Prisoner of Legacy Systems

At some point, old software installed, just has to go away. The million dollar question is when. After recently experience of having a legacy system for about 8 years too long that prompted me to blog on this topic. I’ve seen the impact first hand with regard to project timelines, business climate changes, and constant tickets to... Continue Reading →

Environment Gap Analysis Diagram

Brainstorming diagram using Microsoft Visio 2013 for asking questions in determining environment gap analysis for application and creating an Environment Gap Analysis Diagram. This comes in very handy for future use too in order to help you remember all the questions to ask.

Android Development Beginners Guide

I recently come across a tool called MIT App Inventor 2 which prompted me to create an Android Development Beginners Guide. I always had an interest in learning how to build native mobile apps without extensive knowledge of coding. A group of students from MIT built a visual builder for making it so easy to build apps.... Continue Reading →

Detailed Identity Data Flow

Microsoft Visio diagram for an entire Enterprise Detailed Identity Data Flow of both user and roles using SOA (Service-Oriented Architecture), HCM (Human Capital Management), and OIM (Oracle Identity Manager) to facilitate the business rules and how the data flows into all ecosystems.

Getting Started with Java API’s

The Java API Web Service Cheap Seats Where does it all start to get rocking with cool Java API Web Services? https://www.linkedin.com/pulse/my-java-api-web-service-cheap-seats-mike-reams Technology: API | JSON | REST | HTTP API – Application Programming Interface, a set of programming instructions and standards for accessing a Web-based software application or Web tool. A company releases its API to the public so that other... Continue Reading →

Design Pattern for Perimeter Protected Access

Identity Provisioning is a service within the Identity Governance stack that provides various provisioning services to the business. Authoritative identity data is based person data from the HCM (Human Capital Management) and is reconciled and aggregated with other user data associated based on business rules. The goal is deliver end-to-end security in J2EE applications, Web services, identity management, and service provisioning.

The Laws of Architecture Ignorance

Over the years I encountered many good mistakes and failures that has helped me mature either through my own modest ignorance or at someone else’s expense. When we hear words such as “mistake” or “failure”, we have a tendency of immediately entrenching a negative perception in our minds. We all know the common clichés of failures since you cannot read for more than 2-3 minutes on any blog site without seeing an inspirational quote that either tries to make us feel good about our own failures or not be afraid to embrace them

Blog at WordPress.com.

Up ↑

%d bloggers like this: