While you can create a Salesforce Community using the Community Builder directly in your production environment, I would not recommend it in the majority of cases. Fortunately, it is quite easy to deploy your templates into production by following these three simple steps: Step 1: Use Change Sets Use change sets to move all custom lightning […]
Integration + IT Modernization
An Early Look at Liferay 7 Features
Looking forward into 2016, here is a hint of features in Liferay 7. For those very adventurous, there is an currently alpha available but the release is still scheduled for 1Q 2016. As you can image, there has been a lot of interest in the past few months around what is in store. At the […]
Token-Based Authentication: Part 1- JWT with DP Firmware 7.2.0.0
This tutorial series explains how to issue and validate different types of tokens such as JWT(JSON Web Token) , SAML HoK(Holder-of key) using IBM DataPower gateway. In this article, you learn about the issuance and validation of JWT with firmware v 7.2.0.0. In Part-2, you will learn to issue and validate the JWT with firmware […]
What You Need to Know about IoT and MQTT
Internet of things (IoT) is the latest buzzword that has been dominating tech news. IoT in short is a collection of sensors or devices connected to a network. These sensors are embedded in everyday consumer objects or industrial equipment and send important information that can be used for data mining or service improvements. While IoT […]
Guidelines for Selecting the Right API Gateway for API Strategy
In the past couple months, we have seen rapid growth in the API business. Organizations that were stuck to traditional business models are now looking at API strategy as new source of revenue and opportunities. Most of the organizations are either looking into an API strategy or have already started planning. It’s clear that no one wants […]
Resolve “server negotiated an unknown SSL protocol version” issue
Most of you have encountered following issue while establishing SSL session with Back-end servers using Data Power. 3:43:38 PM ssl error 23577521 0x8120001a sslproxy (): Server negotiated an unknown SSL protocol version Here is the RCA and Solution to fix this issue. RCA (Root Cause Analysis) The Crypto profiles object on Data Power starting from Firmware v […]
Turn “off” persistent connection between local chained services
I have seen at most of the places that while configuring the objects on Data Power, we just configure the standard properties and leave others as is with default values without knowing their significance. But sometimes this ignorance might lead us to face some critical issues that might be very hard to troubleshoot. I suggest trying […]
Effective Leadership Promotes Successful Asset Mgmt
Anyone being truthful would say change isn’t always fun or desired. In today’s world of constant change and improvements, it’s inevitable that we find a way to adjust. Think of the last time the plant / facility / operations received some new critical assets; did things change? Of course they did, and hopefully to increase […]
The cloud delivers the benefits of Predictive Maintenance sooner
I’m looking forward to co-presenting a webinar on Thursday, Dec. 3rd on how the cloud can deliver the benefits of predictive maintenance sooner, and I invite you to join. Abstract: Asset-intensive industries are becoming increasingly instrumented and connected, motivated by the immediate need to improve efficiency or via interest in the potential of the Internet […]
What Enterprise Information Management Means to Me
As Gartner Research pointed out, by 2020, IT will generate $225 Billion in revenue for Social, Mobile, Analytics, and Cloud (SMAC) market. The foundation of the success behind these areas are information management and delivery. What is Enterprise Information Management (EIM)? EIM is the art, science, and management of building actionable intelligence with available data. […]
How To: Message Selectors in WMB & WMQ as JMS Publish Subscriber
WebSphere MQ, when used as a JMS provider, can be leveraged to implement one of the widely used architecture patterns, the Pub-Sub model. In this use case, we have a message flow as the service provider that connects to WMQ publisher and another consumer message flow that uses WMQ topics as a subscriber within WebSphere […]
The Beginner’s Guide to Security Model Setup
In the world of system architecture and IT policies, one is bound to run into the term “security model.” Well, what does that mean exactly? Basically a security model is created as a way to understand what the security of a system or process looks like: how it is implemented, who has access to it, and what will they actually have […]