Library

Latest Content

[Tutorial] Calling Stored Procedures with IN and OUT Parameters Using WSO2 Data Services Server

This article will explain how you could call a stored procedure using WSO2 Data Services Server (WSO2 DSS); it will also discuss details of some complex stored procedures with IN and OUT parameters.

[Blog Post] Installing a New Key Store in WSO2 Products

WSO2 carbon-based products are shipped with a default key store, which has a private/public key pair that's mainly used to encrypt sensitive information. However, when products are deployed in the production environment, it is better to replace this default key store with a self-signed or CA-signed certificate. Sohani explains how this can be done in this blog post.

[Blog Post] How to Modify API Manager Publisher to Remove Footer - API Manager 1.8.0

In this blog post, Sanjeewa will take you through the steps you need to follow when modifying API Manager publisher to remove the footer. These guidelines are applicable to API Manager 1.8.0.

API Management
API Management

[Blog Post] How to Modify API Manager Publisher to Remove Footer - API Manager 1.8.0

In this blog post, Sanjeewa will take you through the steps you need to follow when modifying API Manager publisher to remove the footer. These guidelines are applicable to API Manager 1.8.0.

[Presentation] Architecting an Enterprise API Management Strategy

A good internal and external API management strategy and architecture is key to building ecosystem platforms that lead to successful API economies in the enterprise. This workshop will look at best practices in API management using the WSO2 API Manager and Integration Platform products, which are used to rapidly implement RESTful design, enforce governance policies, safely scale solutions, orchestrate complex interaction sequences, and re-use assets. The session will also look at reference architectures and architectural recommendations of building large scale API ecosystems.

[Presentation] APIs – The Foundation of the Future Connected Telco

The role of the Telco is rapidly moving away from traditional business models and focus areas towards a holistic, end-to-end solution provider for all aspects of the connected business. In this session, Mifan discussed how telco can accelerate their digital strategies by building an effective Developer API ecosystem that encourages participatory business models leading to APIs as the currency for a digital economy.

App Dev

[Presentation] From shadow IT to empowered IT: Unshackling your developers’ creativity!

Project teams often use shadow IT, instead of the more slower moving traditional IT, to facilitate rapidly changing complex business requirements and quick release cycles. As a result an unmanaged, ungoverned set of IT solutions reside in enterprises without ownership. In this session Asanka Abeysinghe, VP of Solutions Architecture presented how enterprises can leverage cloud enabled ALM frameworks to build empowered IT. In addition Asanka explained how innovative WSO2 clients are already gaining startup speed, reducing project risk, and enabling new business models by adopting WSO2 DevOps PaaS solutions.

[Blog Post] JavaEE WebProfile Support in WSO2 Application Server

In this blog post, Sagara explains some common queries related to JavaEE WebProfile support in WSO2 Application Server.

[Screencast] Creating an ESB Project and End-Point with WSO2 Developer Studio

In this screencast, Susinda will take you through the process of creating an ESB project and end-point with WSO2 Developer Studio.

Big Data
Big Data

[Screencast] WSO2 CEP Road Traffic Map - An Overview

This screencast will give you a snapshot of a project related to extracting useful information from a public Twitter feed using WSO2 Complex Event Processor (WSO2 CEP) and several other natural language processing (NLP) tools. Note that the Twitter feed has been narrowed to the account @road_lk. It mainly demonstrates how NLP extensions in WSO2 CEP are used to process the Twitter feed and extract useful information, such as location and traffic levels.

[Screencast] Analyzing Transport for London Data with WSO2 CEP

Transport for London (TfL) provides several real-time feeds about the London transport network. This screencast will demonstrate the use of WSO2 Complex Event Processor (CEP) to analyze TfL data that contain details such as latitude and longitude of bus stops, travel times of buses, and traffic data.

[Tutorial] Capturing Events Received via HTTP Requests with WSO2 Business Activity Monitor 2.5.0

This tutorial will demonstrate how you configure WSO2 Business Activity Monitor (BAM) 2.5.0 to capture and store events received via HTTP. You will be given a basic understanding of how to configure and get started using the HTTP input adaptor in WSO2 BAM.

Cloud

[Tutorial] Step-by-Step Guide on Installing and Configuring WSO2 App Factory Puppet Master Using Virtualbox

A separate puppetmaster can make a developer’s life easy because it offers flexibility in terms of altering the puppetmaster and testing new features. Having a puppetmaster in the same host virtualbox will also reduce network latencies. This tutorial provides a step-by-step guide to installing and configuring WSO2 App Factory puppet master in a virtualbox.

[Screencast] WSO2 API Cloud Tutorial 6 - Enforce Throttling and Resource Access Policies

In our previous tutorial, we looked at the built-in REST Client provided by the API Store. In this tutorial, we will talk about how WSO2 API Cloud enforces throttling and resource access policies, thus protecting your backend from denial of service attacks, overuse and malformed invocations.

You can watch the entire WSO2 API Cloud video playlist here.

[Screencast] WSO2 API Cloud Tutorial 5 - Using REST Client to Invoke APIs

In our previous tutorials we have already created an API, subscribed to it and invoked it. In this tutorial we will take a look at the built-in REST Client provided by the API Store. The REST Client comes in handy when developers want to experiment with various API invocations and see the detailed responses that they get.

We will talk about how WSO2 API Cloud enforces throttling and resource access policies in our sixth tutorial, thus protecting your backend from denial of service attacks, overuse and malformed invocations.

You can watch the entire WSO2 API Cloud video playlist here.

Identity and Entitlement Management

[Tutorial] How to Secure a Jaggery File by Using Single Sign-On

This tutorial will demonstrate the use of SSO to secure a jag file and the process of obtaining the roles of the current logged in user.

[Article] Authentication Protocols Comparison and Analysis

This article aims to compare and contrast various authentication protocols, which include SAML 2.0, WS-Federation Passive profile (Passive STS), OpenId, and CAS (Central Authentication Service).

[Blog Post] POODLE Attack and Disabling SSL V3 in WSO2 Carbon 4.2.0-Based Products

In this blog post, Prabath explains how you could disable SSL V3 in WSO2 Carbon 4.2.0-based products in the wake of the 'POODLE' attack.

Integration

[Blog Post] Reliable Messaging Pattern - Why Use WSO2

Reliable messaging involve sending a message successfully from one system to another over unreliable protocols. Read Chintana's blog to learn more about reliable messaging patterns and the advantages of using WSO2 for reliable messaging.

[Presentation] Sharing Best Practices and Recommendations from the Integration Battlefield

APIs are the tip of the iceberg of enterprise integration. In this workshop conducted at API Days Paris, Isabelle discussed how WSO2’s customers engaged in successful enterprise deployments. She shared best practices and recommendations from the "integration battlefield" around security, monitoring and performance.

[Screencast] RESTful Integration with WSO2 Enterprise Service Bus

In this screencast, Dushan will discuss RESTful integration with WSO2 Enterprise Service Bus (ESB); he will explain RESTful services and take you through some key features of WSO2 ESB and also touch on REST support with WSO2 ESB. He will carry out a demonstration as well to further explain RESTful integration with WSO2 ESB.

Latest Library for the recent month
More Content

[Tutorial] Calling Stored Procedures with IN and OUT Parameters Using WSO2 Data Services Server

This article will explain how you could call a stored procedure using WSO2 Data Services Server (WSO2 DSS); it will also discuss details of some complex stored procedures with IN and OUT parameters.

[Blog Post] Installing a New Key Store in WSO2 Products

WSO2 carbon-based products are shipped with a default key store, which has a private/public key pair that's mainly used to encrypt sensitive information. However, when products are deployed in the production environment, it is better to replace this default key store with a self-signed or CA-signed certificate. Sohani explains how this can be done in this blog post.

[Blog Post] How to Modify API Manager Publisher to Remove Footer - API Manager 1.8.0

In this blog post, Sanjeewa will take you through the steps you need to follow when modifying API Manager publisher to remove the footer. These guidelines are applicable to API Manager 1.8.0.

[Screencast] WSO2 CEP Road Traffic Map - An Overview

This screencast will give you a snapshot of a project related to extracting useful information from a public Twitter feed using WSO2 Complex Event Processor (WSO2 CEP) and several other natural language processing (NLP) tools. Note that the Twitter feed has been narrowed to the account @road_lk. It mainly demonstrates how NLP extensions in WSO2 CEP are used to process the Twitter feed and extract useful information, such as location and traffic levels.

[Screencast] Analyzing Transport for London Data with WSO2 CEP

Transport for London (TfL) provides several real-time feeds about the London transport network. This screencast will demonstrate the use of WSO2 Complex Event Processor (CEP) to analyze TfL data that contain details such as latitude and longitude of bus stops, travel times of buses, and traffic data.

[Tutorial] Support for MQTT with WSO2 Business Activity Monitor 2.5.0

This tutorial will demonstrate the support WSO2 Business Activity Monitor (BAM) 2.5.0 provides for MQTT - a machine-to-machine connectivity protocol - through the use of open source MQTT clients and brokers. The tutorial has been written to give readers a basic understanding of how to get started using MQTT with WSO2 BAM.

[Presentation] Architecting an Enterprise API Management Strategy

A good internal and external API management strategy and architecture is key to building ecosystem platforms that lead to successful API economies in the enterprise. This workshop will look at best practices in API management using the WSO2 API Manager and Integration Platform products, which are used to rapidly implement RESTful design, enforce governance policies, safely scale solutions, orchestrate complex interaction sequences, and re-use assets. The session will also look at reference architectures and architectural recommendations of building large scale API ecosystems.

[Presentation] APIs – The Foundation of the Future Connected Telco

The role of the Telco is rapidly moving away from traditional business models and focus areas towards a holistic, end-to-end solution provider for all aspects of the connected business. In this session, Mifan discussed how telco can accelerate their digital strategies by building an effective Developer API ecosystem that encourages participatory business models leading to APIs as the currency for a digital economy.

[Tutorial] Capturing Events Received via HTTP Requests with WSO2 Business Activity Monitor 2.5.0

This tutorial will demonstrate how you configure WSO2 Business Activity Monitor (BAM) 2.5.0 to capture and store events received via HTTP. You will be given a basic understanding of how to configure and get started using the HTTP input adaptor in WSO2 BAM.

[Tutorial] Step-by-Step Guide on Installing and Configuring WSO2 App Factory Puppet Master Using Virtualbox

A separate puppetmaster can make a developer’s life easy because it offers flexibility in terms of altering the puppetmaster and testing new features. Having a puppetmaster in the same host virtualbox will also reduce network latencies. This tutorial provides a step-by-step guide to installing and configuring WSO2 App Factory puppet master in a virtualbox.

[Article] Natural Language Processing with WSO2 CEP

WSO2 CEP enables users to carry out Natural Language Processing (NLP) operations that analyze and derive meaning from a natural language input with a set of Siddhi extensions based on the Stanford NLP library. In this article, we will discuss the Stanford NLP library and six Siddhi NLP query operations, and explain these further with examples.

[Screencast] WSO2 API Cloud Tutorial 6 - Enforce Throttling and Resource Access Policies

In our previous tutorial, we looked at the built-in REST Client provided by the API Store. In this tutorial, we will talk about how WSO2 API Cloud enforces throttling and resource access policies, thus protecting your backend from denial of service attacks, overuse and malformed invocations.

You can watch the entire WSO2 API Cloud video playlist here.

How to Write a Web Application Backed by WSO2 Middleware - Part 3

WSO2 has server products that meet various requirements; given a custom requirement, it is important to integrate them properly for best performance and easier maintenance. When it comes to separation of back-end from front-end, self-secured services and proxying services is a clean design. This article, the third part of a three-part series, explains how to write a web application (front-end) separated from data services (back-end), using WSO2 ESB to proxy the services and secure them (refer to Part 1 and Part 2 of this series).

How to Write a Web Application Backed by WSO2 Middleware - Part 2

Security plays a key role in online applications, and can be divided into two parts, i.e. authentication and authorization. The application should be accessible only to authenticated users. Depending on the permissions granted, the user should be able to perform only a subset of tasks within the application that’s provided via authorization. In this article, the second of a three-part series, we discuss how you could secure a web application deployed on a application server using WSO2 middleware solutions. Part 1 focused on writing a web application backed by WSO2 middleware.

How to Write a Web Application Backed by WSO2 Middleware - Part 1

With the popularity of web browsers and the World Wide Web, web applications too have become popular. They have the capability of doing a mash-up using remote services and provide some useful business functionality. This article is the first of a three-part series that describes how you could write a web application that can read/write data, execute business logic, do authentication plus authorization, and show service statistics using WSO2 middleware products.

WSO2 API Manager Scalable Deployment Patterns - Part 2

WSO2 API Manager's functional component architecture supports effective deployment of a distributed setup. The choice of deployment option comes down to specific scalable requirements and cost. In the first part of this three-part series, we discussed in detail some key deployment patterns of WSO2 API Manager. This article will focus on single-server, cluster, and cloud deployment; production deployment models; fine-tuning and best practices; and how to solve common problems encountered with deployment patterns.