Welcome!

Machine Learning Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Elizabeth White

Related Topics: Machine Learning , AJAXWorld RIA Conference & Expo

Machine Learning : Article

Embracing New Platforms: Building RIAs Beyond AJAX

Curl's Bert Halstead's Upcoming AJAXWorld Conference Session

There is now a spectrum of Rich Internet Application (RIA) technologies - including Adobe Flex, Adobe AIR, Microsoft Silverlight, and Curl - that go beyond the traditional functionality that AJAX provides. These platforms provide distinct benefits for moving complex desktop and client-server applications to the Web.

An independent study by Sonata Software compared the performance and ease of development of applications using Curl, AJAX, and Flex, highlighting strengths and weaknesses of each platform This session will look at the application characteristics that developers should consider before choosing a platform, as well as provide specific examples of the interactivity and performance that these platforms offer.

Speaker Bio: Bert Halstead is the chief architect of Curl, Inc., and a founding member of the Curl technical team. Previously, he was a research staff member at Digital Equipment Corporation. He received his Ph.D. degree from MIT and spent ten years teaching computer science there.

Register for AJAXWorld Conference & Expo
Submit Your Paper to Present a Session
Sponsor AJAXWorld Conference & Expo

RIAs, Rich Web Technologies, and AJAX
March 18-20, 2008, New York City
AJAXWorld Conference & Expo 2008 will provide delegates with the optimum balance between RIAs, Rich Web Technologies and AJAX, while underlining business needs, technology potential, and enhanced user experience.

This year at AJAXWorld the relentless focus is not only on where RIAs are now but also where Rich Web Technologies are headed, where Enterprise Web 2.0 and Social Applications are taking the software development industry and the end user, and how Rich Web Technologies are transforming our businesses and our lives.

Delegates will learn how RIAs are making money and gaining market-share for some of the leading businesses in the world.

The real-world questions that will be answered by this year's 140+ sessions are those that currently preoccupy working developers, architects, IT managers and business line managers. The 2008 tracks include:

  • Enterprise RIAs and AJAX
  • Rich-Web Case Studies and Mash-Ups
  • Enterprise Web 2.0 & Social Applications
  • Event-Driven Web
  • iPhone Developer Summit
  • Diamond Track

The World’s Leading RIA Event Is Sponsored by
More Than 70 Leading Rich Web Technology Providers

Last year, AJAXWorld Conference & Expo was sponsored by the world's leading RIA companies and Rich Web Technology providers including: 3Tera, Addison-Wesley, Adobe, Apress, Backbase, Bindows, Conference Guru, Cynergy Systems, Dynamic Toolbar, Extension Media, Farata Systems, Flash Goddess, FrogLogic, GoingToMeet.com, Google, Helmi Technologies, IBM, ICEsoft, ILOG, IT Mill, Ittoolbox, JackBe, JetBrains, Kaazing, Krugle, Laszlo Systems, Lightstreamer, Manning Publications, Methods & Tools, Microsoft, Nexaweb, OpenSpot, OpSource, Oracle, Parasoft, Passport Corporation, PushToTest, Quasar Technologies, Rearden Commerce, Servoy, SmartClient / Isomorphic Software, SnapLogic, Sun Microsystems, TechTracker Media, Tele Atlas, The Thomson Corporation, ThinWire, TIBCO Software, TileStack, Universal Mind, Vertex Logic, Web Spiders, and Webtide.

More Stories By RIA News Desk

Ever since Google popularized a smarter, more responsive and interactive Web experience by using AJAX (Asynchronous JavaScript + XML) for its Google Maps & Gmail applications, SYS-CON's RIA News Desk has been covering every aspect of Rich Internet Applications and those creating and deploying them. If you have breaking RIA news, please send it to [email protected] to share your product and company news coverage with AJAXWorld readers.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
In addition to 22 Keynotes and General Sessions, attend all FinTechEXPO Blockchain "education sessions" plus 40 in two tracks: (1) Enterprise Cloud (2) Digital Transformation. PRICE EXPIRES AUGUST 31, 2018. Ticket prices: ($295-Aug 31) ($395-Oct 31) ($495-Nov 12) ($995-Walk-in) Does NOT include lunch.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, insiders, government compulsion, and network hackers? Join Ambuj Kumar (CEO, Fortanix) to discuss best practices and technologies for enterprises to securely transition to a multi-cloud hybrid world.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).