Changing the delivery of IT

Tony Bishop

Subscribe to Tony Bishop: eMailAlertsEmail Alerts
Get Tony Bishop: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Related Topics: RIA Developer's Journal, Adobe AIR on Ulitzer, AJAX World RIA Conference, Zimbra on Ulitzer

RIA & Ajax: Article

Moving Beyond AJAX: 2008 Is the Decision Year For RIAs

What's the Best Spear-Carrier for Next-Generation RIA Technology?

Backbase, a company specializing in rich Internet applications, published as long ago as in 2005 a whitepaper entitled "AJAX and Beyond" to explain their Backbase Presentation Client, designed to interact with their Presentation Server.

And some Microsoft developers, while acknowledging that AJAX is a very important piece of the puzzle, and solves many of the problems faced when creating responsive Web user interfaces, claim that AJAX isn't really asynchronous at all when it comes to HTTP requests. ("An AJAX Web request is a synchronous Web request just like any other," writes Brendan Tompkins, for example. "All AJAX solutions really are doing is using the browser's built-in threading - via JavaScript - to make multiple Web requests for you, and then updating the page when the server responds.") Tompkins' notion of "Beyond AJAX" is to use what he calls "real-life honest to goodness asynchronous method invocation on the server."

Securing AJAX
Before we worry about Beyond AJAX, though, there are many developers (and companies) who believe we should first worry about securing the AJAX apps we currently have. A world-beating pioneer of better AJAX security, Billy Hoffman, has even developed a groundbreaking one-day "Bootcamp" that will be premiered at AJAXWorld 2008 East in New York City (March 18-20, 2008).

Among other innovations, Hoffman has a whole new never-before-seen AJAX application that AJAX Security Bootcamp attendees will get to hack against, before using the app just attacked as a catalyst to lead the discussion about how to secure AJAX applications. "The audience will have probably missed some vulnerabilities in the application they just hacked and I will use that to illustrate how hard AJAX can be to QA and how to properly perform QA tests," Hoffman tells AJAXWorld Magazine.

More Stories By Jeremy Geelan

Jeremy Geelan is Chairman & CEO of the 21st Century Internet Group, Inc. and an Executive Academy Member of the International Academy of Digital Arts & Sciences. Formerly he was President & COO at Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences across six continents. You can follow him on twitter: @jg21.

Comments (1) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
richie rich 01/21/08 03:45:43 AM EST

any application that requires a fair amount of two-way communication of large data sets would probably benefit from a rich client interface