Oracle VM Consulting
view counter

SOA Feed

Oracle SOA Suite 10g and 11g resources, news, and support articles.

Securing Big Data - Part 4 - Not crying Wolf.

In the first three parts of this I talked about how Securing Big Data is about layers, and then about how you need to use the power of Big Data to secure Big Data, then how maths and machine learning helps to identify what is reasonable and was is anomalous.

The Target Credit Card hack highlights this problem.  Alerts were made, lights did flash.  The problem was that so many lights flashed and

JBoss Data Virtualization 6.1 Beta Now Available

JBoss Data Virtualization (JDV) is a data integration solution that sits in front of multiple data so

#371 how to execute a shell script command from SOA Suite

Simple approach here -

execute the shell cmd from Java.
Expose the Java class as a web service.
Invoke from BPEL.

I got the Java code from here
Essentially the web service operation accepts in a website as string.
All I do is execute a ping and then return the result.

I massaged it a bit and then deployed as a web service to Weblogic.

I then created the composite -

#370 MFT --> Resubmitting successfully transferred files


I have a simple MFT transfer --> MyAA 2 MyBB

#369 UMS Email adapter (part 2)--> send PDF file as an email attachment

Simple scenario -

Read in a pdf file and send it as a pdf attachment.

Securing Big Data - Part 3 - Security through Maths

In the first two parts of this I talked about how Securing Big Data is about layers, and then about how you need to use the power of Big Data to secure Big Data.  The next part is "what do you do with all that data?".   This is where Machine Learning and Mathematics comes in, in other words its about how you use Big Data analytics to secure Big Data.

What you want to do is build up a picture of

Integrating Microservices With Apache Camel

Just a short head-ups, that there is an interesting and free webinar upcoming with Red Hat's Christian Posta (@christianposta) about how to use patterns from SOA to build out intelligent routing systems with Apache Camel, and centralized management, service discovery, versioning, and tooling support from JBoss Fuse.

Securing Big Data - Part 2 - understanding the data required to secure it

In the first part of Securing Big Data I talked about the two different types of security.  The traditional IT and ACL security that needs to be done to match traditional solutions with an RDBMS but that is pretty much where those systems stop in terms of security which means they don't address the real threats out there, which are to do with cyber attacks and social engineering.  An ACL is only

#367 File Adapter --> use of Trigger File

Simple scenario -

D:\BBB\inTrigger is my directory for incoming orders - 1 order per file.
I do not want to start processing the orders until all have been received.
This will be signaled by the arrival of a file called end.txt.

Here is my composite -

view counter