Archives

You are currently viewing archive for January 2010
Category: Technologies
Posted by: bagheljas
eXtensible Markup Language (XML) is invented to share and store data independent of platforms and technologies. XML has emerged as the de-facto standard for configurations and data services of new generation applications due to its simplicity and portability.

An XML document contains element(s). An element may have simple text, other element(s), and attribute(s).

The following XML technologies are created to define, manage, and use of data stored in XML:
  • Document Type Definition (DTD) defines the legal building blocks, the elements and attributes of an XML document. DTD didn't address what values (i.e. data type) these elements and attributes can have.
  • XML Schema Definition (XSD) is also used to define the legal building blocks, the elements and attributes of an XML document, just like a DTD but XML Schemas has support for data types and namespaces.
  • XML Namespaces provides a method to avoid element name conflicts.
  • XML Query Language (XQuery) plays the same role as SQL plays for RDBMS.
  • XML Path Language (XPath) provides a method to directly select nodes or node-sets in an XML document. It is the foundation for XSLT.
  • XML Linking Language (XLink) defines a standard way of creating hyperlinks in XML documents.
  • XML Pointer Language (XPointer) allows the hyperlinks to point to more specfic sections of the XML document.
  • eXtensible Stylesheet Language Transformations (XSLT) facilitates xml document transformations into XHTML, other XML, text, and various other format document.
Category: Buz Words
Posted by: bagheljas
Enterprise Service Bus (ESB) is a software application that works as proxy between consumers and producers of the SOA Services, and Legacy Business Systems.

Usually an ESB has the following functions:
  • Supports and transforms synchronous and asynchronous transport protocols
  • Content based smart routing, Service Orchestration and Process Choreography
  • Message Validation against schemas, and Message processing, transformation and enhancement.
  • Services Metrics, Monitoring and Metering
  • Services Security
Category: Buz Words
Posted by: bagheljas
HyperText Transfer Protocol (HTTP) is a stateless application protocol that runs on top of the TCP/IP, the foundation protocol of Internet. Internet Cookies framework is used to have the statefull behavior. HTTP protocol defines the rules and standards for Web Server also know as HTTP Server (e.g. Apache, IIS etc.) and Web Client also know as HTTP Client ( e.g. Internet Explorer, Firefox, Chrome etc. ) data exchange based on request and response paradigm.

Good to know:
  • Uniform Resource Locator (URL) is used for submitting a request from a Web Client. Usually an URL consist of Protocol, Host Address (DNS Name / IP Address), Port* and Uniform Resource Identifier (URI)*. Please note that Port and URI in an URL are the optional fields and when they are not present, default values are used. URI default value is decided by Web Server while port default values are from HTTP rules and standards. Usage patterns of the URLs are
    • protocol://hostAddress
    • protocol://hostAddress/URI
    • protocol://hostAddress:port/URI
    • protocol://hostAddress:port
  • Web Server Daemon's default listening ports are 80 (http) and 443(https).
  • The Request and Response message consist of an header and an optional message body. The key parameter of a request is HTTP method and of a response is HTTP status code.
  • The HTTP request methods are OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE, and CONNECT. The commonly used HTTP request methods in an web application implementation are
    • GET Submits a request for the identified resource. Optionally capable to take limited data as URI query parameters in header.
    • POST Submits data as part of the message body to the identified resource. Capable to submit large data.
    • HEAD Same as GET, but request gets an response without message body.
  • The response status codes are divided into four categories 1xx Informational, 2xx Success, 3xx Redirection, 4xx Client Error, and 5xx Server Error. The commonly seen HTTP response status code are
    • 200 OK
    • 301 Moved Permanently
    • 302 Temporary Redirection
    • 304 Not Modified
    • 401 Not Authorized
    • 403 Forbidden
    • 404 Not Found
    • 500 Internal Server Error
    • 501 Not Implemented
    • 502 Bad Gateway
    • 503 Service Unavailable
  • HTTPS provides the Transport Layer Security (TLS) for the data exchange between Web Client and Web Server built on Public Key Infrastructure (PKI) framework.
Category: General
Posted by: bagheljas
IT Security Management is about implementing and managing the processes, tools and technologies to ensures the IT Services and Data Confidentiality, Integrity, and Availability.

The IT Security Management in an organization is responsible for the following tasks:
  • Managing Confidentiality, Integrity and Availability of Information Services and Data
  • Providing Security Cost of Implementing and Managing Effectively
  • Proactively Addressing need based Security Improvements

IT Security Management Key Performance Indicators:
  • Number of incidents caused by internal and external security failures
  • Number of security audits and testing failures
Category: Buz Words
Posted by: bagheljas
Java Remote Method Invocation (RMI) enables the programmer to implement a java applications into distributed computing paradigm. These distributed components can invoke methods of remote java objects using RMI. Alternatively, RMI facilitates the direct access to business functions implemented in a remote Java Virtual Machine.

Java RMI uses object serialization to marshal and unmarshal parameters and doesn't truncate types, i.e. supporting true Object-Oriented Polymorphism.
Category: Buz Words
Posted by: bagheljas
JMS is the Message Oriented Middleware (MOM) from J2EE platform that facilitates the asynchronous distributed communication between software components and applications. Alternatively, JMS provides the decoupled interface for exchanging information between software components and applications. The software components and applications may or may not be build in J2EE.

JMS supports the following two models for message delivery.
  • Point-to-Point (Queue)
  • Publish and Subscribe (Topic)

Misc JMS Terms
  • Provider: An implementation of the JMS interface for a Message Oriented Middleware(MOM) acts as Message Store.
  • Client: An application or process that produces and/or consumes messages.
  • Producer: A JMS client that posts messages into the Message Store.
  • Consumer: A JMS client that receives messages from the Message Store.
  • Message: An object that contains the data being transferred between JMS clients.
  • Queue: Message is consumed only once by a JMS client from the Message Store.
  • Topic: Message could be consumed by multiple JMS client from the Message Store.

Enterprise class MOMs providers are expected to scale, highly available, ensure message delivery, and support client application(s) for multiple platforms and technologies.


Disclaimer

The views expressed in the blog are those of the author and do not represent necessarily the official policy or position of any other agency, organization, employer, or company. Assumptions made in the study are not reflective of the stand of any entity other than the author. Since we are critically-thinking human beings, these views are always subject to change, revision, and rethinking without notice. While reasonable efforts have been made to obtain accurate information, the author makes no warranty, expressed or implied, as to its accuracy.