Blog Archives

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part III)

After configuring the Raspberry Pi in monitor WIFI/802.11 mode (first blog post) and after configuring Raspberry Pi to send the 802.11 captured traffic to WSO2 BAM and Apache Thrift listener (second blog post), now I will explain how to create

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part II)

After configuring the Raspberry Pi to capture WIFI/802.11 traffic (first blog post), we have to store this traffic in a Database (NoSQL and RDBMS). Because, the idea is to process in real-time and/or batch the stored data. To capture this

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part I)

Yes, in this digital world, everything generates data, but before to do BigData, you have to follow these steps: 1. Capture Acquires, Integrates data. 2. Store Classification, Consolidate, Transformation, Storage Design, etc. 3. Analysis Exploration, visualization, modeling, prediction, etc. Everything

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

[WEBINAR] Gestión de Identidades en Servicios con WSO2 Identity Server

Gestión de Identidades y Control de Acceso en los Servicios usando WSO2 Identity Server Date: Jueves, 18 de Junio, 2015 Time: 04:00 PM – 05:00 PM (GMT) | 17:00 UK | 11:00 Perú, México, Colombia | 13:00 Brazil, Argentina, Chile

Tagged with: , , , ,
Posted in Security

Applying WS-Security Policy Framework to Webservices (WSO2 ESB) and Dataservices (WSO2 DSS)

WS-SecurityPolicy (http://docs.oasis-open.org/ws-sx/ws-securitypolicy/v1.3/os/ws-securitypolicy-1.3-spec-os.html) language is built on top of WS–Policy framework (http://www.w3.org/TR/ws-policy) and defines a set of policy assertions that can be used in a granular way to apply or to secure at message-level, in part of message, at operation-level or

Tagged with: , , , , , ,
Posted in EIP, Security, SOA

Squeezing the Sample 100 (Using WS-Security for Outgoing Messages) of WSO2 ESB 4.8.1

The “Sample 100: Using WS-Security for Outgoing Messages” is a great example to start learning with WS-Security, WS-Policy and how to deal with the security of SOAP webservices ….. but the problem is that this example does not work, also that

Tagged with: , , , ,
Posted in Security, SOA

Gestión de Identidades y Accesos en las Organizaciones con WSO2 IS

Introducción a IAM (Identity and Access Management) La Gestión de Usuarios siempre es una funcionalidad requerida en las Aplicaciones Empresariales, el objetivo es crear, renovar, borrar, actualizar las credenciales con el cual un usuario puede acceder a la Aplicación y

Tagged with: , , , , , ,
Posted in BPM, CRM, ECM, ERP, Portal, Security, SOA
Archives