Mule in Action

Total Page:16

File Type:pdf, Size:1020Kb

Mule in Action MANNING David Dossot John D’Emic FOREWORD BY ROSS MASON Mule in Action Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> Mule in Action DAVID DOSSOT JOHN D’EMIC MANNING Greenwich (74° w. long.) Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> For online information and ordering of this and other Manning books, please visit www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact Special Sales Department Manning Publications Co. Sound View Court 3B fax: (609) 877-8256 Greenwick, CT 06830 email: [email protected] ©2010 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15 percent recycled and processed without the use of elemental chlorine. Development editor: Jeff Bleiel Copyeditor: Benjamin Berg Manning Publications Co. Proofreader: Katie Tennant Sound View Court 3B Typesetter: Dottie Marsico Greenwich, CT 06830 Cover designer: Marija Tudor ISBN 978-1-933988-96-2 Printed in the United States of America 12345678910–MAL–141312111009 Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> We dedicate this book to those who are tired of integration donkey work. Your Mule has arrived! Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> brief contents PART 1CORE MULE..................................................................1 1 ■ Discovering Mule 3 2 ■ Configuring Mule 21 3 ■ Sending and receiving data with Mule 39 4 ■ Routing data with Mule 82 5 ■ Transforming data with Mule 108 6 ■ Working with components 139 PART 2RUNNING MULE........................................................165 7 ■ Deploying Mule 167 8 ■ Exception handling and logging 196 9 ■ Securing Mule 218 10 ■ Using transactions with Mule 233 11 ■ Monitoring with Mule 251 vii Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> viii BRIEF CONTENTS PART 3TRAVELING FURTHER WITH MULE ..............................271 12 ■ Developing and testing with Mule 273 13 ■ Using the Mule API 299 14 ■ Scripting with Mule 327 15 ■ Business process management and scheduling with Mule 342 16 ■ Tuning Mule 362 Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> contents foreword xvii preface xix acknowledgments xx about this book xxi about the authors xxv PART 1CORE MULE.........................................................1 Discovering Mule 3 1 1.1 ESB, the EAI workhorse 5 1.2 The Mule project 7 History 8 ■ Competition 9 1.3 Mule’s core concepts 10 Model 10 ■ Service 11 ■ Transports 12 ■ Routers 14 Components 15 ■ Request processing 15 1.4 Mule on your machine 18 1.5 Summary 19 Configuring Mule 21 2 2.1 First ride 22 2.2 The Spring XML configuration 25 XML element families 26 ■ Configured values 29 ■ Schema locations 32 ix Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> x CONTENTS 2.3 Configuration modularity 34 Independent configurations 34 ■ Inherited configurations 35 Imported configurations 36 ■ Heterogeneous configurations 36 2.4 Summary 37 Sending and receiving data with Mule 39 3 3.1 Understanding connectors and endpoints 40 Configuring connectors 41 ■ Configuring endpoints 43 3.2 Working with files and directories using the file transport 46 Reading and writing files with file endpoints 47 ■ Using filters on inbound file endpoints 49 ■ Using STDIO endpoints 50 3.3 Using email 51 Receiving email with the IMAP transport 51 ■ Sending mail using the SMTP transport 53 3.4 Using web services 55 Consuming and exposing SOAP services with the CXF transport 55 Sending and receiving data using the HTTP transport 61 3.5 Using the JMS transport for asynchronous messaging 64 Sending JMS messages with the JMS outbound endpoint 65 Receiving JMS messages with the JMS inbound endpoint 67 Using selector filters on JMS endpoints 68 ■ Using JMS synchronously 68 3.6 Receiving and sending files using the FTP transport 70 Receiving files with inbound FTP endpoints 71 ■ Sending files with outbound FTP endpoints 72 3.7 Working with databases 72 Using a JDBC inbound endpoint to perform queries 73 ■ Using a JDBC outbound endpoint to perform insertions 75 3.8 Using the XMPP transport 76 Sending Jabber messages on an outbound endpoint 77 ■ Receiving Jabber messages on an inbound endpoint 77 3.9 The VM transport 78 Sending and receiving messages on VM endpoints 79 ■ Using persistent queues on VM endpoints 80 3.10 Summary 81 Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> CONTENTS xi Routing data with Mule 82 4 4.1 Working with routers 83 Inbound routers 84 ■ Outbound routers 85 4.2 Using filters with routers 86 Filtering by type 86 ■ Filtering by textual content 87 ■ Filtering with expressions 87 ■ Logical filtering 89 4.3 Using inbound routers 89 Being picky with the selective-consumer router 90 ■ Altering message flow with the forwarding-consumer router 91 ■ Collecting data with the collection aggregator 92 ■ Insuring atomic delivery with the idempotent receiver 94 ■ Snooping messages with the wiretap router 96 4.4 Outbound routing 97 Being picky with the filtering router 97 ■ Sending to multiple endpoints with the static recipient list 98 ■ Broadcasting messages with the multicasting router 99 ■ Service composition with the chaining router 100 ■ Chopping up messages with the message splitter 102 ■ Using asynchronous-reply routers 104 4.5 Summary 107 Transforming data with Mule 108 5 5.1 Working with transformers 109 5.2 Configuring transformers 111 5.3 Using core transformers 114 Dealing with bytes 115 ■ Compressing data 117 ■ Modifying properties 118 ■ Leveraging expression evaluators 120 5.4 Using XML transformers 122 Transforming format with XSL 122 ■ XML object marshalling 124 5.5 Using JMS transformers 125 Producing JMS messages 125 ■ Consuming JMS messages 126 5.6 Existing transformers in action 127 5.7 Writing custom transformers 131 Transforming payloads 131 ■ Transforming messages 134 5.8 Summary 138 Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> xii CONTENTS Working with components 139 6 6.1 Massaging messages 142 Building bridges 142 ■ Echoing and logging data 144 Building messages 145 6.2 Invoking remote logic 147 Feeling good with SOAP 148 ■ Taking some REST 149 6.3 Executing business logic 151 Resolving the entry point 152 ■ Configuring the component 156 Handling workload with a pool 158 ■ Reaching out with composition 160 ■ Internal canonical data model 162 6.4 Summary 163 PART 2RUNNING MULE...............................................165 Deploying Mule 167 7 7.1 Deployment strategies 168 Standalone server 169 ■ NetBoot server 171 ■ Embedded in a Java application 172 ■ Embedded in a web application 174 Embedded as a JCA resource 177 7.2 Deployment topologies 178 Satisfying functional needs 179 ■ Dealing with the network 181 Designing for high availability 184 ■ Shooting for fault tolerance 187 7.3 Deployment management 189 Using development tools 190 ■ Hitchhiking Galaxy 192 7.4 Summary 195 Exception handling and logging 196 8 8.1 Exception strategies 197 Positioning exception strategies 197 ■ Exceptions and routing 202 8.2 Using retry policies 207 Implementing a retry policy 207 ■ Using the SimpleRetryPolicy with JMS 209 ■ Starting Mule with failed connectors using the Common Retry Policies 210 Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> CONTENTS xiii 8.3 Logging with Mule 212 Using log4j with Mule 212 ■ Using Apache Chainsaw with log4j 213 8.4 Summary 217 Securing Mule 218 9 9.1 Demonstrating Mule security 219 9.2 Using security managers and understanding security providers 220 Using Spring Security 221 ■ Using JAAS 224 9.3 Securing endpoints with security filters 225 Securing an HTTP endpoint with Spring Security 225 Performing JMS header authentication with JAAS 226 Using password-based payload encryption 228 ■ Decrypting message payloads with the PGP SecurityFilter 230 9.4 Summary 232 Using transactions with Mule 233 10 10.1 Using transactions with a single resource 235 Using JDBC endpoints transactionally 235 ■ Using JMS endpoints transactionally 237 10.2 Using multiple resource transactions 242 Spanning multiple resources with JBossTS 243 ■ Using XA transactions in a container 246 10.3 Managing transactions with exception strategies 247 Handling component exceptions 248 ■ Committing transactions with an exception strategy 249 10.4 Summary 250 Monitoring with Mule 251 11 11.1 Checking health 252 Checking health at network level 253 ■ Checking health at system and JVM levels 254 ■ Checking health at JVM
Recommended publications
  • Space Details
    Space Details Key: MULE2USER Name: Mule 2.x User Guide Description: Mule Users Guide for the 2.x release line Creator (Creation Date): ross (Jan 30, 2008) Last Modifier (Mod. Date): tcarlson (Apr 15, 2008) Available Pages • Configuring a Mule Instance • Escape URI Credentials • Home • 3.x Features • Using JSON • Configuring Encoding • Hot Deploying Mule Applications • Deploying Mule as a Service to Tomcat • Starting Mule with the Configuration • About Mule Configuration • About Configuration Builders • Configuring Properties • Mule High Availability • Storing Objects in the Registry • About Transports • Available Transports • BPM Transport • CXF Transport • Building a CXF Web Service • CXF Transport Configuration Reference • Enabling WS-Addressing • Enabling WS-Security • Supported Web Service Standards • Using a Web Service Client as an Outbound Endpoint • Using a Web Service Client Directly • Using HTTP GET Requests • Using MTOM • EJB Transport • Email Transport • File Transport • FTP Transport • HTTPS Transport • HTTP Transport • IMAPS Transport Document generated by Confluence on Feb 07, 2010 23:59 Page 1 • IMAP Transport • JDBC Transport • JDBC Transport Configuration Reference • JDBC Transport Examples • JDBC Transport Performance Benchmark Results • Jetty Transport • Jetty SSL Transport • JMS Transport • Tibco EMS Integration • JBoss Jms Integration • Fiorano Integration • OpenJms Integration • SwiftMQ Integration • Sun JMS Grid Integration • SonicMQ Integration • SeeBeyond JMS Server Integration • Open MQ Integration • ActiveMQ
    [Show full text]
  • Opening Plenary State of the Feather
    Opening Plenary Lars Eilebrecht V.P., Conference Planning at ASF and Lead for ApacheCon Europe 2009 State of the Feather Jim Jagielski Chairman, The Apache Software Foundation Welcome to Amsterdam Presented by The Apache Software Foundation Produced by Stone Circle Productions, Inc. Conference Program • Detailed conference program guide available as a PDF from the ApacheCon Web site – www.eu.apachecon.com • Printed Conference-at-a- Glance program available at registration desk Presentations • 4 Tracks every day starting at 9:00 • Presentation slides provided by speakers will be made available on the ApacheCon Web site during the conference Wednesday Special Events • 9:15-9:30: Jim Jagielski “State of the Feather” • 9:30-10:30: Raghu Ramakrishnan “Data Management in the Cloud” • 10:30-11:30: Arjé Cahn, Ajay Anand, Steve Loughran, and Mark Brewer “Panel: The Business of Open Source”, moderated by Sally Khudairi • 13:00-14:00: Lars Eilebrecht “Behind the Scenes of The ASF” Wednesday Special Events • 18:30-20:00: Welcome Reception and ASF 10th Anniversary Party – Celebrating a Decade of Open Source Leadership • 19:30: OpenPGP Key Signing – [email protected] – moderated by Jean-Frederic Clere Thursday Special Events • 13:00-14:00: Jim Jagielski “Sponsoring the ASF at the Corporate and Individual Level” • 17:30-18:30: James Governor “Open Sourcing The Analyst Business – Turning Prop. Knowledge Inside Out” • 18:30-20:00: “Lightning Talks”, mod. by Danese Cooper and Rich Bowen Friday Special Events • 11:30-13:00: Lars Eilebrecht, Dirk- Willem van Gulik, Jim Jagielski, Sally Khudairi, Cliff Skolnick, “Apache Pioneer's Panel – 10 years of the ASF”, mod.
    [Show full text]
  • Architecture of Mule and Servicemix 42 3 ■ Setting up the Mule and Servicemix Environments 72 4 ■ the Foundation of an Integration Solution 111
    Open Source ESBs in Action Open Source ESBs in Action EXAMPLE IMPLEMENTATIONS IN MULE AND SERVICEMIX TIJS RADEMAKERS JOS DIRKSEN MANNING Greenwich (74° w. long.) For online information and ordering of this and other Manning books, please visit www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact: Special Sales Department Manning Publications Co. Sound View Court 3B Fax: (609) 877-8256 Greenwich, CT 06830 Email: [email protected] ©2009 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15% recycled and processed elemental chlorine-free Development Editor: Jeff Bleil Manning Publications Co. Copyeditors: Liz Welch, Tiffany Taylor Sound View Court 3B Typesetter: Denis
    [Show full text]
  • Site Map - Apache HTTP Server 2.0
    Site Map - Apache HTTP Server 2.0 Apache HTTP Server Version 2.0 Site Map ● Apache HTTP Server Version 2.0 Documentation ❍ Release Notes ■ Upgrading to 2.0 from 1.3 ■ New features with Apache 2.0 ❍ Using the Apache HTTP Server ■ Compiling and Installing Apache ■ Starting Apache ■ Stopping and Restarting the Server ■ Configuration Files ■ How Directory, Location and Files sections work ■ Server-Wide Configuration ■ Log Files ■ Mapping URLs to Filesystem Locations ■ Security Tips ■ Dynamic Shared Object (DSO) support ■ Content Negotiation ■ Custom error responses ■ Setting which addresses and ports Apache uses ■ Multi-Processing Modules (MPMs) ■ Environment Variables in Apache ■ Apache's Handler Use ■ Filters ■ suEXEC Support ■ Performance Hintes ■ URL Rewriting Guide ❍ Apache Virtual Host documentation ■ Name-based Virtual Hosts ■ IP-based Virtual Host Support ■ Dynamically configured mass virtual hosting ■ VirtualHost Examples ■ An In-Depth Discussion of Virtual Host Matching ■ File descriptor limitations ■ Issues Regarding DNS and Apache ❍ Apache Server Frequently Asked Questions http://httpd.apache.org/docs-2.0/sitemap.html (1 of 4) [5/03/2002 9:53:06 PM] Site Map - Apache HTTP Server 2.0 ■ Support ❍ Apache SSL/TLS Encryption ■ SSL/TLS Encryption: An Introduction ■ SSL/TLS Encryption: Compatibility ■ SSL/TLS Encryption: How-To ■ SSL/TLS Encryption: FAQ ■ SSL/TLS Encryption: Glossary ❍ Guides, Tutorials, and HowTos ■ Authentication ■ Apache Tutorial: Dynamic Content with CGI ■ Apache Tutorial: Introduction to Server Side Includes ■ Apache
    [Show full text]
  • Hänninen, Arttu Enterprise Integration Patterns in Service Oriented Systems Master of Science Thesis
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Trepo - Institutional Repository of Tampere University Hänninen, Arttu Enterprise Integration Patterns in Service Oriented Systems Master of Science Thesis Examiner: Prof. Tommi Mikkonen Examiners and topic approved in the council meeting of Faculty of Information Technology on April 3rd, 2013. II TIIVISTELMÄ TAMPEREEN TEKNILLINEN YLIOPISTO Tietotekniikan koulutusohjelma Hänninen, Arttu: Enterprise Integration Patterns in Service Oriented Systems Diplomityö, 58 sivua Kesäkuu 2014 Pääaine: Ohjelmistotuotanto Tarkastajat: Prof. Tommi Mikkonen Avainsanat: Enterprise Integration Patterns, Palvelukeskeinen arkkitehtuuri (SOA), Viestipohjainen integraatio Palvelupohjaisen integraation toteuttaminen mihin tahansa tietojärjestelmään on haas- tavaa, sillä integraatioon liittyvät järjestelmät voivat muuttua jatkuvasti. Integraatiototeu- tusten tulee olla tarpeeksi joustavia, jotta ne pystyvät mukautumaan mahdollisiin muu- toksiin. Toteutukseen voidaan käyttää apuna eri sovelluskehyksiä, mutta ne eivät vält- tämättä takaa mitään standardoitua tapaa tehdä integraatio. Tätä varten on luotu joukko ohjeita (Enterprise Integration Patterns, EIP), jotka kuvaavat hyväksi havaittuja tapoja tehdä integraatioita. Tässä työssä keskitytään näiden mallien tutkimiseen ja siihen, miten niitä voidaan hyödyntää yritysjärjestelmissä. Jotta tutkimukseen saadaan konkreettinen vertailutulos, erään järjestelmän integraatioratkaisu tullaan päivittämään uuteen. Uusi ratkaisu hyödyntää sovelluskehystä,
    [Show full text]
  • Hitachi Command Suite V.8.7.1
    Hitachi Command Suite V. 8.7.1 Open Source Software Packages Contact Information: Hitachi Command Suite Project Manager Hitachi Vantara Corporation 2535 Augustine Drive Santa Clara, California 95054 Name of Product/Product Version License Component ANTLR 2.7.2 ANTLR 2 License ANTLR 2.7.6 ANTLR 2 License Public Domain or Free License without AOP Alliance 1.0 conditions ASM 1.5.3 BSD 3-Clause "New" or "Revised" License ASM 3.3.1 BSD 3-Clause "New" or "Revised" License 3.3.1 ASM* BSD 3-Clause "New" or "Revised" License (modified) AngularJS 1.3.0 The MIT License Apache Axiom 1.2.13 Apache License, Version 2.0 Apache Axis2 1.6.2 Apache License, Version 2.0 Apache BSF 2.3.0 Apache Jakarta BSF License Apache Commons BCEL 5.1 Apache BCEL License Apache Commons CLI 1.1 Apache License, Version 2.0 Name of Product/Product Version License Component Apache Commons Codec 1.11 Apache License, Version 2.0 Apache Commons Codec 1.3 Apache License, Version 2.0 Apache Commons Collections 2.1 Apache Jakarta Commons License Apache Commons Collections 3.2.2 Apache License, Version 2.0 Apache Commons Digester 1.5 Apache Jakarta Commons License Apache Commons Digester 1.8 Apache License, Version 2.0 Apache Commons XMLSchema 1.4.7 Apache License, Version 2.0 Apache FOP 1.0 Apache License, Version 2.0 Apache License, Version 2.0 ISC License PCRE LICENCE (PCRE 4.5 and earlier) The License by "Bell Communications 2.0.59 Apache HTTP Server* Research, Inc.
    [Show full text]
  • Hitachi Command Suite V. 8.7.4 Open Source Software Packages
    Hitachi Command Suite V. 8.7.4 Open Source Software Packages Contact Information: Hitachi Command Suite Project Manager Hitachi Vantara, LLC 2535 Augustine Drive Santa Clara, California 95054 Name of Product/Product Version License Component ANTLR 2.7.2 ANTLR 2 License ANTLR 2.7.6 ANTLR 2 License Public Domain or Free License without AOP Alliance 1.0 conditions ASM 1.5.3 BSD 3-Clause "New" or "Revised" License ASM 3.3.1 BSD 3-Clause "New" or "Revised" License 3.3.1 ASM* BSD 3-Clause "New" or "Revised" License (modified) AngularJS 1.3.0 The MIT License Apache Axiom 1.2.13 Apache License, Version 2.0 Apache Axis2 1.6.2 Apache License, Version 2.0 Apache BSF 2.3.0 Apache Jakarta BSF License Apache Commons BCEL 5.1 Apache BCEL License Apache Commons CLI 1.1 Apache License, Version 2.0 Name of Product/Product Version License Component Apache Commons Codec 1.11 Apache License, Version 2.0 Apache Commons Codec 1.3 Apache License, Version 2.0 Apache Commons Collections 2.1 Apache Jakarta Commons License Apache Commons Collections 3.2.2 Apache License, Version 2.0 Apache Commons Digester 1.5 Apache Jakarta Commons License Apache Commons Digester 1.8 Apache License, Version 2.0 Apache Commons XMLSchema 1.4.7 Apache License, Version 2.0 Apache FOP 1.0 Apache License, Version 2.0 Apache License, Version 2.0 ISC License PCRE LICENCE (PCRE 4.5 and earlier) The License by "Bell Communications 2.0.59 Apache HTTP Server* Research, Inc.
    [Show full text]
  • Open Source Used in Call Analyzer 1.2
    Open Source Used In call analyzer 1.2 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-145264460 Open Source Used In call analyzer 1.2 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-145264460 Contents 1.1 aiohttp 2.3.8 1.1.1 Available under license 1.2 aiohttp 1.3.1 1.2.1 Available under license 1.3 ANTLR 2.7.6 1.3.1 Available under license 1.4 asn1crypto 0.22.0 1.4.1 Available under license 1.5 asn1crypto 0.24.0 1.5.1 Available under license 1.6 bandit 1.4.0 1.6.1 Available under license 1.7 BCEL 5.1 1.7.1 Notifications 1.7.2 Available under license 1.8 BSF (Bean Scripting Framework) 2.4.0 1.8.1 Available under license 1.9 cffi 1.11.4 1.9.1 Available under license 1.10 CGLIB (Code Generation Library) 2.1.3 1.10.1 Available under license 1.11 confluent-kafka 0.10.2.1 1.11.1 Available under license 1.12 cryptography 2.2.2 1.12.1 Available under license 1.13 cryptography 2.2.2 Open Source Used In call analyzer 1.2 2 1.13.1 Available under
    [Show full text]
  • HIERARCHY in MERITOCRACY – Community Building and Code Production in the Apache Software Foundation
    HIERARCHY IN MERITOCRACY { Community Building and Code Production in The Apache Software Foundation Master's Thesis Oscar Casta~neda HIERARCHY IN MERITOCRACY { Community Building and Code Production in The Apache Software Foundation THESIS submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE in MANAGEMENT OF TECHNOLOGY by Oscar Casta~neda born in Guatemala City, Guatemala Policy, Organization, Law and Gaming (POLG) Faculty Technology Policy and Management (TPM) Delft University of Technology (TU Delft) Delft, the Netherlands tbm.tudelft.nl c 2010 Oscar Casta~neda. HIERARCHY IN MERITOCRACY { Community Building and Code Production in The Apache Software Foundation Author: Oscar Casta~neda Student id: 1398946 Email: [email protected] Graduation Date: December 2010 Graduation Section: Policy, Organization, Law and Gaming (POLG) Abstract This research is about code production in top-level open source com- munities of The Apache Software Foundation (ASF). We extensively an- alyzed Subversion repository logs from 70 top-level Apache open source projects in the ASF from 2004 to 2009. Based on interactions in code production during one-year periods we constructed networks of file co- authorship that gave us access to the organization of Apache open source communities. This allowed us to measure graph level properties, like hier- archy and clustering, and their influence on the outputs of code production. Apache communities are groups of individuals that organize their code production efforts in order to develop enterprise-grade open source soft- ware. The ASF explains the success of its communities and the software they produce by claiming to have instituted a meritocracy that brings contributors together in a way that significantly influences code produc- tion, namely by building communities instead of only focusing on technical properties of the source code like modularity.
    [Show full text]
  • Storagetek Tape Analytics Licensing Information User Manual, Release 2.1 E59803-02 Copyright © 2015, Oracle And/Or Its Affiliates
    1[StorageTek] Tape Analytics Licensing Information User Manual Release 2.1 E59803-02 June 2015 StorageTek Tape Analytics Licensing Information User Manual, Release 2.1 E59803-02 Copyright © 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Rester En Sécurité !
    Full Circle LE MAGAZINE INDÉPENDANT DE LA COMMUNAUTÉ UBUNTU LINUX NUMÉRO 67 - Novembre 2012 Photo : Infidelic (Flickr.com) CRITIQUE LITTÉRAIRE : Think like a programmer RREESSTTEERR EENN SSÉÉCCUURRIITTÉÉ !! CRÉER UN ORDINATEUR À L'ÉPREUVE DES VOLEURS full circle magazine n° 67 1 sommaire ^ Full Circle Magazine n'est affilié en aucune manière à Canonical Ltd. Tutoriels Full Circle Opinions LE MAGAZINE INDÉPENDANT DE LA COMMUNAUTÉ UBUNTU LINUX Programmer en Python p.08 Rubriques Mon histoire p.44 LibreOffice - Partie 20 p.09 Command & Conquer p.06 Actus Ubuntu p.04 Qu'est-ce... p.47 DE RETOUR LE MOIS PROCHAIN Créer un ordinateur à l'épreuve Demandezaupetitnouveau p.35 Critique p.55 des voleurs p.12 Jeux Ubuntu p.XX Courriers p.60 Kdenlive - Partie 4 p.26 Labo Linux p.39 Q&R p.62 DE RETOUR LE MOIS PROCHAIN Inkscape - Partie 7 p.28 Femmes d'Ubuntu p.XX Fermeturedesfenêtres p.41 Développement Web p.31 Graphismes Dév. Web Les articles contenus dans ce magazine sont publiés sous la licence Creative Commons Attribution-Share Alike 3.0 Unported license. Cela signifie que vous pouvez adapter, copier, distribuer et transmettre les articles mais uniquement sous les conditions suivantes : vous devez citer le nom de l'auteur d'une certaine manière (au moins un nom, une adresse e-mail ou une URL) et le nom du magazine (« Full Circle Magazine ») ainsi que l'URL www.fullcirclemagazine.org (sans pour autant suggérer qu'ils approuvent votre utilisation de l'œuvre). Si vous modifiez, transformez ou adaptez cette création, vous devez distribuer la création qui en résulte sous la même licence ou une similaire.
    [Show full text]
  • Framework De Gestión De Consumo De Servicios
    UNIVERSIDAD DE VALLADOLID E.T.S.I. TELECOMUNICACIÓN TRABAJO FIN DE GRADO GRADO EN INGENIERÍA DE TECNOLOGÍAS ESPECÍFICAS DE TELECOMUNICACIÓN – MENCIÓN EN INGENIERÍA DE SISTEMAS DE TELECOMUNICACIÓN Framework de gestión de consumo de servicios Autora: Henar García Sánchez Tutora: Míriam Antón Rodríguez Valladolid, 16 de Noviembre de 2016 Henar García Sánchez Framework de gestión de consumo de servicios TÍTULO: Framework de gestión de consumo de servicios AUTORA: Henar García Sánchez TUTORA: Míriam Antón Rodríguez DEPARTAMENTO: Teoría de la Señal y Comunicaciones e Ingeniería Telemática TRIBUNAL PRESIDENTA: Míriam Antón Rodríguez VOCAL: Mario Martínez Zarzuela SECRETARIO: David González Ortega SUPLENTE: Francisco Javier Díaz Pernas SUPLENTE: Mª Ángeles Pérez Juárez FECHA: 16 de Noviembre de 2016 CALIFICACIÓN: 2 Henar García Sánchez Framework de gestión de consumo de servicios 3 Henar García Sánchez Framework de gestión de consumo de servicios RESUMEN En la sociedad actual, el uso de las tecnologías es algo que forma parte de nuestra vida cotidiana. Para usar la mayoría de las tecnologías actuales, estas tecnologías poseen aplicaciones para hacer más fácil su uso a los usuarios, y estas aplicaciones normalmente necesitan conectarse con otras. El objetivo de este TFG surge en este punto, en la comunicación de unas aplicaciones con otras. A través de un ESB (Enterprise Service Bus) estas comunicaciones se pueden realizar de forma simple, abstrayendo cada una de las partes de la aplicación. En estos ESB se pueden realizar muchas funciones, la aplicación desarrollada en este TFG va a comprobar que no se produzcan errores en esta comunicación a través del ESB y en caso de que se produzca se realizará una política de errores, previamente configurada.
    [Show full text]