The adoption of Business Process Management (BPM) is increasingly becoming one of the most popular approaches for boosting overall organizational excellence. Built on Oracle's SOA (Service Oriented Architecture) Suite infrastructure, BPM Suite 11g provides enhanced support for application integration services and business events, Web 2.0 and E2.0 style collaborations, and high scalability. It is a full-featured, enterprise-grade BPMS that has sufficient easy-to-use features to make it also suitable for small departmental quick-win projects.
This article by Heidi Buelow, Manoj Das, Manas Deb, Prasen Palvankar and Meera Srinivasan, authors of the book Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial, gives an overview of strategies and planning steps helpful in starting individual BPM projects and broader BPM initiatives.Read Getting Started with BPM in full
When embarking on an SOA journey, developers often come across the daunting realities of multiple programming languages, technologies, data format representation, implementation framework options, and such others, when they build services, use services, and develop solutions that aggregate services. The focus should be on programming the business and service design, not on the technology of the underlying implementation.
In this article by Matjaz B. Juric, author of the book WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will take a look at IBM's SOA programming model.Read The IBM SOA Programming Model in full
In this article by Pav Kumar-Chatterjee, author of IBM InfoSphere Replication Server and Data Event Publisher, we will cover the following topics:
- Checking the state of a Q subscription
- Stop, drop, alter or start a Q subscription
- Sending a signal using ASNCLP
While developing enterprise-scale applications, developers often find themselves focusing on mundane and repeated tasks generally referred to as cross-cutting concerns: tasks such as writing repeated data access code, logging exceptions, handling and managing exceptions, caching data, validating user input, and so on. Although these tasks are important, developers often spend a lot of time implementing and debugging these cross-cutting concerns rather than channeling their efforts towards the core business requirements of customers.
In this article by Sachin Joshi, author of Microsoft Enterprise Library 5.0, you will:
- Receive an overview of Enterprise Library
- Receive a brief introduction to functional application blocks
- Learn about the dependencies between the functional application blocks
- Learn the system requirements
- Learn to install Enterprise Library
This article, by Karen Hooper, author of IBM Lotus Notes 8.5 User Guide, focuses on the advanced features available in mail and how we can best utilize them to assist us in being efficient with mail management.
In this article, we will explore the following topics:
- Senders Colors and Recipient Icons
- Collaboration history
- Finding available time
- Copying into Tool … Memo/Calendar/To Do
- Follow up Feature (flagging)
- Message recall
In this article by Matt Traxinger, author of Microsoft Dynamics NAV 2009 Programming Cookbook, we will cover:
- Using HYPERLINK to open external files
- Working with environment variables
- Using SHELL to run external applications
- Browsing for a file
- Browsing for a folder
- Checking file and folder access permissions
- Querying the registry
- Zipping folders and files within NAV
In the previous article, Securing a BPEL process, we saw the principles of securing BPEL processes.
In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will look at how to secure BPEL processes, so that they can be accessed only by authenticated users. In a nutshell, we will:
- Configure the web service export of a BPEL process to propagate user identity to the process, so that a process instance ownership can be claimed in that user's name
- Protect a BPEL process at SCA level as a component to implement access to the process for authorized users only
In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will get familiar with basic security concepts of WebSphere Application Server regarding protection of BPEL processes. We will create and protect a web service export of a BPEL process by user authentication, which requires providing a username and password inside the UsernameToken of the WS-Security specification.Read Securing a BPEL process in full
Windows Communication Foundation 4.0 (WCF 4.0) is a .NET-based application programming interface for building and running connected systems. It enables secure and reliable communication among systems within an organization or across the Internet.
In this article by Steven Cheng, author of the book Microsoft Windows Communication Foundation 4.0 Cookbook for Developing SOA Applications, we will cover:
- Hosting a service in a console application
- Hosting a service in Windows Service
- Hosting a HTTP service with ASP.NET-compatible context
- Hosting a non-HTTP service in IIS 7
- Customizing IIS ServiceHost via ServiceHostFactory
- Specifying a dedicated service instance for a singleton service
- Hosting a service in WSS 3.0
Forms are a predominant visual element in Dynamics NAV. They allow the user to view, insert, modify, and delete data from the tables in the database. Forms also allow the user to initiate events that perform actions on that data.
This article series by Matt Traxinger, author of Microsoft Dynamics NAV 2009 Programming Cookbook, shows you how to create displays that will allow your users to interact with the data. You will learn how to create several different types of forms including matrixes and wizards and to customize its look and feel.
In this four-part article series, we will cover:
- Designing Forms
- Creating a matrix form
- Creating a wizard-style form
- Updating Parent and Subform