setgetweb.com

 

Middleware

  1. WAS v9.0.x
  2. WAS v8.5.5 *
  3. Liberty Base *
  4. WAS Liberty Core *
  5. WAS v8.5 *
  6. WAS v8.0
  7. WAS v7.0
  8. WAS v6.1
  9. WAS v6.0
  10. WAS v5.1
  11. Installation Manager 1.8.6

Web server

  1. IHS v9
  2. IHS v7
  3. Apache Tomcat v10
  4. Apache v2.4
  5. Apache v2.0
  6. IIS web server

HCL Portal

  1. HCL Portal v9.5 (*)
  2. WebSphere Portal v8.5
  3. WebSphere Portal v8.0
  4. WebSphere Portal v7.0
  5. WebSphere Portal v6.1.5
  6. WebSphere Portal v6.1
  7. WebSphere Portal v6.0
  8. WebSphere Portal v5.1

IBM Identity Access

  1. IBM Security Verify Access
  2. IBM Security Identity Manager
  3. Security Directory Integrator
  4. Tivoli Monitoring v6.3
  5. ITCAM for Applications v7.1
  6. ITCAM v6.1
  7. ITCAM for WAS v7.2
  8. Tivoi Monitoring (Infocenter)

Cloud

  1. OpenShift 4.x
  2. kubernetes.io
  3. IBM Cloud

WebSphere Commerce

  1. HCL Commerce v9.1
  2. WebSphere Commerce v9.0
  3. WebSphere Commerce v7.0
  4. WebSphere Commerce v6.0

Database

  1. Oracle
  2. DB2
  3. SQL Server

Web development

  1. CSS
  2. HTML5
  3. Tags
  4. jQuery *
  5. Python
  6. PHP
  7. Shell Scripts
  8. Perl

DevOps

  1. Ansible
  2. Jenkins
  3. Apache Ant
  4. Apache Maven
  5. Terraform
  6. Selenium
  7. Git
  8. Bamboo
  9. Puppet
  10. Salt
  11. Chef
  12. Interview

Linux

  1. Notes
  2. sed
  3. awk
  4. rsync
  5. SSH password-less login
  6. SSH tunneling

IBM MQ

  1. MQ v9.2 -->
  2. MQ v9.1
  3. MQ v9.0 -->
  4. MQ v7.5 -->
  5. MQ v6

IBM eXtreme Scale

  1. eXtreme Scale v8.6
  2. XC10 v2.1
  3. eXtreme Scale v7.1
  4. eXtreme Scale v7.0
  5. WebSphere XD v6.0

IBM BPM and ODM

  1. IBM BPM v8.5
  2. IBM BPM v8.0
  3. WebSphere Lombardi v7.2
  4. ODM v8.5
  5. ODM v8.0.1

Connections

  1. HCL Connections v6.5
  2. Connections v5.0
  3. Connections v4.5
  4. Connections v4.0
  5. Connections v3.0
  6. Connections v2.5

IBM MobileFirst

  1. MobileFirst v8
  2. MobileFirst v7
  3. MobileFirst v6.3 (*)
  4. Worklight v5

Rational

  1. Rational Application Developer v97
  2. Rational Performance Tester v8.5
  3. Rational Performance Tester v8
  4. Rational Performance Tester v7
  5. Rational Functional Tester v8
  6. NeoLoad

Network

  1. SOAPUI
  2. Networking summary
  3. F5 BIG-IP
  4. eBook
  5. Multicast
  6. snort
  7. lsof

IBM Resources

  1. IBM Support Forums
  2. developerWorks
  3. IBM MediaCenter
  4. IBM Community
  5. IBM Middleware Community
  6. IBM Cloud Service Portal
  7. w3schools.com
  8. Redbooks
  9. Certifications

Blockchain

  1. Introduction
  2. Hyperledger
  3. Hyperledger github
  4. Developer tutorial
  5. Blockchain Business Network

Weblogic

  1. WebLogic v10.3
  2. WebLogic v8.1

Miscellany

  1. Friday Night Poker Party radio

About setgetweb.com

My name is Michael Pareene (Curriculum Vitae) (PDF). This site contains tech notes collected from several decades as an IT business consultant, mostly in the UNIX-based middleware sphere. Email me at michael.pareene@gmail.com.


Oct 31, 2024

Android malware FakeCall can reroute calls intended for banks to attacker-controlled numbers.


Oct 10, 2024

Today's soundtrack: Tomaso Albinoni - 12 Concertos For Oboe & Strings

Recently I had to remediate a man-in-the-middle exploit where a white-hat hacker used a BurpSuite proxy to install a certificate on their browser. Doing this allowed them to intercept and decrypt requests. In this case they were able to intercept attachments submitted to the site and, and replace them with their own files. To remediate a server-side validation script was implemented which looped through the destination directory. If an invalid file was found, it was moved to a quarantine directory. This was a quick solution that took less than an hour to write and implement. The long-term solution will be to create a hash of the submitted file so that it never lands on the destination.


Freeform architecture

Pages on this site are written using a vi text editor. Content is marked up with tags and linked in index.html pages. Having UNIX-based text files allows the use of shell scripts to mass manipulate text and tagging. Scripts are used to do things like shorten verbosity, add formatting, automatically generate inline links to other content, and join lines.


Java performance tuning

A long-lived and oomprehensive site: http://www.javaperformancetuning.com/


Project Gutenberg random books feature

Physical libraries and bookstores offer serendipitous browsing. Project Gutenberg's All Books (in random order) duplicates some of that experience. I have been idling there, being served books like canapes on a tray. Some books chosen include:

  • A History of the Old English Letter Foundries by Talbot Baines Reed
  • Astounding Stories of Super-Science, March 1930
  • Exiles of the Three Red Moons by Carl Selwyn
  • Fairies and Fusiliers by Robert Graves
  • Scientific American December 14, 1878


Webb Telescope Images

The Webb Telescope images are illuminating. I am re-reading Poul Anderson's story of reluctant intergalactic travelers, Tau Zero, published in 1970. He would have had much to say about this new view into the deepness of the sky.


Legacy documentation

A person told me recently that one of the reasons they appreciate this site is because it retains documentation for long deprecated technologies. Because the information has been annotated over the years, I often find the information I need in the archives for older versions of software.


AssemblyLines

Tivoli Directory Integrator (TDI) AssemblyLines are used for data transformation and DB loads.


Tradition

Traditional architecture still has a place in the cloud


Complexity is is entropy

Comprehensive article from Infoworld surveying the modern software stack and the increased level of complexity inherent in today's systems.


JavaScript frameworks

Good overview of the The 10 most important JavaScript frameworks of the past decade.


WebSEAL

Some WebSEAL notes


IBM MQ

Reviewing interoperation with IBM MQ


Tips

A couple of random tips...

  • To save an html as a PDF and preserve links, open the page with an Opera browser and "Save as PDF".

  • To delete all text between two patterns...

      sed -n '1,/<body>/p;/<h1/,$p' $i


What type of cloud to choose

Public, Private, Hybrid, Multicloud, Distributed Cloud - Which one is right for you?


Configure traditional WAS on OpenShift

For info on how to move WebSphere ND to cloud, see: Cloud Pak for Applications: Operational Modernization Solution. Also see, tutorial on how to Configure traditional WebSphere session persistence on OpenShift. Here are steps to create customized, curated container images of both traditional WebSphere Application Server (tWAS).


Azure Red Hat OpenShift

Here is a comprehensive set of examples for implementing Azure Red Hat OpenShift leveraging WebSphere Liberty.


Highest paying certs

According to Forbes, the current highest-paying certifications are Google Certified Professional Cloud Architect, CISM – Certified Information Security Manager and AWS Certified Solutions Architect.


WebSphere Application Server on Cloud

IBM is splitting it’s Global Services division into a new company in order to concentrate on Cloud.  It appears WebSphere Application Server is considered as part of their Cloud offerings:

    www.ibm.com/cloud/websphere-application-platform/  

IBM’s detailed documentation on Red Hat OpenShift on IBM Cloud has lots of practical examples and inline links.  


Agile notes

Reading Kurt Cagle’s article Beyond Agile: The Studio Model

One significant flaw in Agile is that it is programmer-centric and task-oriented. However, a significant portion of any project relies upon existing resources and SMEs who serve to to curate, annotate and document the institutional information that are necessary for projects to succeed. They are the ones that end up documenting code and make information consistent, findable and describable within a common metadata framework. These are ongoing processes, which IMHO have always fallen outside of most Agile frameworks, yet as enterprise consistency becomes an ever larger requirement, the role of librarians and data stewards becomes much more pressing.

 


Job manager

Getting caught up on Job Manager tooling, which lets one asynchronously run WebSphere and host-level jobs on remote servers.  


Performance tuning

Here are some notes on a portal performance tuning project I completed a few years ago.  


DB2 notes

Some notes on common DB2 database commands.


WebSphere Security Hardening

I have posted some notes on a security hardening session.  Notes are specific to WebSphere Portal v8, but are generally applicable to other apps deployed to WAS. 

See WebSphere security hardening


Get cell pid

We can display the name of the cell, node, and server in front of the output for the ps -ef command by setting the cell custom property

com.ibm.websphere.management.launcher.options = displayServerInFront


DataPower XI52 in a nutshell

The IBM DataPower XI52 appliance provides an ESB backbone that facilitates (brokers) communication between services. Features include…

Protocol virtualization Communication between parties who use different protocols such as http, https, ftp, MQ. ESB bridges (converts) these protocols.
Message format virtualization For example, one party sends XML (SOAP) message, ESB converts to JSON, which is sent to backend.
Endpoint virtualization WSDL services that used to exist on servers can be moved to ESB.
XML attack security Including DoS, MMXDos, and other attacks.
Configuration driven interface Less code to write
XML processing at wire speed. Versus server-based ESB solutions that operate at software speed.


wsadmin script examples

Here are some basic wsadmin script examples.


WebSphere Commerce integration with WXS XC10 appliance

Here are some project notes created when I was the WebSphere Commerce administrator for a large Fortune 500 retailer.  The notes discuss integrating WebSphere eXtreme Scale DataPower XC10 appliance with WebSphere Commerce.  


Network Sniffer: snort

If you need a quick and easy network sniffer give snort a try.


Logon and remote execution without using passwords.

We can leverage SSH public-key authentication between hosts to enable all sorts of useful functionality, including…

  • Password-less login from HostA to HostB
  • Ability to execute remote commands from HostA on HostB
  • We can automatically administer an entire network of servers from a central server

I once set up a large WebSphere Commerce site for a Fortune 500 retailer that used this procedure to remotely execute various commands, including stopping/starting, and generating reports for, eXtreme Scale caching.