|08:30-09:00||Registration & Continental Breakfast|
|09:00-09:45||Opening Keynote: Helping You Connect the World
Founder, CEO and Chief Architect,
|09:45-10:30||Keynote: The Future of Real-Time Analytics and IoT
|11:00-11:45||Keynote: Kubernetes – A Platform for Automating Deployment, Scaling, and Operations
|11:45-12:30||Keynote: Building a Cloud-Based App Platform With WSO2
Senior Vice President – Product Development and Engineering
End-to-end Microservice Architecture with WSO2 Identity Server and WSO2 API Manager: Real-world Case Study
|08:30-09:00||Registration & Continental Breakfast|
|Architecture Patterns||App Dev||Governance|
Vice President – Solutions Architecture,
Vice President – Software Architecture & Strategy,
Senior PD Manager,
VP – Engineering Commerce Enablement,
WSO2 Analytics Platform: The One Stop Shop for all your data needs
Today’s highly connected world is flooding businesses with big and fast-moving data. The ability to trawl this data ocean and identify actionable insights can deliver a competitive advantage to any organization. The WSO2 Analytics Platform enables businesses to do just that by providing batch, real-time, interactive and predictive analysis capabilities all in one place.
In this tutorial we will
- Plug in the WSO2 Analytics Platform to some common business use cases
- Showcase the numerous capabilities of the platform
- Demonstrate how to collect data, analyze, predict and communicate effectively, all using one single platform
Stick around till the end and you will walk away with the necessary skills to create a winning data strategy for your organization to stay ahead of its competition.
Revolutionizing WSO2 PaaS with Kubernetes & App Factory
Containerization is now becoming the most efficient way of developing and deploying software solutions in the cloud. It provides means of running applications with less resource usage, fast startup times, portability across machines, lightweight & layered container images, container image registries, multi-tenancy and many more additional advantages. Docker embraced this space by fulfilling the above requirements and attracting the industry within a very short period of time. Google solved container cluster management features by initiating the Kubernetes project over a decade of experience on running container technologies at scale. Now Kubernetes is in the process of adding more advanced PaaS features such as autoscaling, multicloud or region deployments and composite application model with best of breed ideas and practices from the community.
WSO2 App Factory and WSO2 App Cloud are application Platform as a Service (aPaaS) that provide application development and hosting deployed through these technologies. In this tutorial we will demonstrate how WSO2 products can be run on Kubernetes and the latest WSO2 App Cloud features. This tutorial will include
- An introduction to Docker
- An introduction to Kubernetes
- Deploying WSO2 products on Kubernetes
- Carbon cluster discovery on Kubernetes
- Monitoring server health
- Artifact distribution
- Propagating software updates
- Load balancing with NGinx
- App Factory and WSO2 App Cloud
- Creating applications and uploading existing apps
- Hosting web applications and API backends
- Using databases in the Cloud
- Coding and debugging applications with Cloud IDE or desktop tools
- Application lifecycle management
- Custom URLs
- Teamwork and social development
- Issue and task tracking
Stick around till the end and you will walk away with the necessary skills to create a winning data strategy for your organization to stay ahead of its competition.
WSO2 Integration Platform Deep Dive
The world has become a system of connected components. Whether you are going to have breakfast at your favourite restaurant, watch a movie or book a sports event, everything is connected to provide you the best service. Connecting or integrating different systems has been a challenge for the IT industry for the last decade and it will be the same for coming decades. WSO2 provides the world’s fastest open source integration solution – the WSO2 ESB – to connect heterogeneous systems with each other.
This tutorial focuses on
- An in-depth knowledge of the high performance integration platform
- Its upcoming features
- Customer use cases to give you real life insights into the capabilities of the product
- It’s effect on your business
API Management Strategies and Best Practices
API Management has now become an essential part of any SOA lifecycle. Learning how to expose your service as APIs and knowing how to secure, control and monitor access to them all has become part of an effective API management solution.
In this tutorial we hope to cover best practices of API management including
- API design and implementation best practices
- API architecture best practices
- API security best practices
- Deployment architecture best practices
- Extensibility options of API management
WSO2 DevOps: How to Deploy, Manage, Administer and Monitor WSO2 Products
Organizations are concerned about the DevOps effort required to deploy, manage and administer WSO2 products. They are also keen on learning how easy it would be to monitor these products using the existing or bespoke tools within the organization.
This tutorial aims at teaching you how
- To address these concerns within the scope of a WSO2 deployment
- These products can be deployed across different network environments
- WSO2 products can be managed, administered and monitored within your existing infrastructure
- DevOps best practices that WSO2 recommends to our customers can be used within your organization to ensure the smooth operation of WSO2 products
Enterprise Security Uncovered
The identity and access management landscape has evolved rapidly in recent years with a multitude of standards, such as OpenID Connect, eclipsing the world of identity. As a result, there’s an urgent need to re-think IDM solutions and ensure that they are able to seamlessly adapt to these changes. Given that acquisitions, mergers and directly on-boarding customers seem to be the trend today, concepts such as BYOI, just-in-time provisioning and dynamically discovered federation are real needs of project managers and architects.
WSO2 Identity Server 5.0 takes a rejuvenated approach to successfully eradicate complexities in various identity and access management standards. It abstracts the interactions between an application and an IDM from the perspective of a service provider and identity provider.
In this session Chathura and Prabath, will discuss the following:
- Advantages of new chained collaborative federation capability in WSO2 Identity Server 5.0
- How to configure and govern a set of identity providers, selectively associate them to a set of service providers and carry out federated authentication and provisioning
- Chain of control over what each entity in the system can do: propagated from a tenant administrator to an application developer to an end user
WSO2 Cloud: What it is, How it Works, and Where it’s Going
WSO2 Cloud stands out in the cloud market by delivering a comprehensive platform including not only application hosting but also integration, API management, application development and more.
In this session we will look into the current state of WSO2 Cloud and its future roadmap. We will discuss both public shared and dedicated managed cloud options.
WSO2 Virtual Hackathon: Big Data in the Cloud Case Study
In celebration of our 10th year anniversary we conducted WSO2’s first ever virtual hackathon this year. We selected ten teams from around the world and challenged them to build a scalable solution that processes up to 4 billion real-time events within a short period of time, all on the cloud.
As the organizing team, we faced the challenge of providing scalable deployment support to process all the data within a short period of time. Our deployment composed of 100 AWS EC2 instances across five EC2 regions and deployment was fully automated. Each team was allocated ten EC2 instances with the same deployment pattern. This was not a simple task to achieve with a single system. We needed to configure several systems to work together.
In this session Lakmal will share the experience of deploying a large scale deployment using K8S, Docker, WSO2 PaaS, WSO2 DAS, WSO2 CEP, etc. deployed through AWS.
Understanding the API Management Platform
In the session, we depict the key challenges of deploying an API management solution and how WSO2’s API Management platform can address them by supporting API provisioning, security and analytics. We also describe the various deployment options – on-premise and in the cloud – as well as the key deployment patterns that you need to adopt.
Securing your APIs: Patterns and More
Businesses today are rapidly moving from being service enabled to being API enabled. Moving into the world of APIs brings with it its own set of complexities and challenges that are tough to tackle. API security, performance, scalability, monitoring and notifications are key areas to be focusing your engineering efforts on. The WSO2 Carbon platform is a complete open source enterprise middleware platform which includes products catering to your various different enterprise needs.
This talk will focus on leveraging the extensive feature set and extensible nature of the WSO2 platform to secure, monitor and monetize your APIs. It will also touch upon some of WSO2’s experiences with customers in building API ecosystems that suit modern day enterprises.
Extending and Customizing WSO2 API Manager
WSO2 API Manager gives you the flexibility to extend and customize to the source of the product. In this session we will be looking at how you can extend and customize API Manager to address your business needs.
See how you can apply branding and integrating API manager with existing business processes and IT Infrastructure. Also find out how you can build upon the existing API Management features to create an API management platform that suits your business.
New IT Business Models and Open Source Middleware Economic Value
In today’s enterprises, IT takes a center stage in an organization’s business model. They consist of interrelated architectural, co-operational and financial arrangements designed and developed to achieve its strategic goals and objectives. The products and/or services the organization offers, or will offer, are based on the arrangements that are built on the IT infrastructure.
Open source software (OSS) is capable of bringing down average IT expenditure of companies. Cost reduction isn’t only about spending less on software licenses but also about increased efficiency in an organization’s IT setup. For example, the real value is higher, mainly because reused OSS code tends to be of higher quality when compared with equivalent proprietary.
In this session, we will discuss the economic value of open source middleware for achieving the objectives set forth by the new IT business models.
Operational Intelligence: Analytics
Enterprise application development, testing, staging and ultimately pushing out to production involves number of operational activities. Moreover operational activities will also expand to the runtimes of each environment. Today the strength of a devops engineers is measured by the weight of his tool belt. That showcases his/her ability to manage the operational process and the ability to drill down the root causes and optimization possibilities at the runtime. Operational duties also expands to system maintenance, system health check and guaranteed availability. The ability to know the system behavior is the key to implement a proper operational process. During the talk Nuwan will be elaborating operational intelligence with regard to above processors and planning to discuss about the right level of information at each platform environment and runtime.
Rethinking Message Brokering with WSO2 Message Broker 3.0
Today’s enterprise integration efforts have moved away from traditional point-to-point, synchronous communication schemes to more loosely coupled paradigms such as publish-subscribe and distributed queues. These enterprise integrations need to be reliable and scalable while being easy to adopt. For enterprise architects it’s a challenging task to select a message broker that meets this ‘enterprise criteria’.
This session discusses how WSO2 Message Broker implements these paradigms with support for AMQP/JMS and MQTT protocols while providing required guarantees with a new message dissemination model for improved performance and a message persistence layer backed by RDBMS to address ease of use and reliability.
Application Services Governance
API management and SOA governance have converged into the consolidated space of application services governance. The practice provides tools to deliver APIs and SOA together to achieve business success of an enterprise.
Application services governance brings the best of lifecycle management, runtime management and community management together to help leverage services, APIs and applications deployed through these. The focus on runtime capabilities and operations helps to maximize the value of business. Enforcing policies, managing corporate governance, and following best practices is essential to ensure the implementation of automated processes for performance, security and error handling. In this session, we will discuss what application services governance is, and why and how it is used.
Connected Device Management for Enterprise Mobility and Beyond
Enterprises always need a clear strategy to adopt mobility in their business. They either give devices to the workforce or allow them to use their own device. Hence, they need a device management tool that is flexible, simple and extensible to use.
In this talk Shan will discuss the WSO2 Connected Device Management tool, which is built upon a unified architecture model to plug-in any kind of device to perform device management. The flexibility allows it to add any range of devices from mobiles and laptops to IoT devices.
An Introduction to the WSO2 Analytics Platform
In today’s connected world organizations have access to an enormous amount of data. We often don’t know what they mean or how we can use them, in terms of hindsight, oversight, insight and foresight, to gain competitive advantage in the market. Use cases ranging from simple system monitoring to complex fraud analysis demands this.
The WSO2 Data Analytics platform lets you collect data, allows you to explore it through batch, real-time, interactive and predictive processing technologies and allows you to communicate your results. In this talk, we will discuss the WSO2 Data Analytics platform and how it brings together all analytics technologies into a single platform and user experience.
Your Path to IoT & Mobility with WSO2
Enterprises these days usually provide employees with devices (company owned personally enabled – COPE) or allow employees to use their own devices (bring your own device – BYOD). What many people don’t realize is that enterprise mobility goes beyond developing a few mobile apps, allowing access to emails through mobile devices and browsing web apps on mobile devices.
Every organization needs to have a clear strategy when allowing mobility in their enterprise. First and foremost, you need to create a policy around device usage in your organization. A well constructed policy helps in keeping your enterprise information safe and secure. This policy should include
- Which device platforms can be used (iOS, Android, etc.)
- Which versions can be used
- Whether rooted or jailbroken devices can be used
- Whether to allow BYOD or COPE (or both)
- Whether to allow access to company resources based on connectivity, location and time
Once the policy is created, you need to identify the tools that will help you enforce it. In this session Shan and Sumedha will share their expert advice on how to follow a winning path to achieve enterprise mobility.
Scale into Multi Cloud with Containers
Containers are becoming the most efficient way of deploying middleware solutions in the cloud because of their lightweight nature with virtualization. Containers use Linux kernel features such as namespaces, cgroups, AppArmor, SELinux, seccomp and chroot to provide isolated environments similar to virtual machines. In contrast to virtual machines, containers do not need a full-blown operating system image. As a result they start up much faster. More importantly, the amount of resources needed to run a container is less because the host operating system kernel is shared.
In this session Imesh will first analyze how containers work and how they can be run in a clustered environment with Kubernetes. Later, he will explain in detail how multiple Kubernetes clusters can be deployed in a multi-cloud environment to create a geographically distributed system.
Pattern Driven Enterprise Architecture
Patterns are the universal language of architects to communicate, refer, implement and improve. Architecture patterns from traditional SOA (service-oriented architecture) to ROA (resource-oriented architecture) and today to MSA (microservice architecture) drive most enterprise architectures today. Subpatterns such as EDA (event driven architecture) and WOA (web oriented architecture) also has a lot of traction today. These high-level concepts provide many best practices for enterprise architects that are looking to evolve their existing enterprise architecture or for those creating newer enterprise architecture strategies.
However, where should do we draw the line? Is SOA still the way to go or should we focus on MSA? During this session, Asanka will critically analyze the good, the bad and the ugly (if any) of the various architecture patterns, and jointly figure out where they should fit in.
Data to Consumer: End-to-End Middleware Capabilities
Consumer-driven and rapidly changing business requirements are creating the need to go beyond traditional middleware in enterprises today. Because the middleware layer has enough functional capabilities it empowers architects to convert their blueprints to solutions without changing the architecture to fit into the middleware limitations.
Asanka will first look at the evolution of middleware and how current and next-generation middleware looks like (Platform-3.0). Following this, he will analyze the middleware requirements from data (system of record) to consumer (system of engagement) by illustrating a layered architecture of modern enterprise middleware.
Carbon 5: A Preview
Carbon 5 (C5) is the base of the next generation of WSO2 middlewere platform. 10 years back WSO2 re-achitected the middleware platform, which allowed us to develop comprehensive middleware functionality. Though the 10-year old Carbon kernel enabled WSO2 to build enterprise-grade middleware products, it’s now almost outdated. Generic server concepts, APIs and implementations from Apache Axis2 are now obsolete. Also In-JVM multitenancy is not the optimal solution in today’s container focused world.
In this session, Sameera will talk about Carbon 5 – a complete redesign of the existing Carbon kernel. Carbon 5 provides a composable server architecture for you to build enterprise-grade servers. Based on OSGi, Carbon 5 allows you to develop componentized/modular servers. Pluggable runtimes, Artifact Deployment engine, Transport framework, light-weight repository and clustering framework are some of the features of Carbon 5.
Business Processes in Modern Enterprise Integration
Organizations are increasingly becoming more distributed with many business units and partners having to operate in rapidly changing environments. However, these organizations still need to maintain common business goals and enforce necessary procedures to achieve them. This is a major challenge. A key part of the solution to this problem is to integrate almost everything in an organization and direct them towards the common business goals. In other words, we have to wire-up everything using business processes.
This session will focus on how business processes facilitate integration of modern enterprises by linking all organizational entities and how such integration can provide a comprehensive view on business operations in order to quickly identify problems and bottlenecks. We will explain the necessity of building a process-oriented organization to succeed in modern business environments.
Building Awesome Personal Dashboards with WSO2 Dashboard Server
Data is meaningless without proper representation. It is most useful when understood through interaction. WSO2 Dashboard Server 2.0 brings the ability to design interactive dashboards that can give you insights into data through drill-down views.
Dashboards can be shared among users and can be customized by the end users to match their preferences. WSO2 Dashboard Server 2.0 allows each visualization gadget to be wired in the UI. Each gadget is limited to interacting with a well defined set of input and output data types. This makes it possible for gadgets, even in an interactive dashboard, to be loosely coupled. In this session we will demonstrate a sample dashboard with multiple interactive element.
Building Web Apps with Reusable UI Components and Composition
This session will discuss how the reusable UI component framework is transforming ad-hoc web development into an efficient yet pragmatic practice. The same principles and best practices that we follow when creating well-designed backend applications are applied in the context of UI design.
With this new framework, cohesive units of UI code with back-end logic will come together to create a complete app only at build time. This allows UI components to be shared across apps without compromising the look and feel of the apps. It adheres to the ‘open/closed principle’ by letting the final app to be modified by you without changing the original app’s code, and thereby minimizing the migration and patching cost.
Getting More 9s from Your Deployment
Managing a highly available and highly reliable deployment has always been challenging. To obtain more 9s from your deployment you need to focus the technology as well as on proper architecture, correct tooling, discipline, intelligent monitoring, and effective communication. This session will discuss how to mitigate risks with a fail-proof architecture, the importance of devops, monitoring the deployment, effective communication and best practices and know-hows of deployment.
Automate and Orchestrate Devops
Devops has enabled organizations to extend traditional development to continous IT service delivery. The advantages of adopting devops include establishing trust and collaboration between development and IT operations and ensuring that software releases are repeatable and automated. When adopting devops, automation and orchestration are quite important.
During this session, Chamith will discuss the advantages, technologies and best practices of automation and orchestration. He will also talk about the importance of establishing common standards and protocols across the organization to ensure governance and reduce lifecycle costs.
Enterprises today operate in complex and competitive markets. They are always trying to optimize business functions, introduce new business capabilities and tap into new markets quickly and efficiently. For the business to be agile, software systems that’s used for providing business capability need to be agile. The ability to build and integrate new capability in a short time becomes valuable. At the same time, enterprise software systems should help with evolutionary as well as revolutionary changes that will affect core business functions.
Iterative architecture is about taking an iterative approach when introducing architectural changes to support business and technical requirements. We’ll also look at an example of using open source middleware for evolving an architecture in iterations.
Deployment Patterns and Capacity Planning
Identifying the right deployment architecture is key when providing smooth operation of a production system. Deployment architecture is important for providing non-functional requirements such as availability, scalability and security for an enterprise software solution. In addition to those, a deployment architecture is key when supporting future business and technical requirements. Deployment patterns are a way to quickly determine best practices from production deployments identified from different industry verticals.
After identifying the correct deployment architecture, it’s crucial to determine the size of the deployment by understanding the number of servers/VMs/containers necessary to support the minimum, average and possible maximum load that the system is expected to handle. This capacity planning session will discuss how to take a fact based approach to determine the size of your deployment.
Introducing Microservices Server
Microservices architecture (MSA) is a trending topic and many organizations today are leaning towards MSA given its potential advantages. In this session, we will explore some core concepts in MSA and also focus on aspects that are important when building an MSA solution. We will also introduce WSO2 Microservices Server (MSS), which provides the necessary framework and tooling for building an MSA solution; we’ll explain how WSO2 MSS provides the necessary core features for building an MSA as well as compare this product with other leading Java microservices frameworks available.
Going Open Source for Identity Management— The Good, the Bad and the Ugly
This session will present Seagate Technology’s journey of migrating from a commercial product to an open source platform for managing customer identities. We will talk about what worked, what didn’t, our expectations and how they were met along with overall architectural considerations. Apart from the WSO2 Identity Server, we will also talk about how the WSO2 API Manager and WSO2 Business Activity Monitor fit into our architecture.
Real-World Implementation of Federated Authentication
One of our customers already had an internally developed application to support single sign-on for their applications, but needed to secure REST and SOAP services. At the Eagle Technology Group, we created a Federated Authenticator that meets this need allowing for configuration of the authenticator within the WSO2 admin GUI and using Just In Time provisioning to migrate user data into the WSO2 Identity Server LDAP.
In this session will talk about the challenge areas of:
- How to set up the Federated Authentication Provider
- How to implement configuration within the admin GUI
- How to map claims from the internal system to WSO2 LDAP.
We will also cover our what we learnt, including integration of OSGI bundles, implementation of custom authenticators, and capabilities of federated identity providers.
Implementing SSO Across our Science-as-a-Service Web and API Stack at TACC
The Texas Advanced Computing Center (TACC) is home to some of the most powerful
computing resources in the world, including Stampede, ranked 8th fastest supercomputer on the Top500. The TACC Agave API platform provides a set of restful, multitenant services for interacting with the supercomputing resources over http including submitting jobs, managing data and much more. Agave has been leveraging WSO2 API Manager in production for over a year now.
Recently, the Agave platform has experienced tremendous growth to include large organizations such as the iPlant Collaborative which deploys hundreds of front-end web apps serving more than 20,000 scientists.
In partnership with Yenlo and WSO2, TACC is developing a Single SignOn (SSO) solution based on integrating WSO2 Identity Server with Agave’s current API Manager deployments.
In this talk, we review our experiences with API Manager and introduce our SSO solution based on WSO2 Identity Server, including details of our production deployment based on Docker containers, Ansible technology, and more.
The Needs of Next Generation Giants
50% of the Fortune 500 companies from 2000 are gone! Facebook just became more valuable than Walmart! Next Generation Giants are being created every day and they are standing on the shoulders of technology and new business models to get there. Billions of connected people, apps and things are leading to the creation of new digital communities and ecosystems. Next Generation Giants harness API enabled businesses models to deliver hyper-relevant, orchestrated communications to customers. Smart things change how we experience the world. Deep insights power decisions for internal and external users. This session will answer questions such as
- What’s the right alchemic formula of integrating, aggregating, mashing, and stacking to fuel the innovation necessary to meet the needs of these Next Generation Giants so that we may build one?
- What expectations and experiences will our new digital neighbors demand?
- How will we work dynamically in secure cyber communities?
- How do we continue to disrupt how it has always been done?
Cross Section of an API Program: The NEXEN API Program at BNY Mellon
Learn how BNY Mellon is using APIs throughout the company’s digital transformation…implementing a microservices based architecture and agile software development paradigms, leveraging open source, presenting an external programming model to the BNY Mellon platform, and creating thriving ecosystem of partners contributing to the platform. Topics covered will include security models, API governance, driving developer adoption, utilization of WS02 code as open source, and protocol mediation.
End-to-end Microservice Architecture with WSO2 Identity Server and WSO2 API Manager: Real-world Case Study
During the first half of 2015, iJET Labs used WSO2 Identity Server and API Gateway to help deliver its next generation products. Using WSO2 middleware, iJET now offers secure Federated access to RESTful APIs backed by a scalable microservices architecture. During the course of this journey, iJET Labs worked with WSO2 to extend open source products to meet our unique needs. In this session, we will talk about
- WSO2 API Gateway and Identity Server integration
- Federated SSO using WSO2 Identity Server
- AWS deployment automation
Penguins, Elephants, Squids, …. Hooray! Or Why Open Source is Taking Over the Enterprise
Open source software and methods are changing the way the world computes. These technologies, developed in a collaborative, iterative, and transparent method are powering everything from today’s latest enterprise software to reconstruction efforts in post-earthquake Nepal, to the design of electric cars
and new methods for the treatment of malaria. The value of open source plays out on multiple fronts. It enables methods, processes and systems required to capitalize on successive waves of digital technology—including Big Data, cloud, and mobile applications. It eases the task of integrating or migrating new technologies with legacy systems and packaged products by allowing a more hands-on approach to development, support and innovation. And it empowers users in an environment where they must constantly adapt strategies, business models, and new ways of working.
This talk will present the audience with an overview of the open source ecosystem today, the key trends and dynamics driving this evolution in computing. Among the concepts discussed will be selecting, adopting and managing open source, inner source – the application of open source development methods inside the firewall, and contributing to and publishing open source.
Real world examples and recent research will be heavily relied upon to explain these points. The audience will take away an understanding of how and where they fit on the open source enterprise maturity curve and both the opportunities and challenges presented by open source for today’s enterprises.
Single Sign-on Solutions for Salesforce with WSO2 Identity Server
This session will focus on understanding the capabilities of WSO2 Identity Server and how you can leverage SAML for Single Sign-on. We will show how to use WSO2 Identity Server to enable single sign-on on the Salesforce platform and also how to enable seamless single sign-on for multiple applications.
Enhancing Company-wide SSO-Propagation with WSO2 ESB’s Custom Mediators
At SUVA we come across various heterogeneous IT landscapes based on different vendors and technologies. Integrating all these peers brought up some challenging questions relating to security topics like company wide user-propagation (SSO). We solved these tasks with a kit of custom mediators, controlled by a set of custom sequences. Our security mediators interoperate with
- SAML1.1 to SAP, SapAssertionToken from SAP to ESB
- Custom-Token from/to MS Sharepoint and MS.NET
- Custom-Token from/to Java Systems
- BasicAuth bridge to WSSUsernameToken
- BasicAuth authenticator to SAML 1.1 and custom-tokens.
This allowed us to enhance each ESB-Proxy with a highly customizable security extension by just adding three lines of code to the proxy-service definition. It is simple to enhance with additional standardized or custom security features. This session focuses on how the WSO2 ESB acts as a company wide security intermediary that liberates our systems from dealing with end-to-end security and standards they might not support.
Jump starting middleware services
In this presentation we will take a look at the NYU’s year long journey into design and implementation of middleware services. We will take a use case — Profile service, and walk through the challenges that we faced and small wins we had during our journey. Profile service provided an implementable use case for NYU while providing the technology team an opportunity to work with many products within WSO2. We will showcase the service that we built utilizing WSO2 and integration(s) with incumbent Identity management systems.
Rejuvenate Retail Integration for Limitless Possibilities
The retail industry is going through significant business transformations. Every transformation forces changes to existing processes, infrastructure and applications. Every change requires some level of investment towards integration. Can’t we build an integration platform which significantly minimize the changes, regardless of transformation? The answer is “Absolutely Yes”. At Aspire Systems we built a solution that fulfills this need using WSO2 products. In this session learn more about this platform and find out how we help businesses to understand operational performance and identify optimization opportunities.
Optimizing Service Platforms with SOA Governance
Barclays currently uses following two WSO2 products extensively-
- ESB (4.7.0)
- Governance Registry
We plan to use following two products in the near future –
- BAM & CEP
- API Manager
When we started with ESB (version 4.5.0) around 3 years back and now when are using ESB 4.7.0 we see a lot of differences/upscaling in the features provided in the currenty used version. I still remember when we had to implement a REST API in of our
projects (a serious concern for us) we had numerous discussions with the WSO2 support team over this and finally broke the jinx by getting the right configuration/QA-ed patch to get this working.
Aggregators, one of our major project using the WSO2 ESB platform has been a great win for us in the recent past. We succesfully on-boarded Yodlee in December last year and plan to on-board another one – Intuit this year. The kind of ease and useful configurations provided using WSO2 ESB is just phenomenal. These aggregators continously had to screen-scrape our Customer Website and the website had to manage a heavy load during peak/off hours.
We provided a completely different API to them where ESB does the magic for us that includes –
- Iteration over the request set, containing request for current transactions and historical statements.
- Cloning of 10 independent and parallel request to hit the backend within the same time frame
- Aggregate the data in a useful format.
- Applying XSLT over the aggregated data to return the required response to the aggregators in a specific format – OFX.
Another project where we successfully used the similar ESB workflow/setup was providing a Bulk Account Load for the customer website. Wherein all the sequential calls (~ 25) from the website were converted into a single Proxy and ESB did the complete cloning, and aggregation
The only thing we need to make sure/continuously monitor here is the kind of load that our ESB servers manage, it is a big volume!
Governance Server is the place where all our schemas and contracts reside.It offers complete SOA governance, configuration and life cycle management.
Governance has been a key issue for SOA. Governance is fundamentally classified into –
- Design Time
- Change Time
- Run Time
WSO2 Governance Registry helps resolve this. It comprises of the following components –
- Service Registry /Repository
Governance Registry stores service information in a service registry. This includes WSDLs, XML Schemas, and WS-Policy policies. When registering a service, you can do so in one of two ways. You can either add a new service or add a new WSDL. The easier way to do so is to add a new WSDL.
- Service Manager
Each resource stored inside the registry can have a lifecycle attached to it. A lifecycle essentially acts as a state machine. The service management tool manages the state transitions of a service. For example, a service can be in a “modeled”, “assembled”, “deployed”, or “retired” state.
- Policy Server
In the recent past, we have moved away from using the worker/manager setup of ESB to manager only setup. Yes, so we have moved
away from using the SVN based Deployment Synchronizer. Deployment Synchronizer allows you to synchronize these deployment artifacts
across the nodes of a product cluster.
We had been experiencing numerous SVN Client Exceptions during our daily lower environment deployments (car -file deployment).
Deployment Synchronizer performs following functions :
Maintaining an up-to-date backup of the artifact repository.
Sharing a single artifact repository among multiple servers in a cluster.
Enforcing artifact updates to be deployed on a server at runtime. (this was where we had been experiencing issues)
We finally decided to move away from this and now we just have nodes configured on our individual servers where there is no deployment
synchronization happening with SVN auto-commits.
We are working over implementing Activity Monitoring in our environments for achieving a detailed metrics of our services alongwith the service response times. This would obviously include our message header data (including the context id, application name, etc.) asynch flowing into the BAM servers for
providing us a detailed metrics of the complete call flow. We also plan to incorporate the Complex Event Processor. WSO2 CEP is part of WSO2 Big Data Analytics Platform where it provides the Realtime Analytics pipeline. The WSO2 CEP provides enterprise level management, statistics, debugging and tracing support for the whole event flow, enabling highly scalable and high availability deployments.
We also are looking at options as to how we can leverage WSO2 Cloud Services Gateway within the private cloud of Barclaycard US where we are currently migrating
Decide And Do By Knowing With WSO2 CEP
This session will present how Complex Event Processing(CEP) along with Business Activity Monitoring (BAM) can help build real-time analytics based forecasting for the retail industry. We will talk about
- The Aspire Solution – How CEP and BAM can help a restaurant chain
- What can be done with CEP?
- Integration of CEP engine with different event-driven systems
Safe for Work: The Internet of Dirty Things
The Internet of Things is deep in Trimble’s DNA. This session will discuss how Trimble combines positioning with domain expertise in construction, agriculture, and fleet management to improve the efficiency, productivity and transparency of our customers’ businesses through a connected network of things. Big things, that like to play in the mud.
Some Essentials for Modern Solution Development
Technology for developing and deploying modern, non-trivial applications has gone through several transformations. Modular programming, message driven architecture, distributed OO, CORBA, J2EE/.Net and SOA/Web services being some of them. The current technology for realizing modern applications includes microservices, REST, containers, API management, PaaS and “The Twelve Factor App”.
The core concepts in all of the models are component, composite, container and patterns. This talk identifies these core concepts independent of the specific technology realization. The identification and motivation highlights requirements that the current technologies do not meet. The talk will also suggest topics for investment and standards.