1. Spotlight: New Thinking about Cloud Computing
  2. Videos
  3. Newsletters
  4. Resources

About

  • About Us
  • Advertise
  • Contact Us
  • Foundry Careers
  • Newsletters
  • Contribute to InfoWorld
  • Reprints

Policies

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • E-commerce Affiliate Relationships
  • Your California Privacy Rights

Our Network

  • CIO
  • Computerworld
  • CSO
  • Network World

More

  • News
  • Features
  • Blogs
  • BrandPosts
  • Events
  • Videos
  • Enterprise Buyer’s Guides
  • Analytics
  • Artificial Intelligence
  • Generative AI
  • Careers
  • Cloud Computing
  • Data Management
  • Databases
  • Emerging Technology
  • Technology Industry
  • Security
  • Software Development
  • Microsoft .NET
  • Development Tools
  • Devops
  • Open Source
  • Programming Languages
  • Java
  • JavaScript
  • Python
  • IT Leadership
  • Enterprise Buyer’s Guides
Popular Topics
  • Artificial Intelligence
  • Cloud Computing
  • Data Management
  • Software Development
  • Spotlight: New Thinking about Cloud Computing
  • Videos
  • Newsletters
  • Resources

Topics

  • Analytics
  • Artificial Intelligence
  • Generative AI
  • Careers
  • Cloud Computing
  • Data Management
  • Databases
  • Emerging Technology
  • Technology Industry
  • Security
  • Software Development
  • Microsoft .NET
  • Development Tools
  • Devops
  • Open Source
  • Programming Languages
  • Java
  • JavaScript
  • Python
  • IT Leadership
  • Enterprise Buyer’s Guides

About

  • About Us
  • Advertise
  • Contact Us
  • Foundry Careers
  • Newsletters
  • Contribute to InfoWorld
  • Reprints

Policies

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • E-commerce Affiliate Relationships
  • Your California Privacy Rights

Our Network

  • CIO
  • Computerworld
  • CSO
  • Network World

More

  • News
  • Features
  • Blogs
  • BrandPosts
  • Events
  • Videos
  • Enterprise Buyer’s Guides
    1. Home
    2. Software Development
    3. Competing components make for prickly panelists
    by Jill Steinberg

    Competing components make for prickly panelists

    news
    Mar 1, 19975 mins
    JavaTechnology Industry

    Find out what sparked a debate between proponents of JavaBeans and ActiveX at Web Design & Development '97

    Advertisement

    Advertisement

    After a slow and uninspired start, the session “Competing Components: ActiveX and Java Technologies for Web Enhancement and Application Engineering” turned into a tense wrangle over component camps between two panelists, Charles Fitzgerald, program manager of Microsoft’s Java team, and Mansour Safai, Symantec’s general manager of Internet Development Tools. Theresa Lanowitz, group product marketing manager of Internet Tools at Borland International, fleshed out the sparse panel, which was moderated by Peter Coffee of PC Week Labs.

    Advertisement

    The conference brochure promised attendees a “lively discussion and critical comparison between Microsoft’s ActiveX and SunSoft’s JavaBeans component architectures.” The brochure also mentioned that representatives from Microsoft and SunSoft, as well as others, would be present. Overall, the event fell short of its stated goals: SunSoft, or more appropriately, JavaSoft did not send a representative, and the panelists did not concentrate on the crucial stuff — security, for example. In fact, if it weren’t for a question from the audience at the end of the hour on the subject of security vis-a-vis ActiveX and JavaBeans, the attendees would’ve left the session only having Coffee’s overly general introductory presentation on Web security.

    You might think that the tussle between Fitzgerald and Safai would have produced the liveliness forecast by the brochure. But the mood was more uncomfortable than exciting, and the discussion lacked the detail the audience no doubt desired.

    Why get into a religious war when you can use both?

    In answer to Coffee’s initial question to the panel, “What’s the biggest misconception or most misunderstood issue with component technology?” Microsoft’s Fitzgerald was ecumenical: Making “religious decisions” — choosing one component architecture over the other wholesale, because of company loyalty — is not the way to guarantee success with a project, he said, noting that there are pros and cons to each of the components.

    Safai, from Symantec, was in agreement with Fitzgerald’s statement, stating that developers must first define their needs — Is this going to be an applet or standalone app? Is security a major consideration? What about size? — and then choose a component model that fits the project. Safai followed this thought with the statement, “My personal opinion is that JavaBeans are going to take over.”

    Open standards and security spark heated debate

    The session began to disintegrate around the topic of open standards. “It’s completely ridiculous to have standards bodies for languages,” said Safai, in response to a comment by Fitzgerald about ActiveX’s openness. The Symantec rep pointed out that you start with a compact language and through the standards process end up with something huge. “JavaSoft has done an amazingly good job of keeping the language open,” said Safai. “Java is a language that was designed by people that knew how a language should be written.”

    The fundamental question, Fitzgerald countered, is: “How is Java is going to mature?” As he sees it, the language will have to go to several iterations, and either JavaSoft can manage the language or it can open it up to everyone. Safai summed up his thoughts on Java’s maturation with the following: “Java in ’96 was a slow language but in ’97 I can promise you it’ll be a fast language.”

    The question from the audience on security and ActiveX fanned the flames of tension between Fitzgerald and Safai. “If you want security on the ‘Net,” said Fitzgerald, “unplug your computer. … We never made the claim up front that ActiveX is intrinsically secure.” The code-signing model from Microsoft is what JavaSoft and others are moving toward, he argued. (Fitzgerald was referring to the addition in JavaSoft’s new JDK 1.1 of code signing, but failed to note that JDK 1.1 retains the sandbox security model as well — something ActiveX lacks.)

    Where was Borland’s Lanowitz in all this? While occasionally she contributed to the discussion, her comments mainly served to promote Borland and JBuilder and didn’t add anything substantial or particularly relevant to the issues at hand.

    Conclusion: Attendees can’t get no (component) satisfaction

    A glance around the room revealed audience members who appeared dissatisfied and perhaps somewhat annoyed by the lack of depth and relevance to this session. Safai, in a separate discussion with JavaWorld, attributed much of the attendees’ frustration to a desire for a definitive answer: Some audience members approached him right after the panel discussion, asking for clear-cut reasons to go with either ActiveX or JavaBeans. While the session may not have been what it set out to be, it did make the clear point that there is no one answer, except, perhaps, “It depends.”

    When asked about the debate over JavaBeans and ActiveX, Kevin Ready, president of the Blue Platypus online site and member of the West Design Team in the conference’s contest to create a Web page in a day, said: “Microsoft in its ActiveX control strategy is like that of an ostrich. It sees the obvious security flaws with ActiveX and wants to keep talking around the issue — never confronting it head on. ActiveX does not provide the level of security that corporate America demands.”

    Related content

    news

    MariaDB’s acquisition of Codership: Why enterprises should care

    By Anirban Ghoshal
    May 30, 2025 4 mins
    Data Management Databases Technology Industry
    feature

    AI didn’t kill Stack Overflow

    By Matthew Tyson
    May 28, 2025 9 mins
    Developer Generative AI Technology Industry
    analysis

    IT leadership lessons from Leeroy Jenkins

    By David Linthicum
    May 27, 2025 5 mins
    Artificial Intelligence Generative AI Technology Industry
    news

    Leaderboard illusion: How big tech skewed AI rankings on Chatbot Arena

    By Gyana Swain
    May 2, 2025 1 min
    Chatbots Generative AI Technology Industry

    Other Sections

    • Resources
    • Videos
    • Spotlight: New Thinking about Cloud Computing

    Show me more

    news

    Salesforce changes Slack API terms to block bulk data access for LLMs

    By John E. Dunn
    Jun 11, 20251 min
    APIsArtificial IntelligenceGenerative AI
    Image
    news

    Databricks aims to optimize agent building for enterprises with Agent Bricks

    By Anirban Ghoshal
    Jun 11, 20255 mins
    Artificial IntelligenceGenerative AISoftware Development
    Image
    brandpost Sponsored by Google

    Building an analytics architecture for unstructured data and multimodal AI

    By Ganesh Kumar Gella, Sr. Director, Engineering, Google BigQuery Generative AI Initiatives
    Jun 11, 20255 mins
    Artificial IntelligenceBig Data
    Image
    video

    How to deploy AI agents with the Google Agent Development Kit for Python

    Jun 10, 20254 mins
    Python
    Image
    video

    Python 3.14's new template string feature

    Jun 6, 20255 mins
    Python
    Image
    video

    How to use the new Python Installation Manager tool for Python 3.14

    May 27, 20254 mins
    Python
    Image

    Sponsored Links

    • Empower your cybersecurity team with expert insights from Palo Alto Networks.
    • Secure AI by Design: Unleash the power of AI and keep applications, usage and data secure.
    About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
    • BrandPosts
    Policies
    • Terms of Service
    • Privacy Policy
    • Cookie Policy
    • Copyright Notice
    • Member Preferences
    • About AdChoices
    • E-commerce Affiliate Relationships
    • Your California Privacy Rights
    • Privacy Settings
    Our Network
    • CIO
    • Computerworld
    • CSO
    • Network World
    • Facebook
    • X
    • YouTube
    • Google News
    • LinkedIn
    © 2025 IDG Communications, Inc. All Rights Reserved.
`, cio: `

🚀 The new CIO.com hybrid search: 🔍 Explore CIO content smarter, faster and AI powered. ✨

`, nww: `

🚀 The new NetworkWorld.com hybrid search: 🔍 Explore NetworkWorld content smarter, faster and AI powered. ✨

`, cw: `

🚀 The new Computerworld.com hybrid search: 🔍 Explore Computerworld content smarter, faster and AI powered. ✨

`, cso: `

🚀 The new CSOonline.com hybrid search: 🔍 Explore CSO content smarter, faster and AI powered. ✨

` }; const sharedStyles = ` `; const publisher = foundry_get_publisher(); const htmlContent = contentSwitch[publisher]; if (!htmlContent || !document.body) return; document.body.insertAdjacentHTML("afterbegin", htmlContent + sharedStyles); const bar = document.querySelector(".section-block--announcementbar"); if (bar) { requestAnimationFrame(() => { bar.classList.add("section-block--announcementbar--visible"); }); } const btn = document.querySelector(".section-block--announcementbar .reset-button"); const searchIcon = document.querySelector('.header__icon-button[data-menu-trigger="search"] svg'); const searchTrigger = document.querySelector('[data-menu-trigger="search"]'); if (searchIcon) { searchIcon.innerHTML = ''; } if (btn && searchTrigger) { btn.addEventListener("click", () => searchTrigger.click()); } console.log("[MISO SCRIPT] Conditions met, initializing Miso search announcements."); }; initMisoSearchAnnouncements(); }); document.addEventListener('consentManagerReady', () => { const hasConsentYouTube = consentManager.checkConsentByVendors([ 'YouTube', 'YT' ]); if (hasConsentYouTube.some(vendor => vendor['Has Consent'] === false)) { console.log('[YOUTUBE SCRIPT] Consent not given for YouTube.'); } else { console.log('[YOUTUBE SCRIPT] Consent given for YouTube. Loading script...'); } }); document.addEventListener('consentManagerReady', () => { const hasConsentGAM = consentManager.checkConsentByVendors([ 'Google Ad Manager', 'GAM' ]); if (hasConsentGAM.some(vendor => vendor['Has Consent'] === false)) { console.log('[GAM SCRIPT] Consent not given for GAM.'); } else { console.log('[GAM SCRIPT] Consent given for GAM. Loading script...'); } }); document.addEventListener('consentManagerReady', () => { const hasConsentGoogleFonts = consentManager.checkConsentByVendors([ 'Google Fonts', 'Google Web Fonts' ]); if (hasConsentGoogleFonts.some(vendor => vendor['Has Consent'] === false)) { console.log('[GOOGLE FONTS SCRIPT] Consent not given for Google Fonts.'); } else { console.log('[GOOGLE FONTS SCRIPT] Consent given for Google Fonts. Loading script...'); } }); document.addEventListener('consentManagerReady', () => { const hasConsentAdobeTypekit = consentManager.checkConsentByVendors([ 'Adobe Typekit' ]); if (hasConsentAdobeTypekit.every(vendor => vendor['Has Consent'] === true)) { if (foundry_is_edition('kr')) { const link = document.createElement('link'); link.rel = 'stylesheet'; link.href = 'https://use.typekit.net/ysx4dcu.css'; document.head.appendChild(link); } } }); document.addEventListener('consentManagerReady', () => { const vendors = ['Subscribers']; const hasConsentSubscribers = consentManager.checkConsentByVendors(vendors); if (hasConsentSubscribers.some(vendor => vendor['Has Consent'] === false)) { return; } else { if (foundry_is_language('en')) { console.log('Language is English'); // subscribers english .. } if (foundry_is_edition('kr')) { console.log('Edition is Korean'); // subscribers in korean .. } if (foundry_is_edition('ja')) { console.log('Edition is Japanese'); // subscribers in japanese .. } } });