Now while Amex really should have understood the term minimum there are examples where it really isn't an issue if someone gets it wrong in displaying the information to you. Sometimes this indicates that a prediction has been incorrect or that "approximately" is good enough for this scenario.Is a good example of this, the current temperature on the Sydney Morning Herald site is listed as one
By default no composite name is set when a SCA composite is executed. For runtime monitoring and tracking purposes it might be useful to set a custom name at design time for your SCA composite. Especially, when the number of instances increases in production.
By using embedded Java for BPEL components and XPath for Mediator components you are able to manipulate the title of a SCA composite during design time.
XPath for Mediator components:
I recently have decided to start blogging again. I don't no exactly why, but most probably it's due to the fact that I want to share my enthusiasm for SOA and Java technology with you. Especially those with an Oracle flavor..
The main topics of this blog will be:
Staying on the topic of hosted applications and security I thought I'd bring this to your attention. MessageLabs, a Symantec Company, is organising a breakfast seminar on Hosted Security in Dublin, in November. Although I won't be attending, you may find the presentations interesting and maybe get a free croissant or two.
Posted by Mike Rollings
But in some environments you are not allowed or you just don't want to put your authorized_keys to the servers, which you want to access. But how to automate logins to this servers?