distributed processing.For example a TP (transaction processing) monitor is amiddleware program that keeps track <strong>of</strong> a transaction thatmay have to go through several stages (such as point <strong>of</strong> saleentry, credit card processing, <strong>and</strong> inventory update). TheTP monitor can report whether any stage <strong>of</strong> the transactionprocessing failed (see transaction processing).Middleware can also be put in charge <strong>of</strong> load balancing.This means distributing transactions so that they are evenlyapportioned among the servers on the network, in order toavoid creating delays or bottlenecks.While use <strong>of</strong> middleware may not be as “clean” a solutionas designing an integrated system from the bottom up, theeconomic realities <strong>of</strong> a fast-changing information environment(particularly with regard to deployment on the Web)<strong>of</strong>ten makes middleware an adequate second-best choice.Further ReadingBritton, Chris, <strong>and</strong> Peter Bye. IT Architectures <strong>and</strong> Middleware:Strategies for Building Large, Integrated Systems. 2nd ed. UpperSaddle River, N.J.: Addison-Wesley Pr<strong>of</strong>essional, 2004.Myerson, Judith M. The Complete Book <strong>of</strong> Middleware. Boca Raton,Fla.: CRC Press, 2002.Puder, Arno, Kay Römer, <strong>and</strong> Frank Pilh<strong>of</strong>er. Distributed SystemsArchitecture: A Middleware Approach. San Francisco: MorganKaufman, 2006.“What Is Middleware?” ObjectWeb. Available online. URL: http://middleware.objectweb.org/. Accessed August 15, 2007.military applications <strong>of</strong> computersWar has always been one <strong>of</strong> the most complex <strong>of</strong> humanenterprises. Even leaving actual combat aside, the U.S. military<strong>and</strong> defense establishment constitute a huge employer,research <strong>and</strong> training agency, <strong>and</strong> transportation network.Managing all these activities require sophisticated database,inventory, tracking, <strong>and</strong> communications systems. Whenthous<strong>and</strong>s <strong>of</strong> private defense contractors <strong>of</strong> varying sizesare considered as part <strong>of</strong> the system, the complexity <strong>and</strong>scope <strong>of</strong> the enterprise become even larger.Specifically, military information technology applicationscan be divided into the following broad areas: logistics,training, operations, <strong>and</strong> battle management.LogisticsIt is <strong>of</strong>ten said that colonels worry about tactics while generalspreoccupy themselves largely with logistics. Logisticsis the management <strong>of</strong> the warehousing, distribution, <strong>and</strong>transportation systems that supply military establishments<strong>and</strong> forces in the field with the equipment <strong>and</strong> fuel theyneed to train <strong>and</strong> to fight. Logistics within the United Statesis analogous to similar problems for very large corporations.The same bar codes, point <strong>of</strong> use terminals, <strong>and</strong> othertracking, inventory, <strong>and</strong> distribution systems that Amazon.com uses to get books quickly to customers while avoidingexcessive inventory are, in principle, applicable to modernizingmilitary logistic systems.An added dimension emerges when logistical supportmust be supplied to forces operating in remote countries,possibly in the face <strong>of</strong> efforts by an enemy to disrupt supply.Such considerations as efficient loading procedures toaccommodate limited air transport capacity, prioritization<strong>of</strong> shipping to provide the most urgently needed items, <strong>and</strong>transportation security can all come into play. (The militaryhas pioneered the use <strong>of</strong> retinal scanners <strong>and</strong> other systemsfor controlling access to sensitive areas. See biometrics.)The need for mobility <strong>and</strong> compactness makes laptops<strong>and</strong> even palmtops the form factors <strong>of</strong> choice. Military or“milspec” versions <strong>of</strong> computer hardware are generally builtwith more rugged components <strong>and</strong> greater resistance toheat, moisture, or dust.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!