Welcome!

Machine Learning Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White, Corey Roth

Related Topics: Machine Learning

Machine Learning : Article

AJAX and Social Computing for the Enterprise

Steve Maryka's iPhone Session at AJAXWorld, March 18-20, in New York City

Social computing is no longer a casual activity: corporations are increasingly leveraging wikis and blogs to enhance collaboration inside and outside the firewall. Next-generation social computing demands spontaneous and responsive collaboration. Are AJAX technologies up to the task? This presentation explores the challenges, practices, and futures for AJAX collaboration techniques. Beginning with a review of existing open source AJAX technologies, covering deployment infrastructure, application development, and supporting libraries, we will continue with several examples of what is possible today. This session will give you an understanding of where social computing can go and what AJAX technologies will take it there.

Speaker Bio: Steve Maryka is CTO at ICEsoft Technologies Inc., and leads the ICEfaces open source project. He has been involved in Java-based AJAX techniques since 2003 - a time before the term “AJAX” was even coined. Prior to joining ICEsoft, Steve was co-founder of AudeSi Technologies where he served as VP of Technology and led Java product development for Internet appliances. After AudeSi was acquired by Wind River Systems in 2000, he served as a principle technologist there until joining ICEsoft.

Register for AJAXWorld Conference & Expo
Submit Your Paper to Present a Session
Sponsor AJAXWorld Conference & Expo

2008  Will Be The Decision Year for RIAs
AJAXWorld Conference & Expo 2008 will provide delegates with the optimum balance between RIAs, Rich Web Technologies and AJAX, while underlining business needs, technology potential, and enhanced user experience.

This year at AJAXWorld the relentless focus is not only on where RIAs are now but also where Rich Web Technologies are headed, where Enterprise Web 2.0 and Social Applications are taking the software development industry and the end user, and how Rich Web Technologies are transforming our businesses and our lives.

Delegates will learn how RIAs are making money and gaining market-share for some of the leading businesses in the world.

The real-world questions that will be answered by this year's 140+ sessions are those that currently preoccupy working developers, architects, IT managers and business line managers. The 2008 tracks include:

  • Enterprise RIAs and AJAX
  • Rich-Web Case Studies and Mash-Ups
  • Enterprise Web 2.0 & Social Applications
  • Event-Driven Web
  • iPhone Developer Summit
  • Diamond Track

AJAXWorld is sponsored by the world’s leading RIA technology providers including.

Conference faculty includes the world’s top RIA experts.

More Stories By RIA News Desk

Ever since Google popularized a smarter, more responsive and interactive Web experience by using AJAX (Asynchronous JavaScript + XML) for its Google Maps & Gmail applications, SYS-CON's RIA News Desk has been covering every aspect of Rich Internet Applications and those creating and deploying them. If you have breaking RIA news, please send it to [email protected] to share your product and company news coverage with AJAXWorld readers.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-centric compute for the most data-intensive applications. Hyperconverged systems already in place can be revitalized with vendor-agnostic, PCIe-deployed, disaggregated approach to composable, maximizing the value of previous investments.
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.