Blockchain across Oracle by Robert van Mölken
Author:Robert van Mölken
Language: eng
Format: epub
Tags: COM021030 - COMPUTERS / Databases / Data Mining, COM064000 - COMPUTERS / Electronic Commerce, COM083000 - COMPUTERS / Security / Cryptography
Publisher: Dominic Shakeshaft
Published: 2019-03-22T07:33:52+00:00
Each of the partners can choose to implement their middleware and back-office system with different software tools—there are no limitations, other than the payload format of the messages. You can see the same action with the partners in our business case example.
AutoLease uses BPEL Process Manager, which runs BPEL processes to provide an integration layer between Oracle B2B and the Oracle database used by the back-office application. Using SOAP/XML, Oracle B2B calls a web service provided by one of the BPEL processes. BPEL messages are validated using the established business rules, which transform the information so that it can be sent to the database for storage.
The Emergency Call Center uses almost the same setup as AutoLease, but instead of using Oracle BPEL Process Manager, it uses Oracle Service Bus to provide the integration layer to connect Oracle B2B with their back-office database.
Oracle B2B supports multiple communication protocols, such as SOAP/XML, JMS, and File (via network sharing), which allows a middleware solution to connect and integrate with Oracle B2B. Where integration over SOAP/XML can be both asynchronous and synchronous, JMS, for example, is only asynchronous. In our case, it does not matter, since I will not go into that level of detail when reviewing the sample transactions. However, note that in our architecture, we see that AllSecur Insurance, AXA Insurance, and USA Automotive, New York City all use JMS to integrate with their middleware/back-end solution.
Some other noticeable differences between partners that you may have spotted are the use of a single B2B broker, a custom Java application, a different database vendor, and even a cloud/SaaS application for the back office. Partners such as AllSecure and USA Automotive, New York City have chosen Java as their integration solution so that their developers can easily check the necessary business rules in a programming language they understand. The New York and New Jersey branches of USA Automotive Services also use a single B2B broker so that these franchises do not have to deal with the administrative tasks surrounding the configuration of CPA agreements and the necessary infrastructure. The New Jersey Automotive Service does not use a traditional database for storage, but instead uses Oracle ERP Cloud to register and process business transactions. The service bus only performs the correct mapping of the data to and from the ERP Cloud APIs.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6599)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6323)
Machine Learning Security Principles by John Paul Mueller(6288)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5968)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5928)
Solidity Programming Essentials by Ritesh Modi(4053)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3693)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3421)
Mastering Python for Networking and Security by José Manuel Ortega(3358)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3306)
Learn Computer Forensics - Second Edition by William Oettinger(3182)
Incident Response with Threat Intelligence by Roberto Martínez(2908)
Mobile App Reverse Engineering by Abhinav Mishra(2889)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2785)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2783)
