Article

My Learnings from a Session I Taught, Myself (XP, Feedback + Notes)

I facilitated a session to simulate planning, development, feedback and iteration in an Agile fashion. I used a simulation called XP Game. This game originated based on the concepts introduced in eXtreme Programming book by Kent Beck. It provides a visual and interactive way to understand the values of XP, and to a wider extent… Continue reading My Learnings from a Session I Taught, Myself (XP, Feedback + Notes)

Article

Notes from Agile Facilitation Tools & Techniques Course

These are the notes from the facilitation workshop / course held by Sue Johnson. My Aphorism You need to show the same audacity for not facilitating a session having no or negative value, as opposing a team’s decision contradicting Agile values. Great Facilitation Skills Having made them write it down => great facilitation skill for helping… Continue reading Notes from Agile Facilitation Tools & Techniques Course

Article

Introduction to NoSQL by Martin Fowler

Impedance Mismatch problem: O/R issuesSQL: does not work well with large clustersGoogle: BigtableAmazon: Dynamo=> NoSQLOrigin: a Twitter hashtag to advertise a single meeting #nosql non-relational open-source cluster-friendly schema-less when you are getting a price from a row, you are utilizing schema, but when you don’t have schema there is no guarantee data is there 21st… Continue reading Introduction to NoSQL by Martin Fowler

Article

NoSQL – MongoDB

Key / Valye (HashMap)Tabular (BigTable)Document Oriented no Joinsno Complex Transactionsno SQL databasse -> databasetable -> collectionrow -> document JSON style document (BSON on the mongoDB servers) no predefined schematable has schemacollection does not have schema we do not need to pre-create the collection, first insertion will create the collection _id : timestamp+machine id+process id+counter db.posts.find$gt… Continue reading NoSQL – MongoDB

Article

JBoss and security

JBoss implementaiton of security is JBossSX. It both supports declarative J2EE (JEE) and role-based security model. Default implementation for declarative security model is JAAS. Declarative: you declare the security roles and permissions using a standard XML message, rather than embedding in your code. Secure access to EJBs and web components using ejb-jar.xml and web.xml deployment… Continue reading JBoss and security

Article

JAAS Notes

Java Authentication and Authorization Service, or JAAS, pronounced “Jazz” Configuration files for JAAS *.login.conf (e.g. form login) *.policy (which identity grant which permission) LoginModule (interface) LoginContext (Class) Kick off authentication process by creating a subject (if no subject passed to it will create a new one) Subject e.g. user, resource, system, … Principal Face of… Continue reading JAAS Notes