(0 comments, 28 posts)
This user hasn't shared any profile information
Posts by Andre Crone
AMIS is puting more and more emphasis on IT architecture. That is one of the reasons why I am doing my Masters in IT architecture and why AMIS is starting a knowledge center about IT architecture. The following paper is written for one of the masterclasses (Applying Architecture) that I have followed so far.
IntroductionCompanies that are able to provide their customers an experience by providing emotionally and psychologically gratifying products perform well in the currently very competitive marketplace (Free, 2006). Companies like Apple, Disney and Starbucks are able to sell their products based on an added user experience. Customers are willing to pay more for products largely based on the emotions that these products raise to their buyers. Maybe Apple is one of the most well known companies that excel in delivering an added experience with their products. Apple customers identify themselves with the companiesâ€™ products. They want to show that they are different (European Centre for the Experience Economy, 2005).This paper describes how the experience economy influences the role of an IT architect. (more…)
I have been investigating Oracle’s Web Service Manager recently. WSM is shipped with the new SOA Suite. The WSM is a service gateway. Existing services can be placed behind the gateway. Security and authentication of the services will be done by the service gateway. WSM also provides a lot of logging facilities. Call to services behind the gateway can be logged. Authentication errors can be logged etc. Multiple services can be placed behing one gateway definition. All policies for that gateway definition, logging, authentication etc., will be applicable for all the services that are linked to the gateway.
Oracle provides a nice and complete tutorial that you can use when you are looking to the WSM for the first time. The tutorial can be found here. It was very straight forward to implement a authentication policy based on WS-Security. WS-Security is an OASIS standard that describes a uniform implementation regarding the security of webservices. The OASIS page regarding WS-Security can be found here. The following screen shot shows how easy it is to define a WS-Security policy. In this example a username/password file is defined that will be used for the More >
Old style Forms applications normally don’t hold much workflow functionality. Sure there is an order in which the forms should be used. The workflow of the application is in the mind and knowledge of the user. For my current project I am investigating, together with my colleague Peter Ebell, ways how we can use Oracle’s BPEL Workflow engine to enable workflow functionality in existing forms applications.
The idea is to implement a Java class that interacts between Oracle Forms and the BPEL Workflow enginge. This class we be embedded in a new workflow Form. This form will be used to startup the existing forms of the application. Goal is to make the existing application a workflow enabled application without modifying it. The workflow functionality should be an add-on and not a modification of existing applications.
I will describe the BPEL process and Java/Forms class in a future post. This post will describe how we embedded the Java class in the workflow form. (more…)
You all know the problem. You want to send that large file to someone, but how? Many email systems restrict the maximum attachment size. I have to send large attachments of several hundreds of megabytes to magazines all over the world quite frequently. There are some services that you could use for this purpose.
My best experience is with http://www.yousendit.com/. They offer the possibility of sending files as large as one GB. The recipient receives an email with a URL to their file, which they can download 25 times within 7 days. Yousendit.com also holds commercial services. You can then have your company logo on the site and you will have no advertisements. You can also track the number of downloads with these paid accounts.
In my previous post about package constants I mentioned the application I am working on right now. They gave me the task to speed up the application since performance was getting worse and worse. I analyzed the statspack results together with a DBA and we found two queries that together took 40% of the logical IO’s of the system. That’s a lot for only two queries, especially when you look how big our application is; we have many queries.
The two queries were both in one procedure. That must have been an off day for the original programmer . The queries were small and had an IN statement in the where clause. I simply rewrote the queries to use an EXIST and they became blazingly fast. That was strange. I attended the Tom Kyte seminar in Utrecht in 2005 and he claimed that it didn’t matter anymore. IN or EXIST, the database would see this and the optimizer would have the same execution plan for both, but not in my case. How could that be? I was running the queries in a 9R2 database.
Google has released their Google Web Toolkit (GWT). This toolkit can be used to develop AJAX applications in Java. Google describes the toolkit as follows:
Look at Googles GWT page for more information