|
|
Meta-Services |
- Many services are being built on top of HTTP, using different services on the Web
- Some go "postal"; Some use other protocol requests, or special content types
- Problem: there is no procedure signature. How do you know if you can continue safely, or not?
- How to reliably "break" applications built on top
- Right now, this requires a smart animal (the human elephant), to detect changes
- Not firewall friendly -> competent admins will forbid use
- Language technology has much to offer here:
- But: current object technology is too "brittle"; ends must be independently evolvable without agreement