Latest Content

[Video] Building Tomorrow's Enterprise: Reports from the Ground Wars

In today’s highly competitive world, a connected business stays ahead of the game with seamless internal and external connectivity. In this open discussion, we identified technical and non-technical challenges in the journey of building a connected business from a team who has achieved this in Brazil.

[Presentation] IoT and API Management - A Match Made in Heaven

Billions of devices connect to the Internet forming a complex web of Internet of Things. Some challenges of such a system include, device registration, authorization and management. Once a device successfully registers itself, it is able to publish data and also expose actuators to be control by authorized calls. This session deep dived into API Management in the IoT space and discussed device registration, exposing devices as APIs, applying API management best practices to manage device APIs and discussed why OAuth2 is a natural fit for authorizing access to devices.

[Video] Building a PaaS with CloudStack

Platform-as-a-Service (PaaS) is a technology designed to make DevOps easier and allow developers to focus on application development. In this session, Lakmal discussed the key elements of PaaS and dug deep into Apache Stratos. The talk included an installation top of CloudStack, deploying sample applications using puppet, and a demonstration on how it can be extended to support new application containers

[Screencast] Writing Integration Test Cases for WSO2 API Manager

The WSO2 test automation framework uses test engine as its underlying testing framework. This tutorial will demonstrate how you can write an automated integration test for WSO2 API Manager using the WSO2 test automation framework. The objective of this screencast is to explain how you can write your test class, configure automated test-related configurations, and finally run your test class.

[Presentation] Pattern-Driven Enterprise Architecture

Patterns provide structure and clarity, enabling architects to establish their solutions across the enterprise. These software patterns also help to link technology and business requirements in an effective and efficient manner. Patterns help to incorporate robust solutions for business problems due to their wide adoption as well as reusability. In addition, patterns create a common method to communicate, document and describe solutions.

[Presentation] Tracking a Soccer Game with Big Data

Mobile devices, sensors, and GPS are driving demand to handle big data in both batch and real-time. This presentation discusses how we used complex event processing (CEP) and MapReduce-based technologies to track and process data from a soccer match as part of the annual DEBS event processing challenge.

[Presentation] Creating an API Centric Enterprise

Just a few years back, websites had to be created in order to gain customers. Today, with the rise of mobile applications, APIs have taken over to foster innovation and help the productivity of developers, inside and outside of the enterprise. With the help of RESTful tooling, OAuth as an access control standard, and Swagger as a documentation toolbox, enterprises have been exposing APIs used by thousands of developers around the world.

[Presentation] Next-Gen Apps with IoT and Cloud

The nature of apps (mobile/web/device) has changed to keep pace with rapidly changing and challenging business requirements as well as technology advances. To meet those challenges, app development too has changed. Internet of Things (IoT) and cloud technologies have become facilitators to enable the above technology characteristics.

[Presentation] Securing the Insecure

Insecurity is a perception. There are no 100% secure systems on earth. Many cryptographic algorithms developed in the 80s and 90s can now be broken due to advancements in computer processing power. Security has always been, from the onset, about preventing undesirable behavior in networks and systems. There are three security properties that when violated, can lead to undesirable behavior; confidentiality, integrity and availability.

[Screencast] Securing Plain Text Passwords using Carbon Secure Vault

In this screencast we will discuss how to use Carbon secure vault in order to secure plain text passwords in WSO2 products and how to apply it in your deployment with your own key store.