IT-Security: Part 1 to 5 as PDF file

Key words:IT-Security, Security Challenges, OPSS Architecture, WebLogic Server, JAAS, JAAS LoginModules, Authentication, Basic Authentication, Certificate Authentication, Digest Authentication, perimeter Authentication and Identity Assertion Until now I have published five parts of a series of articles on IT-Security and Oracle Fusion Middleware: I’m going to continue the IT-Security’s articles and you […]

Oracle BPM 12c – Quick Start Installation (uncensored)

Getting started in 15 minutes! One of the challenges with previous releases was, that SOA & BPM composites couldn’t be deployed and tested on the JDeveloper integrated Weblogic server. Therefore a separate installation of SOA/BPM Suite or a virtual image was necessary to start developing. Now with the new release Oracle introduced a single-click installer […]

OSB: Using Tuxedo transport with eclipse development environment

When doing development for the OSB I usually don’t do this with the sbconsole, I use eclipse instead. There are some reasons: It is my usual development environment It is directly connected to the concurrent version tool The build and deploy scripts are used and tested from the start of the project The debugging feature […]

IoT prototype – low-level thoughts about camunda BPM and Drools Expert (part 6)

As already mentioned in the second part of this series, building systems of this type consists of several components. In this part we describe the integration of a BPMN 2.0 capable workflow management system and a business rule engine in our IoT prototype. Why do we need such things Currently we live in times of a knowledge society […]

Lessons Learned Applikationswartung – Eine Retrospektive (Teil 1)

  Dieser Blogeintrag ist der Anfang einer Serie von Blogeinträgen, in denen ich meine Erfahrungen mit der Organisation von Wartung und Weiterentwicklung von Individualsoftware weitergeben möchte. Hierbei betrachte ich in einer Art Retrospektive die Erfahrungen, die ich mit meinem Team bei Opitz Consulting gesammelt habe. Dieses Team erbringt unter dem Namen „Managed Services Applications“ Dienstleistungen […]

IT-Security (Part 5): WebLogic Server, perimeter Authentication and Identity Assertion

I tried to discuss about “perimeter authentication” in one extra part of IT-Security’s blogs, because this authentication’s process is an essential approach in a heterogonous world of systems, applications and technologies that they need to trust and communicate to each other.  Generally, we discussed about perimeter authentication, if a remote user requires an asserted identity […]

IoT prototype – Retrospective. What did we learn? What did we miss? (part 5)

Okay so controlling our lights now works automatically based on entering and leaving the building, thats great! But what did we learn from all this? What do we believe can be transferred to a general concept found in (almost) all possible IoT projects?   What did we learn? Communication takes more than one way Meaning, […]

IoT prototype – low-level thoughts about the 433mhz communication (part 4)

This prototype started off as a personal project. So it’s not a big surprise why the 433mhz plugs were chosen as a first tech. They are in every household and I wanted to retrofit what was already there to become a bit smarter. Being able to group, manage and remotely control these plugs is an […]

IoT prototype – low level thoughts on Oracle CEP Embedded (part 3)

In our prototype we used an Oracle CEP Embedded application running on a separate Raspberry Pi to scan the network for arriving / leaving devices and link them to our users. We could have left this logic in our Spring server and have it running in our service layer but we wanted to learn more about […]

IoT prototype – an architectural overview (part 2)

With our prototype we had a few goals: learn about the technologies that are involved in the IoT space Follow a good architectural principle get the attention (and trigger their curiosity) of visitors at different events Of course there were also the functional requirements of being able to effectively know when a user is present or […]