• Home
  • Site Aliases
    • www.cloud-native.info
  • About
    • Background
    • Presenting Activities
    • Internet Profile
      • LinkedIn
    • About
  • Books & Publications
    • Log Generator
    • Logs and Telemetry using Fluent Bit
      • Fluent Bit book
      • Book Resources in GitHub
      • Fluent Bit Classic to YAML Format configurations
    • Logging in Action with Fluentd, Kubernetes and More
      • Logging in Action with Fluentd – Book
      • Fluentd Book Resources
      • Fluentd & Fluent Bit Additional stuff
    • API & API Platform
      • API Useful Resources
    • Oracle Integration
      • Book Website
      • Useful Reading Sources
    • Publication Contributions
  • Resources
    • GitHub
    • Oracle Integration Site
    • Oracle Resources
    • Mindmaps Index
    • Useful Tech Resources
      • Fluentd & Fluent Bit Additional stuff
      • Recommended Tech Podcasts
      • Official Sources for Product Logos
      • Java and Graal Useful Links
      • Python Setup & related stuff
      • DevTips
  • Music
    • Monster On Music
    • Music Listening
    • Music Reading

Phil (aka MP3Monster)'s Blog

~ from Technology to Music

Phil (aka MP3Monster)'s Blog

Category Archives: Books

Book reviews, comments and recommended reading

Oracle Big Data Handbook – Part 1 Reviewed

07 Monday Apr 2014

Posted by mp3monster in Book Reviews, Books, General, Oracle, Oracle Press, Technology

≈ 4 Comments

Tags

analytics, Big Data, book, Cloudera, NoData, Oracle, Oracle Press, press, RDBMS, UK Oracle User Group, unstructured data

As a result of my involvement with the UK Oracle User Group I have been given the opportunity to review Oracle Press’ Oracle Big Data Handbook.  I have to admit that I am not a Big Data expert (and reviewing this book was an opportunity to build my knowledge a bit more).

So, Chapter 1 starts providing a brief but succinct history of Big Data (from Google’s work with Map Reduce and lesser known technologies such as Swazall and Dremel), the rise of Hadoop. The primary value proposition of Big Data  is briefly explored (highlighting the point that actually RDBMS such as Oracle can accommodate lots of data when in a structured form) but Big Data is the nexus of volume, speed, variety (multiple structures, semi structured and unstructured).  The book does suggest that in addition to these factors the data Value (a structured transaction have a lot more value than the same quantity of unstructured data which delivers its value when in context with other data).

From here, a brief look at the Oracle BigData landscape which leads nicely to having a layout for the chapters of the book. Ranging from the Oracle Engineered Systems idea to it’s adoption Hadoop through Cloudera, NoData and onto how this becomes a joined up solution with the likes of OBIEE.  Passing through Oracle’s extended version of the R language.

In all a brief, succinct and informative intro.

 

Chapter 2, takes us on the journey of the business value of Big Data ideas, taking us through some examples such as MCI’s campaign the 1990s to develop insight by mining for friends and family information. In its day we called this sort of thing data mining, now its another aspect of big data. The chapter moves onto describing an idea of Information Chain Reaction (ICR) – where output from one stage produces a response in the next. With communication, change and connection being the primary triggers.

The authors make an interesting point, in the book about taking the metrics for volumes of traffic on social sites with a pinch of salt, not because of the possibility of overstatement (although that is a possibility, after all users is an easy measure for investors) but how and when the measurement is done, and even just changes in API or user process.  For example adopting an approach that drives users to just reverify their details regularly could create more user activity although deliver no more real information. Most importantly what is the value of the information/traffic to you.

Big Data info Graphic covering key points

 

 

I also love the fact that the book uses quotes from famous individuals to emphasis points, for example:

The temptation to form premature theories upon insufficient data is the bane of our profession.

– Sherlock Holmes

 

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Oracle Fusion Applications Development and Extensibility Handbook Chapters 7 & 8

01 Tuesday Apr 2014

Posted by mp3monster in Book Reviews, Books, General, Oracle, Oracle Press, Technology

≈ 4 Comments

Tags

ADF, book, CRM, EBis, extension, fusion, HCM, JDeveloper, Oracle, Oracle Fusion Applications Development, Oracle Press, review

continuing with the review of  Oracle Fusion Applications Development and Extensibility Handbook (Oracle Press), Chapters 7 & 8 get into the development side of building extensions through the use of JDeveloper and the ADF framework, although this approach is not recommended for CRM if it can be helped, bu then the Page Composer is far more powerful in the CRM context.

Chapter 7 walks you quickly through the process of establishing JDeveloper so that you can get underway with the customisation. Along the way the book references the very detailed Oracle guides and shares useful tips as well (for example how to share configuration between JDeveloper instances for connecting to a Fusion apps server without having to go through reconfiguration.

As Fusion Apps uses ADF for its framework, knowledge of this is going to help you understand more easily what is going as the book is not an ADF guide and focuses upon the use of the framework providing some honest hints and observations (e.g. it is necessary to know which task flow forms the basis of any page depending upon the product the identification of this information can be easy or difficult depending on the product).  The bulk of chapter 7 is focused to guiding you through 2 scenarios for customisation.

By the end of chapter 7, although a lot of information has been shared I’d have liked to have seen a couple of things addressed, how to minimise the risk/impact of customisation so that deploying a patch doesn’t clash or has minimal impact with any customisation. It is also too easy for organisations to customise a product to the point the C in COTs far out weighs the O and T. Remember CEMLI? The second aspect I’d hoped to have seen is the incorporation of configuration control of the development changes – but this probably more one of my pet issues showing.

Chapter 8 goes into the mechanics of developing your own UI within an Fusion App, covering DB table creation, business components, UI and so on including the security framework, creation of workflow elements and so on.  I have to admit that I found this chapter easier, than the pure customisation work of chapter 7 – although that could be because the whole mechanism is a bit more discrete.

Neither chapter really take on the question of testing (integration or unit level) – I’m sure that given all the good guidance here, that the authors have a few good practises and tricks that they could share on how to make testing as simple as possible.

Aside from a couple of small points, all said and done, the book does a tremendous job of addressing an enormous subject area, and recognises that it isn’t giving you every little detail by telling you which sections of the Fusion Developers guide will provide more detailed information. Bottom line, what the book doesn’t explain you have the insight into the official Oracle online docs to go find the rest of the information (without having to plough through a 1000+ pages of developer guide).

 

See earlier chapter reviews at:

  • Chapters 1 & 2
  • Chapters 3 & 4
  • Chapters 5 & 6

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Oracle Fusion Applications Development and Extensibility Handbook Chapters 5 & 6

31 Monday Mar 2014

Posted by mp3monster in Book Reviews, Books, General, Oracle, Oracle Press

≈ 5 Comments

Tags

book, fusion, Fusion Applications, Oracle, Oracle Press, review

Continuing with the review of Oracle Fusion Applications Development and Extensibility Handbook (Oracle Press) into Chapters 5 & 6. We start to be taken into a lot more detail on the different types of customisation. Chapters 5 & 6 looks at the page composer capabilities. Chapter 6, specifically focuses on CRM because of the differences it has, although the core principles are the same and chapter 5, tends to be look at it for everything else. For non CRM solutions the users get a limited Page Composer capability, and Administrators get a more powerful level of capabilities in the form of being able to control what information is hidden or presented. The fact that the book identifies the differences in behaviour between the likes of the  HCM and Financials etc is of serious credit to the authors as it requires a lot of effort to check and verify such differences.

The chapters although following the previous ones providing a breadth of coverage also now dive into some detailed step by step examples of customisation. The examples don’t cover every possible type of customisation, but a good example from each area for example adding details to a form and re-arrange form layout and labelling through to changing the navigation menus.  My only small criticism is that there is no clear statement about the start state (i.e. which components are deployed and their initial configuration, is there any prior data needing to be loaded etc). For me at least, I tend to look at the step by step guides as being comparable to the detail necessary to manually run test scenarios. That said, this shortcoming isn’t the end of the world and I’m sure with a standard deployment of the fusion apps to hand to experiment with you should be able follow achieve the points being demonstrated even if you have to err away from the precise actions described.

The CRM Fusion Application appears to have a lot more capability within the Composer approach to extensions with ability to develop scripts using Groovy and ADF Business Components. The definition of event triggers, simple workflows and user alerts via the likes of email.

I had hoped that the chapters would perhaps touch upon internationalisation and localisation (e.g. making labels language specific, currency presentation) but checking the Oracle documentation this is a development (JDeveloper) style activity – so I’m sure that the next chapters will address as they look at customisation from a JDeveloper perspective.

Over all a well written pair of chapters managing to walk that fine line of providing breadth of information whilst still going into enough detailed depth for you to understand what is involved in implementing these customisations.

 

See earlier chapter reviews at:

  • Chapters 1 & 2
  • Chapters 3 & 4

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Oracle Fusion Applications Development and Extensibility Handbook Chapters 3 & 4

23 Sunday Mar 2014

Posted by mp3monster in Book Reviews, Books, General, Oracle, Oracle Press, Technology

≈ 6 Comments

Tags

applications, book, flexfields, fusion, Fusion Applications, Oracle, Oracle Press, review, Security

Continuing with the review of Oracle Fusion Applications Development and Extensibility Handbook (Oracle Press) I’m going to look at chapters 3 & 4. Chapter 3 looks at the different types of Flex Fields from the well known Dynamic Flexfields (DFF) and the more advanced EFFs and KFFs (different ways to provide more advanced flex values such as linking other tables of data).

The book describes briefly the steps to utilise many of the capabilities with some screenshots but don’t mistake this for a detailed key this value followed by click that button combined with screenshots of every step for all aspects (if you did that we’d probably trying to read 5000 pages not 500). So if you want to see and feel all the different aspects explained you will need to have an instance of Fusion apps to try the techniques out with. For me, this is no bad thing, I want to understand what the capabilities are and a sense of the effort and complexity involved – if I want to have blow by blow guide I’d turn to OTN and the tutorial video clips being made available everyday by Oracle on YouTube.

The book also recognises not all strategies are available with all Fusion apps and what can therefore be done. Either by implementing the capability yourself, or asking Oracle to prioritise feature development in the Fusion apps domain.

Unusually rather than continuing with customisation capabilities in Chapter 4 we look at Security. This is no bad thing as if you want to achieve security in depth you need to understand how it can be incorporated at every level as you go rather than as an after thought at the end. But as you go through this chapter you’ll see just how central the security framework is to working with Fusion Apps.

The security perspective comes primarily from an authentication and authorisation (A&A) perspective so bringing in OAM and OID along with related tooling (including APM which is a central tool for Fusion Apps Security). The A&A framework provides an advanced hierarchy of roles and permissions as the capability to integrate extensions with it. The book again provides a solid foundation on which you can build specific implementation understanding.  Security comes in two forms – functional (i.e. restricting access to Fusion app capabilities) and data (which records a user can or cant see). The fascinating aspect for me is the data view because the different organisational possibilities that can influence the data you can or can’t see – for example by value, by internal organisational structures such as departments, by suppliers/partners/customers and so on (Oracle use the terminology of sets).

Security considerations go beyond just managing major roles, but how to autoprovision users (i.e. I create an OID entry for a new employee – how to provide them with a standard set of credentials). How to interact with Fusion Apps at the web service level from inside or outside the secured FusionApps environment.

As with Chapter 3, there are illustrations on how to establish some security settings and leverage security for your own development, but not in an exhaustive click by click manner.

Both chapters, particularly Chapter 4 introduce the ideas and approaches in a succinct manner explaining both the more well known concepts but also the more advanced capabilities along with identifying some common challenges and how they can be overcome (through the provision of tooling or technique for diagnosis).

So far this has been the best introduction to Fusion Applications I have come across.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Packt Promotion as they hit 2000 titles

20 Thursday Mar 2014

Posted by mp3monster in Books

≈ Leave a comment

Tags

books, Packt, promotion, statistics

We’ve just heard that Packt Publishing have reached 2000 titles now.  To celebrate they’re running a promotion until  26th March 2014 with a buy one get one free. The offer is unlimited within the period and the discount will appear when you checkout.  For more go to  Packt here.

Packt2KPromo

This news got me thinking I’ve contributed to the book authoring process for 5 books now – which means I’ve contributed to 0.25% of the Packt books.  Reviewing a book takes on average 4 hours per chapter and most Packt books comes with 10-12 chapters. If it takes 4 times longer to write a chapter (16 hours) that’s 160 hours per book and 32,000 hours of authoring effort in the Packt library, which equates to over 3 1/2 years of non stop writing.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Enterprise Security – A Data Centric Approach to Securing the Enterprise – A Slight Return

13 Thursday Mar 2014

Posted by mp3monster in Books, General, mindmap, Technology

≈ Leave a comment

Tags

Aaron Woody, data centric, mindmap, Security, xmind

A while back I reviewed the excellent book Enterprise Security: A Data-Centric Approach to Securing the Enterprise.  I had mentioned that I would in due course make a mindmap available based on my reading of the book as I use mindmaps as a memory jog when I need to go back to referencable material.

Well I have made by first cut of the mind map – which can be found with my shared mindmaps here. I shall be updating it and adding details, so it is worth checking back.

As WordPress prevents embedding iframes – I can only offer an image here – but the mindmap toolsite provides a fully interactive view to the mindmap.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Oracle Fusion Applications Development and Extensibility Handbook – review Chapters 1 & 2

13 Thursday Mar 2014

Posted by mp3monster in Book Reviews, Books, General, Oracle, Oracle Press, Technology

≈ 6 Comments

Tags

applications, development, extensibility, fusion, Oracle, Vlad Ajvaz

So I’ve got through the first couple of chapters of Oracle Fusion Applications Development and Extensibility Handbook (Oracle Press). The book starts with a presumption of minimal knowledge so the first chapter provides an excellent high level overview on the framework and assembly of Fusion Applications and some of the principles such as Weblogic node management. Although an appreciation of non Fusion Apps will give you a sense of some ideas such as Flexfields would be useful at this stage, but they are explained in a lot more depth later on.

Chapter 2 moves onto the different kinds of customisation that can be performed and how those customisations are achieved from user configuration through to tools in the Fusion Apps and onto JDeveloper and the Fusion Apps libraries. The interesting thing is that all though it is clear a lot of work has gone into managing the dev and test cycles on a shared Fusion Apps platform including potential change conflict management there seems to be little for direct linkage or built in configuration management.

In terms of a book, it has started very well, providing a sense of over all shape of Fusion Apps in a very readable and informative  manner.  I think this is going to be a informative & easy read.

Oracle Fusion Apps at Google

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Next book review – Oracle Fusion Applications

05 Wednesday Feb 2014

Posted by mp3monster in Books, General

≈ Leave a comment

Tags

applications, books, extensibility, fusion, handbook, Oracle, Vladimir Ajvaz

The next book up for review is going to be Oracle Fusion Applications Development and Extensibility Handbook (Oracle Press)

I have to declare a slight interest in my reviewing as I have had the good fortune to work with one of the authors- Vladimir Ajvaz; and extremely knowledgeable and talented Application Architect.

Oracle Fusion Applications

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Enterprise Security – A Data Centric Approach – A brief review

05 Wednesday Feb 2014

Posted by mp3monster in Book Reviews, Books, General, Packt, Technology

≈ Leave a comment

Tags

Aaron Woody, book, data, datasec, enterprise, Packt, review, Security

So I have previously blogged a series of largely chapter by chapter reviews of Aaron Woody’s book Enterprise Security – A Data Centric Approach. This post tries to provide a brief summarised view pulling my thoughts of the book overall together.

As an Enterprise Architect I took an interest in this book as an opportunity to validate my understanding of security and ensure in the design and guidance work that I do I am providing good insights and directions so that the application architects and developers are both ensuring good security practices and also asking the helpful information available to other teams such as IT Security, operational support and so on.

The book has been overall very well written and extremely accessible to even those not versed in the dark arts of IT Security. Anyone in my position, or fulfilling a role as an application designer or product development manager would really benefit from this book. Even those on the business end of IT would probably benefit in terms of garnering an insight into what IT Security should be seeking to achieve and why they often appear to make lives more difficult (I.e. putting restrictions in, perhaps blocking your favourite websites).

So why so helpful, well Aaron has explained the issues and challenges that need to be confronted in terms of Security from the perspective of the organisations key assets – mainly its data (certainly the asset that is likely to cause most visible problems if compromised). Not only that the book presents a framework to help qualify and quantify the risks as a result device a justifiable approach to securing the data and most importantly make defensible cases for budget spend.

I have to admit that the 1st chapter that that introduces the initial step in the strategy was a bit of a struggle as it seemed to adopt and try to define a view of the world that felt a little too simplistic. The truth is that this the 1st step in a journey, and in hindsight important – so stick with it.

Once the basic framework is in place we start looking at tooling strategies and technologies to start facilitating security. The book addresses categories of product rather than specific solutions so the book isn’t going to date too quickly. The solution examination includes the pros and cons of their use (e.g wifi lock down) which is very helpful.

Finally to really help the book comes with a rich set of appendices providing a raft of references to additional material that will help people translate principles into practice.

To conclude, a little effort maybe needed to get you started but ultimately a well written, informative, information rich book on security.

Previous blog entries:

  • Chapter 1
  • Chapter 2
  • Chapter 3
  • Chapter 4
  • Chapter 5 & 6
  • Chapter 7 & 8
  • Final Chapter

There is also a supporting website for the book athttp://www.datacentricsec.com/
Enterprise Security - A Data Centric Approach

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Enterprise Security – A Data Centric Approach – the final chapter

05 Wednesday Feb 2014

Posted by mp3monster in Book Reviews, Books, General, Packt, Technology

≈ 1 Comment

Tags

Aaron Woody, book, data, enterprise, Packt, review, Security

so I have reached the final chapter of the book which covers the handling of security events and security incidents (the differentiation of the two being the consequences of the event – a piece of malware being detected on a desktop can an event as the consequences are relatively trivial compared to the defacing of an e’tailer’s website).

I have to admit I glossed through this chapter as my role within an organisation doesn’t demand the operational management of issues. That said, the book provides some clear guidance on how to develop a process to support the handling of a security issue – important as you don’t want be figuring these things out when something happens, you want to get on and focus on execution. s with previous chapters, this well written and doesn’t demand knowledge of security dark arts to get to grips with.

The book finishes with a series of appendices which provides some illustrative information for chapters in the book, plus a series of appendices of really useful additional reference information sites cover a spectrum of information from security education resources to security tools.

This series of blogs on this book will wrapped up with a short review of the whole book. But I would like to congratulate Aaron Woody on a fine book rich with helpful additional information.

Previous blog entries:

  • Chapter 1
  • Chapter 2
  • Chapter 3
  • Chapter 4
  • Chapter 5 & 6
  • Chapter 7 & 8

There is also a supporting website for the book athttp://www.datacentricsec.com/
Enterprise Security - A Data Centric Approach

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Print (Opens in new window) Print
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Pinterest (Opens in new window) Pinterest
  • More
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...
← Older posts
Newer posts →

    I work for Oracle, all opinions here are my own & do not necessarily reflect the views of Oracle

    • About
      • Internet Profile
      • Music Buying
      • Presenting Activities
    • Books & Publications
      • Logging in Action with Fluentd, Kubernetes and More
      • Logs and Telemetry using Fluent Bit
      • Oracle Integration
      • API & API Platform
        • API Useful Resources
        • Useful Reading Sources
    • Mindmaps Index
    • Monster On Music
      • Music Listening
      • Music Reading
    • Oracle Resources
    • Useful Tech Resources
      • Fluentd & Fluent Bit Additional stuff
        • Logging Frameworks and Fluent Bit and Fluentd connectivity
        • REGEX for BIC and IBAN processing
      • Formatting etc
      • Java and Graal Useful Links
      • Official Sources for Product Logos
      • Python Setup & related tips
      • Recommended Tech Podcasts

    Oracle Ace Director Alumni

    TOGAF 9

    Logs and Telemetry using Fluent Bit


    Logging in Action — Fluentd

    Logging in Action with Fluentd


    Oracle Cloud Integration Book


    API Platform Book


    Oracle Dev Meetup London

    Blog Categories

    • App Ideas
    • Books
      • Book Reviews
      • manning
      • Oracle Press
      • Packt
    • Enterprise architecture
    • General
      • economy
      • ExternalWebPublications
      • LinkedIn
      • Website
    • Music
      • Music Resources
      • Music Reviews
    • Photography
    • Podcasts
    • Technology
      • AI
      • APIs & microservices
      • chatbots
      • Cloud
      • Cloud Native
      • Dev Meetup
      • development
        • languages
          • java
          • node.js
          • python
      • drone
      • Fluentbit
      • Fluentd
      • logsimulator
      • mindmap
      • OMESA
      • Oracle
        • API Platform CS
          • tools
        • Helidon
        • ITSO & OEAF
        • Java Cloud
        • NodeJS Cloud
        • OIC – ICS
        • Oracle Cloud Native
        • OUG
      • railroad diagrams
      • TOGAF
    • xxRetired
    • AI
    • API Platform CS
    • APIs & microservices
    • App Ideas
    • Book Reviews
    • Books
    • chatbots
    • Cloud
    • Cloud Native
    • Dev Meetup
    • development
    • drone
    • economy
    • Enterprise architecture
    • ExternalWebPublications
    • Fluentbit
    • Fluentd
    • General
    • Helidon
    • ITSO & OEAF
    • java
    • Java Cloud
    • languages
    • LinkedIn
    • logsimulator
    • manning
    • mindmap
    • Music
    • Music Resources
    • Music Reviews
    • node.js
    • NodeJS Cloud
    • OIC – ICS
    • OMESA
    • Oracle
    • Oracle Cloud Native
    • Oracle Press
    • OUG
    • Packt
    • Photography
    • Podcasts
    • python
    • railroad diagrams
    • Technology
    • TOGAF
    • tools
    • Website
    • xxRetired

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 2,556 other subscribers

    RSS

    RSS Feed RSS - Posts

    RSS Feed RSS - Comments

    March 2026
    M T W T F S S
     1
    2345678
    9101112131415
    16171819202122
    23242526272829
    3031  
    « Feb    

    Twitter

    Tweets by mp3monster

    History

    Speaker Recognition

    Open Source Summit Speaker

    Flickr Pics

    Gogo Penguin at the BarbicanGogo Penguin at the BarbicanGogo Penguin at the BarbicanGogo Penguin at the Barbican
    More Photos

    Social

    • View @mp3monster’s profile on Twitter
    • View philwilkins’s profile on LinkedIn
    • View mp3monster’s profile on GitHub
    • View mp3monster’s profile on Flickr
    • View mp3muncher’s profile on WordPress.org
    • View philmp3monster’s profile on Twitch
    Follow Phil (aka MP3Monster)'s Blog on WordPress.com

    Blog at WordPress.com.

    • Subscribe Subscribed
      • Phil (aka MP3Monster)'s Blog
      • Join 234 other subscribers
      • Already have a WordPress.com account? Log in now.
      • Phil (aka MP3Monster)'s Blog
      • Subscribe Subscribed
      • Sign up
      • Log in
      • Report this content
      • View site in Reader
      • Manage subscriptions
      • Collapse this bar
     

    Loading Comments...
     

    You must be logged in to post a comment.

      Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
      To find out more, including how to control cookies, see here: Our Cookie Policy
      %d