Enterprise Articles

Microsoft WCF Security

by Steven Cheng | October 2010 | Enterprise Articles Microsoft SOA

Windows Communication Foundation 4.0 (WCF 4.0) is a .NET-based application programming interface for building and running connected systems. It enables secure and reliable communication among systems within an organization or across the Internet.

In this article by Steven Cheng, author of the book Microsoft Windows Communication Foundation 4.0 Cookbook for Developing SOA Applications, we will cover:

  • Setting up ad hoc Windows authentication over plain HTTP
  • Getting an authenticated client identity in a service operation
  • Using username authentication with an ASP.NET membership provider
  • Sending a clear text username token over unsecured HTTP transport
  • Using transport and message security at the same time
Read Microsoft WCF Security in full

Oracle Business Intelligence: Drilling Data Up and Down

by Yuli Vasiliev | October 2010 | Enterprise Articles Oracle

In Oracle Discoverer, you can also use drilling to analyze data, getting a new angle on the data you're dealing with. There are several ways supported by Discoverer in which you can accomplish drilling. For example, you can drill data down to see more detailed information for a certain product. Or, on the contrary, you may need to view data at a higher level, drilling data up from products to categories. Another example is drilling to a related item, allowing you to add a related item that is not currently in the worksheet but can be found in a folder used by the worksheet.

This article by Yuli Vasiliev, author of Oracle Business Intelligence: The Condensed Guide to Analysis and Reporting, will walk you through the simple steps required to drill data on Discoverer worksheets. With the help of many examples, this article will introduce you to the following:

  • Navigating a Discoverer worksheet data with drilling
  • Drilling up and down
  • Drilling to a related worksheet item
  • Drilling from a worksheet graph
Read Oracle Business Intelligence: Drilling Data Up and Down in full

Scopes in Advanced BPEL

by Matjaz B. Juric | October 2010 | BPEL Enterprise Articles IBM SOA

This article by Matjaz B. Juric, author of the book WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, addresses the problems identified in the previous article, Fault Handling and Signaling in Advanced BPEL, where we discussed the various aspects of fault handling and signaling in BPEL.

In this article, we will cover:

  • Examples
  • Isolated scopes
Read Scopes in Advanced BPEL in full

Fault Handling and Signaling in Advanced BPEL

by Marc Delisle | October 2010 | BPEL Enterprise Articles IBM SOA

In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will learn about fault handling & signaling in BPEL

We will cover the following topics:

  • WSDL faults
  • Signaling faults
  • Handling faults
Read Fault Handling and Signaling in Advanced BPEL in full

BPEL Support in WebSphere

by Matjaz B. Juric | October 2010 | BPEL Enterprise Articles IBM SOA

In this article, by Matjaz B. Juric, authors of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will cover the following topics:

  • Long-running processes and microflows
  • Overview of BPEL activities
  • BPEL extensions
  • Assembly diagram
Read BPEL Support in WebSphere in full

Oracle Business Intelligence : Getting Business Information from Data

by Yuli Vasiliev | October 2010 | Enterprise Articles Oracle

In this article by Yuli Vasiliev, author of Oracle Business Intelligence: The Condensed Guide to Analysis and Reporting, you'll look at the basic concepts behind Business Intelligence. Proceeding with the discussion on data and information, it then moves on to describe what business questions you might need to answer, and how to find those answers from the data available at your disposal.

Listed as short bullets, here are the main topics of the article:

  • Basic introduction to data, information, and Business Intelligence
  • Answering basic business questions
  • Answering probing analytical questions
  • Asking business questions using data access tool
  • Deriving information from existing data
  • Accessing transactional and dimensional data

 

Read Oracle Business Intelligence : Getting Business Information from Data in full

Securing Dynamics NAV Applications

by Amit Sachdev Sharan Oberoi | October 2010 | Enterprise Articles Microsoft

In this article, by Sharan Oberoi & Amit Sachdev, author of Microsoft Dynamics NAV Administration, we will discuss the NAV Security Architecture including security recommendations and best practices. Securing our applications is of paramount importance these days. Security becomes even more critical when it is our organization's financial data that needs to be protected.

Essentially, there are a few components of securing the Dynamics NAV application. They are as follows:

  • Network security
  • Hardware security
  • SQL database and Classic database security
  • Dynamics NAV access—roles, users, logins, and permissions
Read Securing Dynamics NAV Applications in full

Hosting Workflow Applications in Microsoft Windows Workflow Foundation 4.0

by Andrew Zhu | October 2010 | Cookbooks Enterprise Articles Microsoft

In this article, by Andrew Zhu, author of Microsoft Windows Workflow Foundation 4.0 we will cover:

  • Hosting a workflow service in IIS7
  • Hosting workflow in ASP.NET
  • Hosting workflow in WPF
  • Hosting workflow in a Windows Form
Read Hosting Workflow Applications in Microsoft Windows Workflow Foundation 4.0 in full

Installing and Using Sametime Connect

by Marie L. Scott Thomas Duff | October 2010 | Enterprise Articles IBM

Sametime Connect is the stand-alone Sametime client that you can use to connect with Sametime networks without using Lotus Notes for e-mail. The Sametime Connect client is as functional as the embedded client and is available for Windows, Mac, and Linux systems.

In this article, by Marie L. Scott & Thomas Duff, authors of IBM Lotus Sametime 8 Essentials, you'll learn how to:

  • Install the Sametime Connect client on a Windows, Mac, or Linux desktop
  • Set up the connection to the Sametime server
  • Log into and out of the Sametime Connect client
  • Set up user preferences
  • Install Sametime Connect add-ons for additional Sametime functionality
  • Upgrade your Sametime Connect client
Read Installing and Using Sametime Connect in full

New IBM Books from Packt

by | March 2011 | Enterprise Articles IBM

A quick round-up of Packt's IBM books

Read New IBM Books from Packt in full
Syndicate content
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software