Professional Development Seminars
|Aspect Oriented Programming for Java||Saturday, November 16, 2002 - 9:00am||Gregor Kiczales and Ron Bodkin||
Aspect-oriented programming (AOP) allows developers to create clearer, cleaner, and more flexible software. AOP makes it possible to centralize code in a single class that typically would be spread across many classes when implementing features such as logging, standards enforcement, security, and testing. This difference allows increased productivity, and results in more flexible and higher quality software.
|Crossing the Requirements-Design Chasm||Saturday, November 2, 2002 - 9:00am||Steve Donelow||
Gathering requirements is one of the most critical stages in the software lifecycle, although requirements gathering in the real-world is usually an unrepeatable, ad-hoc process because most formal methods are too complex, too costly, or fail to capture the right information. Here's a very common scenario: "Just tell us what you want", says the IT developer. "Just tell me what you need to know", responds the business user.
|Recent Breakthroughs in Web Site Usability Research||Saturday, October 5, 2002 - 9:00am||Jared M. Spool and Christine Perfetti||
The seminar presents some of the recent breakthroughs that have occurred in the area of web site usability. User Interface Engineering is a leading producer of breakthrough web site research and they have focused their work on understanding just what it takes to make web sites more usable.
|Simplified XML Programming in Water||Saturday, May 4, 2002 - 9:00am||Christopher Fry & Mike Plusch||
|Understanding Network Security Protocols||Saturday, April 27, 2002 - 9:00am||Radia Perlman & Charlie Kaufman||
The two most important questions that network security protocols attempt to answer are "Who are you?" and "Should you be doing that?" This lecture will give an overview of how network security protocols work, including the basics of Cryptography, key distribution, and protocol design pitfalls. It also will emphasize the system issues involved in making such systems work. Although the cryptography might be sound and the protocols themselves correct, there tend to be other issues, without which things are not deployable, or scalable, or secure.