Filter by post date:

Showing 1 - 4 of 4

Recently, I attended a conference that had a thin but interesting service-oriented architecture (SOA) track, with sessions such as "SOA: Hype or Happening" and "Security and Governance of Online and B2B SOA Traffic." While I attended both sessions, here I focus
November 13, 2008 | Authored By: Frank Teti
Security Assertion Markup Language (SAML) is an XML-based standard for exchanging authentication and authorization data between security domains. SAML is a product of the OASIS Security Services Technical Committee.
November 5, 2009 | Authored By: Frank Teti
Essentially, business activity monitoring (BAM) data, which is collected and produced by a business process management (BPM)-type application, is just another subset of BI within the organization. BAM data may be pushed to a big data repository, but a BAM repository should never be used for big data analysis. BAM environments are characterized by online, real-time users, where throughput and performance are paramount. BAM queries and reports should be targeted to simple operational status views against optimized, normalized tables.
February 17, 2015 | Authored By: Frank Teti