Enterprise Integration

0) Adeptia



Bewildering array of SOAP security standards

2) CAP theory


CAP theory

Client/Server communication: Micro Composition vs Macro Composition of APIs

4) Data format standards


Data format standards

5) EDI Processing


EDI Processing

6) Features



7) General research


General research

General survey of data format standards

Goals and Characteristics

10) IBM Datapower


IBM Datapower

11) IBM process server


IBM process server

12) Integration Patterns


Integration Patterns

This note will research how information is sent and received from an enterprise. What is channel level security? what is message level security? What is SSL? What is Mutual Auth? What are certificates? How is this handled in SOAP? How is this handled in REST? and perhaps more on those lines.

With this research I have learned what PKI is, What public and private keys are, what signatures are, what certificates are, what CA certificates, what SSL certificates are, how web servers manage their certificates, how web browsers manage their CA certificates, what self signing is, and more...

14) JWT: JSON Web Tokens


JWT: JSON Web Tokens

This note explores the differences between Channel security through SSL and Certificates and Message level security that may ride on top of that channel level security

This research is a continuation of the research from general security guidelines research that is done prior to this. This earlier research talks about PKI, SSL, Digital Certs, https etc.

16) My Take on Integration


My Take on Integration

17) On API Keys


On API Keys

18) On API Managers


On API Managers

19) On Docker


Docker is an OS (especially Linux at the moment) level facility/technology that can build OS images dedicated all the way to the application level in multiple layers. Developers will build docker application images instead of application packages where by the application images are stand alone and can run on any hardware on *any* OS. The images are layered and can be shared publicly or privately. Docker provides the verbs and scripts necessary to build, deploy, and monitor application images running in containers on a native OS. Docker containers are significantly lightweight compared to virtual machines making distributed, scalable, multi-tenanted computing engines in the cloud effective and efficient.

Kubernetes establishes robust declarative primitives for maintaining the desired state requested by the user. We see these primitives as the main value added by Kubernetes. Self-healing mechanisms, such as auto-restarting, re-scheduling, and replicating containers require active controllers, not just imperative orchestration.

On IBM BlueMix and Related Research

21) On Microservices


On Microservices

Security approaches for REST

23) self documenting apis


self documenting apis

You will find here a cursory research on things like JBI, ESBs, iPAAS etc.

25) Tableau


Tableau Research

26) Tools



Tools to document reusable services/assets in an Enterprise

28) Trends



29) web sockets I suppose


web sockets I suppose

What are RAML, Swagger?

31) What is 3Scale?


What is 3Scale?

What is DSS (Decentralized Software Services?)

Worker Queues for near real term post processing based on API Providers