Automate Home Assistant

When your devices are set up, it’s time for automation. Home Assistant offers a few built-in automations – Use the automation component to set up your own rules, for the most part. If you added a random sensor in the previous step then you can use that sensor for your very first automation: automation: - alias: Check sensor... Continue Reading →

Prisoner of Legacy Systems

At some point, old software installed, just has to go away. The million dollar question is when. After recently experience of having a legacy system for about 8 years too long that prompted me to blog on this topic. I’ve seen the impact first hand with regard to project timelines, business climate changes, and constant tickets to... Continue Reading →

Environment Gap Analysis Diagram

Brainstorming diagram using Microsoft Visio 2013 for asking questions in determining environment gap analysis for application and creating an Environment Gap Analysis Diagram. This comes in very handy for future use too in order to help you remember all the questions to ask.

Detailed Identity Data Flow

Microsoft Visio diagram for an entire Enterprise Detailed Identity Data Flow of both user and roles using SOA (Service-Oriented Architecture), HCM (Human Capital Management), and OIM (Oracle Identity Manager) to facilitate the business rules and how the data flows into all ecosystems.

Getting Started with Java API’s

The Java API Web Service Cheap Seats Where does it all start to get rocking with cool Java API Web Services? Technology: API | JSON | REST | HTTP API – Application Programming Interface, a set of programming instructions and standards for accessing a Web-based software application or Web tool. A company releases its API to the public so that other... Continue Reading →

Design Pattern for Perimeter Protected Access

Identity Provisioning is a service within the Identity Governance stack that provides various provisioning services to the business. Authoritative identity data is based person data from the HCM (Human Capital Management) and is reconciled and aggregated with other user data associated based on business rules. The goal is deliver end-to-end security in J2EE applications, Web services, identity management, and service provisioning.

The Laws of Architecture Ignorance

Over the years I encountered many good mistakes and failures that has helped me mature either through my own modest ignorance or at someone else’s expense. When we hear words such as “mistake” or “failure”, we have a tendency of immediately entrenching a negative perception in our minds. We all know the common clichés of failures since you cannot read for more than 2-3 minutes on any blog site without seeing an inspirational quote that either tries to make us feel good about our own failures or not be afraid to embrace them

Need more cowbell! – “Got IdM?”

The new tone of “Identity Governance“(with a small g-Credit to Geoff), is stepping in as the new sheriff of the language marketing game.  Kind of like what “Cloud” did with aggregating storage area network clusters with unused parking data spaces. No offense.   Identity Management (IdM) the ‘It Doesn’t Mew’ anymore acronym. That once known 25+... Continue Reading →

Blog at

Up ↑

%d bloggers like this: