jueves, 28 de julio de 2016

FBI Hiring First-Ever Senior Level Data Scientist

July 28, 2016
Source: FBI Site

The FBI is hiring its first senior level data scientist (SLDS) position and is currently seeking applicants across both public and private sectors. The new SLDS will serve as a senior-level adviser and consultant to the Cyber Division Assistant Director and other management officials, contributing across the Cyber Division and Bureau through collaboration, innovation, and subject matter expertise. The addition of a senior-level position acknowledges the growing cyber threat, which is a top priority threat for the FBI, and reflects equitable distribution of sophisticated senior talent across the FBI.

“The addition of a senior-level position within the Cyber Division is unprecedented, and we are eagerly anticipating the ways it will contribute to our mission to identify, pursue, and defeat cyber adversaries. With the breadth and depth of skills and expertise we’re expecting in our candidates, this new position will have a unique opportunity to brand the FBI’s cyber program and represent the FBI throughout the Intelligence Community,” said James C. Trainor, Jr., assistant director of the FBI’s Cyber Division. “We are excited to see how the division will continue to evolve to combat the cyber threat with the assistance of the new senior level data scientist.”

The FBI is seeking individuals from both the public and private sector with experience and skills in computer science and data analytics, as well as subject matter expertise in cyber security, data visualization, data mining, and computer networking. This position will pioneer the FBI’s technology solutions and strategically work to develop and employ new processes, outline enterprise requirement and solutions, and streamline technology program management.

The senior level data scientist will provide technical and operational guidance, evaluate the cyber program business architecture, pioneer the Bureau’s technology solutions, provide strategic planning and engineering services for technology solutions and standards, and represent the FBI on groups sponsored by the Intelligence Community and other partners.


Resources:

miércoles, 27 de julio de 2016

ODTUG Announces the First Annual GeekAThon!What Is a GeekAThon?



2017 Geekathon AT.jpg
A GeekAThon is a contest in which players compete by building something using technology. The idea for ODTUG to host a GeekAThon comes to us from the great minds of ODTUG Board of Directors members Danny Bryant and Opal Alapat.

What Technology Is ODTUG Featuring? BEACONS! 


Beacons use a Bluetooth Low Energy (BLE) technology that sends signals to receivers. Their sole purpose in life is to transmit the message "I am here" to some type of receiving object. At Kscope16, attendees had beacons attached to their name badges that provided room counts for sessions and exhibit hall traffic. The question was then raised, "What else can we do with beacons?" That is where you come in and the fun really begins! 

ODTUG's GeekAThon 

The team decided to keep the format open for this first year, so we're opting for aMaker Faire approach. Contestants will use the Kscope16 beacon to solve a problem of their choosing. You can hack the beacon, repurpose the BLE signal, and/or build a new object of your choice. Beyond a few ground rules, the biggest limiting factor will be time. Maker contestants will get at least six weeks to build their solution and can work by themselves or in teams. You don't need to have attended Kscope16 to participate; a beacon can be provided to you. 

How Do I Participate?

For more information on eligibility, guidelines, and how to enter ODTUG's GeekAThon, see our blog post and stay tuned for the launch of the competition website. Bragging rights and prizes will be awarded, so you should take the plunge and enter.

Need More Info?

Join Danny and Opal this Friday, July 29, at 1:00 PM EDT for our first in a series of GeekAThon lunch-and-learn webinars. Register today and get your questions answered!

We can't wait to see what you come up with!

Acuerdo sobre datos de ciudadanos crea polémica en Argentina

Mediante el convenio, el Gobierno tendrá acceso a datos de seguridad social. La expresidenta Cristina Fernández fustigó la medida y acusó al actual Gobierno de "Estado policial". Autoridades rechazan la acusación.
Fuente: dw.com

La expresidenta de Argentina Cristina Fernández de Kirchner (2007-2015) afirmó hoy que el Gobierno de Mauricio Macri quiere "vigilar y controlar" a ciudadanos a través del uso de la base de datos del sistema de la seguridad social, iniciativa a la que calificó como un "Estado policial".

Este martes, el Ejecutivo y sectores de la oposición polemizaron sobre la firma de un convenio entre la Administración Nacional de la Seguridad Social (Anses) y la Secretaría de Comunicación Pública, que depende de la Jefatura de Gabinete de Ministros.

Este permite al Gobierno acceder y utilizar la base de datos de todos los ciudadanos inscritos en la seguridad social.

"Tu nombre, tu DNI, tu CUIT/CUIL, domicilio, tus teléfonos, tus mails, fecha de nacimiento, estado civil, estudios... En síntesis: tu vida y la de más de 30.000.000 de argentinos en manos de la Jefatura de Gabinete de Ministros", critica la expresidenta en un escrito en su cuenta de Facebook.

Fernández añade que el Gobierno "dice" que quiere "los datos de tu vida para 'mejorar' su política de comunicación", a lo que ella añade que lo que deberían hacer es "mejorar sus políticas", para que a los ciudadanos les vaya "mejor" en su vida.

"Pero es una opinión más", matiza, antes de agregar que ha leído "muchas declaraciones calificando dicho convenio de una clara violación a la Ley de Protección de Datos Personales".

"Y tienen razón. Además, afirman que va ser utilizada para campaña a favor del Gobierno... Sinceramente, no creo que solo sea para suplir a través del marketing tecnológico, la falta de políticas. Tampoco creo que solo sea segmentación, uno de los pilares de la publicidad, para focalizarla por grupos", remarca.

El Gobierno se defiende

En su opinión, los legisladores y legisladoras "deberían mirar con mucha atención" el funcionamiento de los organismos de seguridad e inteligencia, que "ha sido modificado", así como el proyecto de Ley de Reforma Electoral, y muy especialmente la parte de" boleta electrónica",

"¿Por qué? Simple. Con datos de Anses y un buen software se puede elaborar una plataforma de metadatos que permitan conocer tus costumbres, tus gustos, contactos, inclinaciones, actividades, etc. No solo van a saber todo lo que haces. Te van a vigilar y controlar. Estado policial", asevera.

Ante la polémica, el jefe de Gabinete, Marcos Peña, aseguró este martes que el convenio contribuirá a mejorar la información sobre los servicios que el Estado presta a los ciudadanos y señaló que será ejecutado de manera transparente y sin ninguna finalidad política.

"De ninguna manera se prevé utilizar información confidencial o que vulnere la intimidad del ciudadano", indicó.

EL(efe, CFK)

FBI: Going Dark

Source: FBI Site

Law enforcement at all levels has the legal authority to intercept and access communications and information pursuant to court orders, but it often lacks the technical ability to carry out those orders because of a fundamental shift in communications services and technologies. This scenario is often called the “Going Dark” problem.

Law enforcement faces two distinct Going Dark challenges. The first concerns real-time court-ordered interception of data in motion, such as phone calls, e-mail, text messages, and chat sessions. The second challenge concerns “data at rest”—court-ordered access to data stored on devices, like e-mail, text messages, photos, and videos. Both real-time communications and stored data are increasingly difficult for law enforcement to obtain with a court order or warrant. This is eroding law enforcement’s ability to quickly obtain valuable information that may be used to identity and save victims, reveal evidence to convict perpetrators, or exonerate the innocent.

Make no mistake, the FBI supports strong encryption, and we know firsthand the damage that can be caused by vulnerable and insecure systems. As such, the Department of Justice, the FBI, and other law enforcement agencies are on the front lines of the fight against cyber crime. The government uses strong encryption to secure its own electronic information, and it encourages the private sector and members of the public to do the same.

However, the challenges faced by law enforcement to lawfully and quickly obtain valuable information are getting worse. The Communications Assistance for Law Enforcement Act (CALEA) was enacted in 1994 and applies only to traditional telecommunications carriers, providers of interconnected voice over internet protocol (VoIP) services, and providers of broadband access services. Currently thousands of companies provide some form of communication service, and most are not required by CALEA to develop lawful intercept capabilities for law enforcement. As a result, many of today’s communication services are developed and deployed without consideration of law enforcement’s lawful intercept and evidence collection needs.

When changes in technology hinder law enforcement’s ability to exercise investigative tools and follow critical leads, we may not be able to root out the child predators hiding in the shadows of the Internet, or find and arrest violent criminals who are targeting our neighborhoods. We may not be able to identify and stop terrorists who are using social media to recruit, plan, and execute an attack in our country. We may not be able to recover critical information from a device that belongs to a victim who cannot provide us with the password, especially when time is of the essence. These are not just theoretical concerns.

We continue to identify individuals who seek to join the ranks of foreign fighters traveling in support of the Islamic State of Iraq and the Levant, commonly known as ISIL, and also homegrown violent extremists who may aspire to attack the United States from within. These threats remain among the highest priorities for the FBI, and the United States government as a whole. We may not be able to identify and stop terrorists who are using social media to recruit, plan, and execute an attack in our country. We may not be able to recover critical information from a device that belongs to a victim who cannot provide us with the password, especially when time is of the essence. These are not just theoretical concerns.

Of course, encryption is not the only technology terrorists and criminals use to further their ends. Terrorist groups, such as ISIL, use the Internet to great effect. With the widespread horizontal distribution of social media, terrorists can spot, assess, recruit, and radicalize vulnerable individuals of all ages in the United States either to travel or to conduct a homeland attack. As a result, foreign terrorist organizations now have direct access into the United States like never before. Some of these conversations occur in publicly accessed social networking sites, but others take place via private messaging platforms. These encrypted direct messaging platforms are tremendously problematic when used by terrorist plotters.

Of the Going Dark problem, Director James Comey has said, “Armed with lawful authority, we increasingly find ourselves simply unable to do that which the courts have authorized us to do, and that is to collect information being transmitted by terrorists, by criminals, by pedophiles, by bad people of all sorts.” And as for a perceived conflict between keeping people safe and protecting their privacy, “it isn’t a question of conflict,” according to Comey. “We must care deeply about protecting liberty through due process of law, while also safeguarding the citizens we serve—in every investigation.”

To help address the challenges posed by advancing communications services and technologies, the Department of Justice’s National Domestic Communications Assistance Center (NDCAC) leverages and shares the law enforcement community’s collective technical knowledge, solutions, and resources. NDCAC also works on behalf of federal, state, local, and tribal law enforcement agencies to strengthen law enforcement’s relationships with the communications industry.

FBI Director Speaks at Cyber Security Gathering

ICCS Conference
Source: FBI Site

This morning at the sixth annual International Conference on Cyber Security in New York City, Director James Comey briefed participants on current cyber threats and the FBI’s multi-pronged strategy—which includes strong collaboration with law enforcement partners and the private sector—to effectively address them.

During the event, co-sponsored by the FBI and Fordham University, Comey discussed significant cyber threats such as nation-state sponsored computer intrusions, terrorism-related activities, ransomware, and hacktivism. And he enumerated various facets of the FBI’s cyber strategy which, in addition to helping state and local partners be more effective in combating cyber crime and forging closer relationships with industry, includes steps to recruit and retain cyber experts in the Bureau and efforts to enhance attribution of cyber attacks.

Comey also mentioned the just-announced Presidential Policy Directive 41, which solidifies the FBI’s role as a key cyber incident response leader, and stressed the importance of a national conversation about encryption and the Going Dark issue

This week’s conference provides the opportunity for leaders from government, the private sector, and academia to come together and share their expertise in cyber threat analysis, operations, research, and law enforcement.

martes, 26 de julio de 2016

Oracle E-Business Suite Release 12.1.3 and 12.2.4 or higher are now certified with Apple Mac OS X

Apple logo
Oracle E-Business Suite Release 12.1.3 and 12.2.4 or higher are now certified with Apple Mac OS X with the following desktop configurations:

  • Mac OS X 10.11 ("El Capitan" version 10.11.5 or later 10.11 updates)
  • Mac OS X 10.10 ("Yosemite" version 10.10.2 or later 10.10 updates)
  • Safari version 9 (9.1.1 or later 9.x updates)
  • Oracle JRE 8 plugin (1.8.0_91 or higher)
Users should review all relevant information along with other specific patching requirements and known limitations posted in the Notes listed below.

More information on this can be found in the document:


viernes, 22 de julio de 2016

JRE 6 codeline are now certified with Oracle E-Business Suite Release 12.x for Windows-based desktop clients.

Java logThe latest Java Runtime Environment 1.6.0_121 (a.k.a. JRE 6u121-b9) and later updates on the JRE 6 codeline are now certified with Oracle E-Business Suite Release 12.x for Windows-based desktop clients.

All JRE 6, 7, and 8 releases are certified with EBS upon release
Our standard policy is that all E-Business Suite customers can apply all JRE updates to end-user desktops:
  • From JRE 1.6.0_03 and later updates on the JRE 6 codeline
  • From JRE 1.7.0_10 and later updates on the JRE 7 codeline 
  • From JRE 1.8.0_25 and later updates on the JRE 8 codeline
We test all new JRE releases in parallel with the JRE development process, so all new JRE releases are considered certified with the E-Business Suite on the same day that they're released by our Java team. 
You do not need to wait for a certification announcement before applying new JRE 6, 7, or 8 releases to your EBS users' desktops.
Effects of new support dates on Java upgrades for EBS environments
Support dates for the E-Business Suite and Java have changed.  Please review the sections below for more details:
  • What does this mean for Oracle E-Business Suite users?
  • Will EBS users be forced to upgrade to JRE 7 for Windows desktop clients?
  • Will EBS users be forced to upgrade to JDK 7 for EBS application tier servers?
New EBS installation scripts
This JRE release is the first with a 3-digit Java version. Installing this in your EBS 11i and 12.x environments will require new installation scripts.  See the documentation listed in the 'References' section for more detail.
32-bit and 64-bit versions certified
This certification includes both the 32-bit and 64-bit JRE versions for various Windows operating systems. See the respective Deploying JRE documentation for your EBS release for details.
Implications of Java 6 End of Public Updates for EBS Users
The Support Roadmap for Oracle Java is published here:
The latest updates to that page (as of Sept. 19, 2012) state:
Java SE 6 End of Public Updates Notice
After February 2013, Oracle will no longer post updates of Java SE 6 to its public download sites. Existing Java SE 6 downloads already posted as of February 2013 will remain accessible in the Java Archive on Oracle Technology Network. Developers and end-users are encouraged to update to more recent Java SE versions that remain available for public download. For enterprise customers, who need continued access to critical bug fixes and security fixes as well as general maintenance for Java SE 6 or older versions, long term support is available through Oracle Java SE Support .
What does this mean for Oracle E-Business Suite users?
EBS users fall under the category of "enterprise users" above.  Java is an integral part of the Oracle E-Business Suite technology stack, so EBS users will continue to receive Java SE 6 updates from February 2013 to the end of Java SE 6 Extended Support in June 2017.
In other words, nothing changes for EBS users after February 2013. 
EBS users will continue to receive critical bug fixes and security fixes as well as general maintenance for Java SE 6 until the end of Java SE 6 Extended Support in June 2017. 
How can EBS customers obtain Java 6 updates after the public end-of-life?
Java 6 is now available only via My Oracle Support for E-Business Suite users.  You can find links to this release, including Release Notes, documentation, and the actual Java downloads here:
Both JDK and JRE packages are contained in a single combined download after 6u45.  Download the "JDK" package for both the desktop client JRE and the server-side JDK package.
Coexistence of multiple JRE releases Windows desktops
The upgrade to JRE 8 is recommended for EBS users, but some users may need to run older versions of JRE 6 or 7 on their Windows desktops for reasons unrelated to the E-Business Suite.
Most EBS configurations with IE and Firefox use non-static versioning by default. JRE 8 will be invoked instead of earlier JRE releases if both are installed on a Windows desktop. For more details, see "Appendix B: Static vs. Non-static Versioning and Set Up Options" in Notes 290807.1 and 393931.1.
What do Mac users need?
Mac users running Mac OS X 10.10 (Yosemite) can run JRE 7 or 8 plug-ins.  See:
Will EBS users be forced to upgrade to JDK 7 for EBS application tier servers?
JRE is used for desktop clients.  JDK is used for application tier servers
JDK upgrades for E-Business Suite application tier servers are highly recommended but currently remain optional while Java 6 is covered by Extended Support. Updates will be delivered via My Oracle Support, where you can continue to receive critical bug fixes and security fixes as well as general maintenance for JDK 6 for application tier servers. 
Java SE 6 is covered by Extended Support until June 2017.  All EBS customers with application tier servers on Windows, Solaris, and Linux must upgrade to JDK 7 by June 2017. EBS customers running their application tier servers on other operating systems should check with their respective vendors for the support dates for those platforms.
JDK 7 is certified with E-Business Suite 12.  See:
References
Related Articles

ULACIT informa sobre oportunidades de internacionalización

ULACIT informa sobre oportunidades de internacionalización
ULACIT informa sobre becas y oportunidades de internacionalización

La Oficina de Becas del Ministerio de Relaciones Exteriores y Culto informa sobre:
Becas y financiamiento para realizar maestrías, doctorados y otros, en universidades, academias, colegios universitarios y otras instituciones, en Bélgica.

Más información en:

 Entre las instituciones se encuentran:

- Universidad de Lieja (www.ulg.ac.be ), especialización en telecomunicaciones, programas informáticos y el campo agronómico.
- Universidad Católica de Lovaina (www.uclouvain.be), especialización en ciencias médicas y de la salud.
- Universidad Libre de Bruselas (www.ulb.ac.be), especialización en las áreas de las ciencias y el arte.
- Katholieke Universiteit Leuven (www.kuleuven.be), especialización en las áreas de ingeniería y ciencias naturales.
- Universidad de Gante (www.ugent.be), cuenta con programas de movilidad de investigadores.
- Artesis Plantun Hogeschool Antwerpen (www.ap.be/royal-conservatoire) tiene programas de grado en Danza y Música.
- Arteveldehogeschool (www.arteveldehogeschool.be ), cuenta con programas de bachillerato en Administración de Empresas, Administración de la Comunicación, Higiene Oral, Educación Secundaria y Administración de Empresas Internacionales.
- Erasmus Hogeschool Brussel ( www.erasmusholgeschool.be ), programas de bachillerato y maestrías en Arquitectura, Administración de Empresas, Educación, Salud y Sociedad, Tecnologías y TIC, Teatro, Cine y Sonido, Música.
- Hogeschool Gent ( www.hogent.be ), programas de bachillerato en varias áreas.
- Luca School of Arts ( www.luca-arts.be ), programas de bachillerato profesional y maestrías en varias áreas.
- Thomas More (Colegio Universitario ) (www.thomasmore.be ), programas de bachillerato en Diseño de interiores, Administración Turística y Periodismo Internacional.
- Academie Royale Des Beaux-Arts de Bruxelles (www.arba-esa.be ), ofrece formaciones a nivel de grado y posgrado en varias áreas.
- Conservatoire Royal de Bruxelles (www.conservatoire.be ), ofrece programas de bachillerato y maestrías en Música, Teatro y Artes de la Palabra.
- La Cambre Arts Visuels (www.lacambre.be) ofrece programas en varias áreas.
- Artesis Plantun Hogeschool Antwerpen (www.ap.be/royal-academy) ofrece programas de bachillerato y maestría en Diseño de Joyería, Diseño en Vestuarios, Diseño Gráfico, Escultura y Bellas Artes.
Curso  
"Gestión de la Política Ambiental" ofrecido por el Departamento de Desarrollo Humano, Educación y Empleo de la OEA, en colaboración con el Centro de Desarrollo y Asistencia Técnica en Tecnología para la Organización Pública (Asociación Civil) TOP, Argentina.
 
LUGAR, HORA Y FECHA LÍMITE PARA POSTULAR: a las 12 horas, del 06 de setiembre de 2016, en la Oficina de Becas del Ministerio de Relaciones Exteriores y Culto. SIN EXCEPCIONES.
 
MODALIDAD: a distancia. 
 
FECHAS DEL CURSO: del 3 de octubre al 19 de diciembre de 2016.
 
IDIOMA: español.
 
BENEFICIOS:
- TOP cubrirá el 50 % del costo total del curso y el becario será responsable del pago del 50 % restante, el cual asciende a USD 265.
 
  
REQUISITOS:
-El curso está dirigido, principalmente a funcionarios de organismos públicos nacionales, subnacionales o municipales, docentes de grado o de posgrado y miembros de ONG que realicen actividades de interés público.
- Mínimo un año de experiencia en el campo de estudio.
 
 
DOCUMENTOS POR PRESENTAR:
- Hoja de Registro del MREEC (formulario adjunto).
- Copia de la cédula de identidad.
- Formulario de Solicitud en línea de la OEA ( https://www.oas.org/fms/Announcement.aspx?id=802&Type=4&Lang=Spa).
- Copia del título universitario.
- Currículum vitae (de no más de dos hojas).
- Una carta de recomendación (formulario adjunto).
- Objetivos (formulario adjunto).
 
Cualquier duda sobre el proceso de postulación a becas para este curso debe ser dirigida a: PDSP@oas.org
"Fortalecimiento de la Riaej y de los programas formativos de la comunidad iberoamericana"

Ofrecido por la Agencia Española de Cooperación Internacional para el Desarrollo (AECID), en el marco del Plan de Transferencia, Intercambio y Gestión de Conocimiento para el Desarrollo de la Cooperación Española en América Latina y el Caribe -INTERCOONECTA-España, 2016.

FECHA LÍMITE PARA POSTULAR EN LÍNEA: 02 de setiembre de 2016 a través del siguienteenlace

MODALIDAD: presencial, en Barcelona, España.

IDIOMA: español.
FECHAS DEL CURSO: del 7 al 11 de noviembre de 2016.
REQUISITOS:
El curso está dirigido a responsables directos o integrantes de los equipos académicos y pedagógicos de las escuelas judiciales y centros de formación judicial.
BENEFICIOS:
- Ayuda de transporte; por un monto 1 000 euros
- Gastos de manutención
- Gastos de alojamiento
Para más información puede ingresar en la página www.aecid.gob.es, en el enlace. También puede escribir al correo: intercoonectaesapana@aecid.es
Para más información de programas internacionales, diríjase a la Oficina de Educación Global de ULACIT. 
Ubicación: Piso principal de ULACIT, pasando Admisiones y el laboratorio MAC al final del pasillo.
Correo electrónico: studyabroad@ulacit.ac.cr
CONECTATE CON NOSOTROS:
Like us on FacebookFollow us on TwitterView our profile on LinkedIn

OAuth and Oracle JET

By Geertjan-Oracle on Jul 22, 2016

OAuth is an open protocol to allow secure authorization in a simple and standard method from web, mobile, and desktop applications. Oracle JET includes OAuth and there is documentation for the combination in the Oracle JET Developer Guide, in a chapter named Using oj.OAuth in Your Oracle JET Application.

In your "define" block, you need to include "ojs/ojmodel", since that's where the OAuth class is provided. The OAuth class provides the methods you can use to initialize the oj.OAuth object, verify initialization, and calculate the authorization header based on client credentials or access token.

Once you have included "ojs/model", you initialize "oj.OAuth", as described in the chapter, e.g.:self.myOAuth = new oj.OAuth('X-Authorization');

When you use the Oracle JET Common Model, you'll find the "oj.Collection.extend" enables you to reference your "oj.OAuth" object. Also see the related JavaScript documentation:


Here's all the code for a real "define" block that includes OAuth for working with Twitter. Take note of the bits in bold below, which are the statements relating to OAuth:

define(['ojs/ojcore', 
        'knockout', 
        'jquery', 
        'ojs/ojmodel', 
        'ojs/ojtable', 
        'ojs/ojcollectiontabledatasource'],
    function (oj, ko, $) {
        function HeaderViewModel() {
            var self = this;
            self.TweetCol = ko.observable();
            self.datasource = ko.observable();
            self.serviceURL = 'https://api.jublo.net/codebird/1.1/search/tweets.json';
            self.myOAuth = new oj.OAuth('X-Authorization');
            self.parseTweet = function (response) {
                return {
                    id_str: response['id_str'],
                    text: response['text'],
                    userName: response['user']['name']
                };
            };
            var Tweet = oj.Model.extend({
                urlRoot: self.serviceURL,
                parse: self.parseTweet,
                idAttribute: 'id_str'
            });
            var myTweet = new Tweet();
            var TweetCollection = oj.Collection.extend({
                url: self.serviceURL + '?q=NetBeans',
                model: myTweet,
                oauth: self.myOAuth
            });
            self.getData = function () {
                self.datasource(null);
                self.TweetCol(new TweetCollection());
                self.myOAuth.setAccessTokenRequest(
                    JSON.parse(sessionStorage.getItem('credentials'))
                );
                self.TweetCol().fetch({
                    success: function () {
                        self.datasource(
                            new oj.CollectionTableDataSource(self.TweetCol())
                        );
                    },
                    error: function (jqXHR, textStatus, errorThrown) {
                        console.log('Error in fetch: ' + textStatus);
                    }
                });
            };
        }
        return new HeaderViewModel();
    }
);
In "main.js", the "credentials.js" file is loaded:
var prop;
$.ajax({
    url: 'js/credentials.json',
    dataType: 'json',
    async: false,
    success: function (data) {
        sessionStorage.setItem('credentials', JSON.stringify(data));
    },
    error: function (req, status, err) {
        console.log('something went wrong', status, err);
    }
});
The "credentials.js" file has this content:
{
    "client_id": "blabla",
    "client_secret": "blabla",
    "bearer_url": "https://api.jublo.net/codebird/oauth2/token",
    "access_token": "blabla"
}

Above, Codebird is used. Codebird is a library that is commonly used to manage OAuth2 connections to Twitter. And, instead of setting up your own code, you can use Codebird's proxy service.

In the "define" block above, notice the "self.getData" at the end, which ties everything together, and is called from the view:




That's it. A complete sample scenario that uses OAuth with Oracle JET.

OTN Tour LAD - Panama, Costa Rica, Mexico, Guatemala

By Mike Dietrich-Oracle on Jul 21, 2016

OTN Tour Latin America 2016 is ready to take off


And for me it's the first time in 4 years that I won't be able to participate. Which is very sad as it is such a great thing to meet all these wonderful people, not only from the User Groups doing all the orga stuff but also discussing with customers, learning from skilled and knowledgeable co-presenters, the entire travel, the wonderful cities ... I miss this already. Maybe next year ...


Nevertheless, the Database Upgrade team will present - and thanks to the tour organizers for accepting the talks of Byron and Hector, two of my team mates based in Mexico. And of course they will present in Spanish :-)
.
.
.


Our Speakers 

Let me introduce my two team mates first.
.

Hector Vieyra
Software Development Manager at Oracle

  • An Oracle senior level DBA with more than 15 years of experience
  • Contributing as software engineer for Database Upgrade team
  • Broad range of experience in architecting, designing, implementing, managing and supporting complex business critical databases and related server infrastructure on transnational companies like Bank Of America Merrill Lynch, General Electric and Cadbury Adams.
  • Ample experience in different Oracle database technologies like data guard, rac and Exadata
    .
    .
    .






Byron Motta
Principal Member of Technical Staff at Oracle, Database Upgrade Development Team

  • 15+ years of experience as DBA and as a Software developer.
  • OCP and OCE GI & RAC
  • Software architect.
  • Consultant for companies such as Banco Santander, InterAmerican Development Bank, Bank of America, etc.
  • Upgrade/downgrade and migrations specialist, RAC, high availability and Exadata.
  • SME  Oracle on Windows.
  • Preupgrade developer at Database Upgrade Development team
    .

The Cities

Hector and Byron will present in these cities.
Please find the links to the events with agenda, location etc below.
And of course the OTN Tour will visit also Buenos Aires, Montevideo, Sao Paolo, Santiago de Chile, Lima and Pereira. Find all the cities and stops and further information HERE.
.

The Talks

Hector and Byron will give the following talks:
What's New in Database Upgrade: Live and Uncensored!.
This session will introduce the new features in database upgrade for the latest version of Oracle Database. As an added bonus you will see a live upgrade from Oracle Database 11g Release 2 to the newest version of Oracle Database, and also a live migration using the new Full Transportable Export/Import feature, both in the span of 45 minutes!
.
How to Ensure Good Performance After your Database Upgrade.
The top concern of customers when approaching a database upgrade is how their server will perform under the new version of Oracle. This session will show you Best Practice for using a variety of database parameters, features, and options to achieve better performance on the same hardware when you upgrade your Oracle Database.
.
I'm so glad that our team gets the chance to attend - and all the best to Byron and Hector throughout their travel :-)
Hope to be part of the OTN LAD Tour in 2016 then again :-)
--Mike