Logo
  • Products
    • SecOps Studio
  • Solutions
    • Pega Stack Shifter
  • Services
    • Pega Enablement
    • Pega Modernization
  • About
  • Contact
  • Blog

Code Vault

  • Home
  • Blog
  • Code Vault
  • Page 10
Code Vault

Access Deny, Access When and Privilege in Pega

December 10, 2024 Code Vault Curators

This is the continuation of my another blog article on Authorization topic. I recommend you to visit from blog article on Access roles and ARO concepts. In this article we will talk about Access Deny, Privilege and Access when rules. This article was created using Pega ’24 version. First let’s start with Access Deny rules. […]

Code Vault

Access Roles and ARO in Pega

December 10, 2024 Code Vault Curators

In this blog article we are going to talk about Role based access configurations, specifically about the Access role and Access role to Object rule configurations. This article was created using Pega ’24 version. First let’s get some basics about Role based access. Take a simple example of Office building as you see in the […]

Code Vault

Java Messaging Service – Part 7 – Service JMS rule

December 10, 2024 Code Vault Curators

This is the final article in JMS series. It is going to be a short article on service JMS rule. It is recommended to visit the previous article on JMS series, specially on JMS listener. https://myknowtech.com/tag/jms What is Service JMS rule? – It is part of Integration services category and gets invoked from JMS listener […]

Code Vault

Java Messaging Service – Part 6 – JMS Listener

December 10, 2024 Code Vault Curators

In this blog article, we will see the configuration points in a JMS listener. We will also see Listener processing at the end. What is JMS Listener? – JMS Listener is a data instance of category Integration resources. – It provides information to route the JMS messages to the service JMS rule for processing. – […]

Code Vault

Java Messaging Service – Part 5 – JMS Vs MDB Listener

December 10, 2024 Code Vault Curators

In this article, we will talk some basics about the differences between Web Server and Application Server. We will also conclude with understanding when to go for JMS Listener and when for JMS MDB Listener. This post is going to be totally theoretical! Basically there are two server types – Web server and Application server. […]

Code Vault

Java Messaging Service – Part 4 – Connect JMS in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see all the configuration points in a Connect-JMS rule that can put a message into ActiveMQ JMS provider. You will see there are two Connector rules to support Messaging Service – Connect-JMS and Connect-MQ. Connect-MQ – Is a specific implementation of  messaging service that supports  IBM Websphere MQ standard. […]

Code Vault

Kafka – Part 3 – Stream service in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see how Pega uses Kafka internally to process streams of data and also an overview of streams service. This tutorial is implemented using Pega personal edition 8.4, but the core concepts remain the same in higher versions as well It is recommended to go through previous blog articles on […]

Code Vault

Kafka – Part 2 – Server Setup and CLI tutorial

December 10, 2024 Code Vault Curators

In this blog article, we will set up Kafka in Windows and start producers and consumers using CLI. We will also see how the messages get consumed. It is recommended to go through previous blog article on Kafka fundamentals before proceeding here. Let’s straightaway start downloading the binaries. Step 1: Make sure you have Java […]

Code Vault

Kafka – Part 1 – Fundamentals

December 10, 2024 Code Vault Curators

Welcome to the first article on Kafka series. Here we will talk some theory concepts on Kafka fundamentals. What is Kafka? Kafka is a distributed streaming platform. Stream here refers to stream of data. Imagine an organization has around 3 source systems and 4 target systems. Each system needs to communicate with each other to […]

Code Vault

Nodes in Pega Cluster – Node classification

December 10, 2024 Code Vault Curators

In this blog article, we will see how we can classify the nodes. I suggest you to go through the previous articles on System name and Nodes Introduction. Why to classify nodes? Effective resource allocation Imagine an Insurance organization using Pega application for Sales activity. End users login to the Pega applications creates sales case […]

Posts pagination

Previous 1 … 9 10 11 … 16 Next

Pega Courses

Pega courses can be accessed at https://myknowacademy.com

Search through the blog

Tags

activity authentication background-processing case-management data-model declarative-processing email-processing file-processing pega-core-concepts pega-integration process reporting security system-administration user-interface validation

Categories

  • Career
  • Code Vault
  • Insight

Recent posts

  • A Honest take of Pega Blueprint as of 2026
  • Thinking About Booking Tickets for PegaWorld ’26?
  • The One Skill That Can Improve Your Pega Proficiency Faster
  • Should Experienced Pega Professionals Still Go for Pega CLSA Certification?
  • My Honest Take on Pega Constellation
About

MyKnowTech was born with a mission to bridge the gap between technical expertise and business needs. We are a boutique firm specializing in Pega solutions, delivering them with a personal touch. At the heart of our philosophy is a commitment to putting clients first.

Company
  • About
  • Leadership
  • Career
  • Contact
Resources
  • Blog
  • Services
  • Solutions
  • Insights

©  MyKnowTech B.V. All Rights Reserved.

  • Sitemap
  • Terms & Conditions
  • Privacy Policy