Votre navigateur est obsolète !

Pour une expériencenet et une sécurité optimale, mettez à jour votre navigateur. Mettre à jour maintenant

×

Aswin Adireddy

Aswin Adireddy

Architecte et Developpeur Java/J2ee

40 ans
Inde
En recherche d'emploi Ouvert aux opportunités
Je suis un architecte et développeur Java avec une expérience globale de plus de 11 ans.

Mon expertise de base est dans le développement Java et la gestion de produits dans le secteur de l'authentification à des base de données Data-Science

En tant que technophile, je suis passionné par le développement de prototypes et d'intégrations avec des technologies open source et tendances, pour évaluer les avantages et les inconvénients des piles de logiciels, produire des solutions, gérer le développement du cycle de vie des produits et donc espérer que je peux ajouter de la valeur à votre organisation.
CV réalisé sur DoYouBuzz
  • Product Owner / Lead / Developpeur -
  • Évaluation de la sécurité des produits - RSA Authentication Manager v8.2 (SecurID)
  • Intégration d'algorithmes Datascience
  • Ingénierie continue de produits (CE) et gestion des correctifs - RSA AxM Server v6.2.2.x / Application Server Agents v5.0.x / RSA FIM v4.2.2.x
  • Management d 'une équipe de 6 membres (AxM) / 4 membres (FIM), participer à la collecte des exigences et aux discussions architecturales sur les demandes d'améliorations (RFE), effectuer des revues de code et la gestion des correctifs, l'évaluation des vulnérabilités et des risques et l'ingénierie des versions des produits.
  • Developpement Java methode Scrum, Sprints périodiques, tests fonctionnels de l'intégration des clients Office 365 on-domaine et off-domaine, des documents de conception documentés dans le wiki Jira.
  • Livraison de correctifs de défauts et de sécurité sous forme de correctifs (Patch Installers) sur une base régulière, gestion des escalades de clients et représentation de l'équipe dans les discussions entre les équipes fonctionnelles (CFT).
  • Environnement technique :Java, Javascript, Unix Shell Scripting / SAML, WS-FED, JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentification, RSA Authentication Manager(SecurID) / ADFS, WSO2, Shibboleth / RSA Bsafe, BouncyCastle / Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
Détails de l'expérience
  • Project #1:
    RSA Access Manager Server (AxM) is a web access management solution, which assists in managing risk by securing applications, websites and other web based resources via intranets, extranets, B2B and B2C infrastructures. It has 3 main components, Server, Application Server Agents and WebServer Agents which enable it to centrally manage policies and the lifecycle of an online identity.
    RSA Federation Identity Manager (FIM) is single sign-on(SSO) solution enabling cross domain federation using open standards like SAML, SOAP and WS-FED.
  • Context #1:
    Product Continuous Engineering (CE) and Patch Management - RSA AxM Server v6.2.x / Application Server Agents v5.0.x / RSA FIM v4.2.x
  • Actions #1:
    Lead team of 6 (AxM) / 4 (FIM) members, Involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, perform code reviews and patch release management, vulnerability & risk assessment and product release engineering.
  • Results #1:
    Released defect and security fixes as hotfixes (Patch Installers) on a regular basis, handled customer escalations and represented team in cross functional team(CFT) discussions.
  • Technical Environment #1:
    Java, Javascript, Unix Shell Scripting / SAML, WS-FED, JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentication, RSA Authentication Manager(SecurID) / ADFS, WSO2, Shibboleth / RSA Bsafe, BouncyCastle / Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
  • Project #2:
    RSA SecurID Access, is next generation Identity as a Service (IdaaS) solution. A cloud based identity and access management,lifecycle and governance platform enabling non-SAML legacy on-premise applications to extend their SSO capabilities to the cloud.
  • Context #2:
    Product Development and Release Engineering - RSA SecurID Access v1.x
  • Actions #2:
    Scrum Developer in a team of 5 members, Worked on Office 365 integration story and encryption settings epic for registering new clients to identity router, debugged and fixed issues on identity router module.
  • Results #2:
    Delivered stories and epics for periodic sprints, handled functional testing of integration of Office 365 on-domain and off-domain clients, documented design documents in Jira wiki.
  • Technical Environment #2:
    Java / SAML, WS-FED/ Linux-Mint / Spring, Hibernate, Log4J / RSA Authentication Manager(SecurID) / Active Directory DS, ADFS/ Office 365 / RSA Bsafe / Cisco AnyConnect, VMware Workstation, OpenSSL, PKI / Apache Http Server, Apache Tomcat / MySQL / JUnit, Selenium / Maven / Git / Nexus, Artifactory / Jenkins / JIRA, Slack/ IntelliJ
  • Project #3:
    RSA Authentication Manager is the platform behind RSA SecurID® that allows for centralized management of the RSA SecurID environment, which includes authentication methods, users, applications and agents across multiple physical sites.
  • Context #3:
    Product Security Assessment - RSA Authentication Manager v8.2
  • Actions #3:
    Analyse Fortify static analysis reports
  • Results #3:
    Traiged defects and provided remediations to the development team.
  • Technical Environment #3:
    Java / RSA Authentication Manager(SecurID) / Cisco AnyConnect / JIRA/ Fortify / OWASP
Description de l'entreprise
RSA, un leader mondial de la cybersécurité qui fournit des solutions d'entreprise Security™, aide les organisations à prospérer dans un monde incertain et à haut risque.
Site web de l'entreprise
  • Ingénierie continue des produits (CE) et gestion des correctifs
  • Intégration de l'authentification forte RSA
  • Impliqué dans les discussions architecturales pour l'intégration de RSA SecurID Multi-Factor Authentication,
  • Management de l'équipe de 8 membres, des développeurs et des testeurs,
  • Livraison RSA AxM v6.2.4, analyse et fourniture des correctifs pour diverses vulnérabilités dont FREAK, POODLE, LogJam et Triple-Handshake SSLJ Vulnerability,
  • Livraison des correctifs de défauts et de sécurité sous forme de correctifs (Patch Installers) sur une base régulière, gestion des escalades de clients et représentation de l'équipe dans les discussions avec les équipes fonctionnelles (CFT).
  • Documentation sur l'étude de faisabilité de l'intégration,
  • Environnement technique:Java, Javascript, Unix Shell Scripting / JCE, XML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentication, RSA Authentication Manager(SecurID) / RSA Bsafe/ Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI / Apache Http Server /Oracle, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, NVD, OWASP, PMD, Checkstyle / Clover / Eclipse / SDL Threat Modelling Tool
Détails de l'expérience
  • Project #1:
    RSA AxM Server v6.2 Service Pack Release 4
  • Context #1:
    Product Development and Release Engineering - RSA AxM 6.2.4
  • Actions #1:
    Lead team of 8 members including developers and testers, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, create required Product Requirement Dociment (PRD), Software Requirement Specification (SRS) and Software Analysis Design (SAD) documents for features, delegate tasks to team members, develop features, perform code review, coordinate product release.
  • Results #1:
    Delivered RSA AxM v6.2.4 release, analysed and provided fixes for various vulnerabilities including FREAK, POODLE, LogJam and Triple-Handshake SSLJ Vulnerability, coordinated qualification of new platforms & datastores, defect & hotfix roll-ups and 3rd party library upgrades, coordinated the product security assessment program for release readiness involving product network scans, threat model diagrams, static code analysis review and triage, demonstration of features to CFTs.
  • Technical Environment #1:
    Java, Javascript, Unix Shell Scripting / JCE, XML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentication, RSA Authentication Manager(SecurID) / RSA Bsafe/ Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI / Apache Http Server /Oracle, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, NVD, OWASP, PMD, Checkstyle / Clover / Eclipse/ SDL Threat Modelling Tool
  • Project #2:
    RSA AxM Server v6.1.x/v6.2.x , AxM Application Server Agents v4.7.x/v5.0.x, RSA FIM v4.2.x
  • Context #2:
    Product Continuous Engineering (CE) and Patch Management
  • Actions #2:
    Lead team of 8 (AxM) / 2 (AxM Application Server Agents) / 4 (FIM) members, Involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, perform code reviews and patch release management, vulnerability & risk assessment and product release engineering, coordinate weekly stand-ups.
  • Results #2:
    Released defect and security fixes as hotfixes (Patch Installers) on a regular basis, handled customer escalations and represented team in cross functional team(CFT) discussions.
  • Technical Environment #2:
    Java, Javascript, Unix Shell Scripting / SAML, WS-FED, JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentication, RSA Authentication Manager(SecurID) / ADFS, WSO2, Shibboleth / RSA Bsafe, BouncyCastle / Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
  • Project #3:
    EMC LifeCare™ Platform
  • Context #3:
    Integration of RSA strong authentication
  • Actions #3:
    Involved in the architectural discussions for integration of RSA SecurID Multi-Factor Authentication, interact with 3rd party service providers on webservices security, federation and deployment best practices.
  • Results #3:
    Documented the feasibility study of integration, provided guidance on integrating OWASP token based security for 3rd party vendor web service calls and use of SAML SP initiated flows for invoking cross domain federation flows.
  • Technical Environment #3:
    Java / SAML, XML, SOAP / RSA Authentication Manager(SecurID) / OWASP
Description de l'entreprise
RSA, a global cybersecurity leader delivering Business-Driven Security™ solutions, helps organizations thrive in an uncertain, high-risk world.
Site web de l'entreprise
  • Développement de produits et ingénierie des versions
  • Développeur Java dans une équipe de 12 membres,
  • Développement de prototype - L'objectif était de soutenir SAML 2.0 en tant que fournisseur de services (SP).
  • Participation aux discussions architecturales sur les exigences de SAML SP et le déploiement de proxy inversé.
  • Conception du modèle de classe de haut niveau pour le SAML SP et création d'un projet de squelette avec les interfaces nécessaires et le système de construction Gradle.
  • Environnement technique :Java, Javascript, Unix Shell Scripting / SAML, WS-FED, JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentification, RSA Authentication Manager(SecurID) / ADFS, WSO2, Shibboleth / RSA Bsafe, BouncyCastle / Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
Détails de l'expérience
  • Project #1:
    RSA AxM Server v6.2 / Application Server Agent v5.0 & RSA FIM v4.2 Major Releases.
    RSA AxM Server v6.2.1, v6.2.2, v6.2.3 / Application Server Agent v4.7.1, v5.0.1 & RSA FIM v4.2.1 Service Pack Releases.
  • Context #1:
    Product Development and Release Engineering
  • Actions #1:
    Developer in a team of 12 members, Lead team of 5 (AxM Application Server Agents) / 4 (FIM) members, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, create required Product Requirement Dociment (PRD), Software Requirement Specification (SRS) and Software Analysis Design (SAD) documents for features, delegate tasks to team members, develop features, perform code review, coordinate product release, provide documentation updates for various product guides
  • Results #1:
    Delivered RSA AxM v6.2/v6.2.1/v6.2.2/v6.2.3, AxM Application Server Agents v4.7.1/v5.0, FIM v4.2/v4.2.1 releases, design and development of Crypto and Lockbox utilities for AxM Server component using RSA Bsafe and EMC CST toolkit, design and development of Application Server Agents for JBoss, development of installer workflows, developed i18n support for RSA AxM Self-Service feature, review of User Acceptance Test-cases, implementation of Threat Model diagrams, review and triage of Fortify scan reports, implement enhancements on SAML1.1/2.0 and WS-FED flows, upgraded FIM ANT build scripts with Apache IVY to provide dependency management, create maven build management scripts for Application Server Agents, participate in Penetration Testing architectural discussions with 3rd part vendor, collaborated on the integration with Office-365
  • Technical Environment #1:
    Java, Javascript, Unix Shell Scripting / SAML, WS-FED, JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentication, RSA Authentication Manager(SecurID) / ADFS, WSO2, Shibboleth / RSA Bsafe, BouncyCastle / Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
  • Project #2:
    RSA AxM Server v6.1.x/v6.2.x, Application Server Agent v4.7.x/v5.0.x and RSA FIM v4.1.x/v4.2.x
  • Context #2:
    Product Continuous Engineering (CE) and Patch Management
  • Actions #2:
    Developer for AxM Server in a team of 12 member / Lead team of 5 (AxM Application Server Agents) & 4 (FIM) members, Involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, perform code reviews and patch release management, vulnerability & risk assessment and product release engineering, coordinate weekly stand-ups.
  • Results #2:
    Released defect and security fixes as hotfixes (Patch Installers) on a regular basis, handled customer escalations and represented team in cross functional team(CFT) discussions.
  • Technical Environment #2:
    Java, Javascript, Unix Shell Scripting / SAML, WS-FED, JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Adaptive Authentication, RSA Authentication Manager(SecurID) / ADFS, WSO2, Shibboleth / RSA Bsafe, BouncyCastle / Cisco AnyConnect, VMware ESX Server, VMware Horizon View, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
  • Project #3:
    Graphene, a reverse proxy solution implemented as a rails app deployed in Phusion Passenger integrated with Nginx Reverse Proxy Server.
  • Context #3:
    Prototype Development - The focus was to support SAML 2.0 as a Service Provider (SP).
  • Actions #3:
    Involved in the architectural discussions for SAML SP requirements and reverse proxy deployment considerations.
  • Results #3:
    Designed the high-level class model for the SAML SP and created a skeleton project with necessary interfaces and backing Gradle build system.
  • Technical Environment #3:
    UML / SAML2.0 / Gradle / Eclipse
Description de l'entreprise
RSA, a global cybersecurity leader delivering Business-Driven Security™ solutions, helps organizations thrive in an uncertain, high-risk world.
Site web de l'entreprise
  • Développeur au sein d'une équipe de 18 membres
  • Livraison RSA AxM v6.1/v6.1.1/v6.1.1/v6.1.1.2/v6.1.1.3/v6.1.4, AxM Application Server Agents v4.7
  • Réalisation de corrections de défauts de code et de defauts de sécurité en tant que correctifs (Patch Installers) sur une base régulière.
  • Environnement technique:Java, Javascript, Unix Shell Scripting / JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Authentication Manager(SecurID) / RSA Bsafe/ Cisco AnyConnect, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
Détails de l'expérience
  • Project #1:
    RSA AxM Server v6.1 / Application Server Agent v4.7 Major Release RSA AxM Server v6.1.1, v6.1.2, v6.1.3 & v6.1.4 Service Pack Releases.
  • Context #1:
    Product Development and Release Engineering - RSA AxM
  • Actions #1:
    Developer in a team of 18 members, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, create Software Requirement Specification (SRS) and Software Analysis Design (SAD) documents for features, develop and unit test features, provide documentation updates for various product guides
  • Results #1:
    Delivered RSA AxM v6.1/v6.1.1/v6.1.2/v6.1.3/v6.1.4, AxM Application Server Agents v4.7 releases, designed and developed LDAP referral binding and Secure Delegated Impersonation features, handled Request for Enhancement - email notification support for protected URL cache leaks, Socket Connection Pool to handle the number of traps sent by the server and FIPS-140 requirements, worked on building installer workflows using InstallShield and Unix Shell Scripting, migrated Ant build scripts to Maven, API and Functional testing of features on multiple platforms, handled release engineering build issues for AxM v6.1.4 on Windows64, RHEL64 and Solaris64 platforms, handled AxM URI vulnerability fix by normalising the URL to construct a java.net.URI, handled enhancements to the JACC interfaces to handle seamless SSO between AxM Web Server Agents and Application Server Agents.
  • Technical Environment #1:
    Java, Javascript, Unix Shell Scripting / JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Authentication Manager(SecurID)/ RSA Bsafe/ Cisco AnyConnect, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
  • Project #2:
    RSA AxM Server v6.0.x / v6.1.x and Application Server Agent v4.5/v4.7
  • Context #2:
    Product Continuous Engineering (CE) and Patch Management
  • Actions #2:
    Developer for AxM Server in a team of 18 members, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, patch release management, product release engineering, participate in weekly stand-ups.
  • Results #2:
    Released defect and security fixes as hotfixes (Patch Installers) on a regular basis.
  • Technical Environment #2:
    Java, Javascript, Unix Shell Scripting / JAAS, JACC, JCE, XML, JAXWS, CSS, HTML /Windows, RHEL, Solaris Sparc, AIX / Struts, SNMP4J, Log4J / RSA Authentication Manager(SecurID) / RSA Bsafe/ Cisco AnyConnect, VMware Workstation, JMX, OpenSSL, PKI, Keytool / Apache-IBM Http Server, Microsoft IIS, Websphere, Weblogic, Wildfly Application Server, Apache Tomcat /Oracle, MySQL, PostgreSQL /Active Directory, OpenDJ / JUnit, Selenium, JMeter / Ant, Ivy, Maven / JVisualVM / Perforce / Nexus, Artifactory /Jenkins / JIRA / Fortify, PMD, Checkstyle / Clover / Eclipse
Description de l'entreprise
RSA, a global cybersecurity leader delivering Business-Driven Security™ solutions, helps organizations thrive in an uncertain, high-risk world.
Site web de l'entreprise
  • Developpeur java certifié IBM Solution
  • Conception et développement d'interfaces pour les sous-systèmes utilisant l'architecture des composants de service (SCA) et le modèle d'objet de données de service (SDO).
  • Analyse de faisabilité et des exigences, spécification UML - Cas d'utilisation et diagrammes de classes, conception et développement d'interfaces, modélisation et optimisation des flux de travail, intégration des services.
  • Workflow Modelling and Optimisation using Websphere Business Modeler
  • Développement de module dans le contexte SOA.
  • Environnement technique :Java/ EJB, XML, JAXWS, CSS, HTML /Struts, JSF, Log4J / Websphere Application Server, Apache Tomcat / Websphere Process Server, Websphere Business Modeler / Oracle / Junit/ Ant/ CVS / IBM Rational Application Developer.
Détails de l'expérience
  • Project #1:
    Next Generation Banking Systems, CITCO – is a Custodial Services application that can cater to the growing demands of the online banking and custodial services industry.
  • Context #1:
    Develop BPEL workflows using SOA principles and optimise workflows through modelling.
  • Actions #1:
    Feasibility and Requirement analysis, UML specification - Use-case and Class Diagrams, Interface design and development, model and optimise workflows, integrate services.
  • Results #1:
    Used Websphere Process Server to design and develop workflows using SCA and SDO programming models.
  • Technical Environment #1:
    Java/ EJB, XML, JAXWS, CSS, HTML /Struts, JSF, Log4J / Websphere Application Server, Apache Tomcat / Websphere Process Server, Websphere Business Modeler / Oracle / Junit/ Ant/ CVS / IBM Rational Application Developer
  • Project #2:
    UniFy, Emirates Bank Group- is a centralised group level integrated solution EBG UniFy to automate and manage its Enterprise Financial Management (EFM) processes
  • Context #2:
    Develop Modules in SOA context.
  • Actions #2:
    Feasibility and Requirement analysis, UML specification - Use-case and Class Diagrams, develop modular services
  • Results #2:
    Developed modular reusable logging and exception handling utility/ GUI and Database Design
  • Technical Environment #2:
    Java/ EJB, XML, JAXWS, CSS, HTML /Struts, JSF, Log4J / Apache Tomcat / Tibco Business Works / Oracle / Junit/ Ant/ CVS / Eclipse
Description de l'entreprise
Satyam Computer Services Limited is a global consulting and IT services company, offering a wide array of solutions, from strategy consulting right through to implementing IT solutions for customers.
Site web de l'entreprise