Thomson Reuters Contributions Channel

Slides:



Advertisements
Similar presentations
P2P Media Summit LA May 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
Advertisements

P2P Market Conference March 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
System Center 2012 R2 Overview
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Secure SharePoint mobile connectivity
Module 5: Configuring Access to Internal Resources.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Remote Access Network Management Kelly Given Allison Traina.
Location based Streaming Topics for our 1 st presentation  Thesis Description  Positioning System  Streaming over positioning  Questions Session.
The product strategyThe indirect sales WORTMANN AG serves customers from the European Union, North and Eastern Europe, the Middle East and Africa.
Remote Networking Architectures
CEO, Tech IT Easy Lab of Pervasive VM Computing A Beginner’s Guide to XMPP.
Server Hive Architecture. No Single Point-of-Failure. Automatic Failover. One-Click Upgrades. Embedded SDK & API. Video Wall. And More.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Basic Concepts Of CITRIX XENAPP.
Using the Bookshare API July Why do it? Developed in 2008, provides 3rd party developers access to Bookshare functionality in any application It.
Module 5: Configuring Access for Remote Clients and Networks.
Appendix A UM in Microsoft® Exchange Server 2010.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
All Rights Reserved, Swurv, secure gateway interoperable communication multidomain traffic system APPLICATION LAYER TECHNICAL DISCUSSION.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Module 7: Advanced Application and Web Filtering.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
IBM Bluemix Ecosystem Development Hands on Workshop Section 1 - Overview.
ICM – API Server & Forms Gary Ratcliffe.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
Created by BM|DESIGN|ER number Three operator business non-operator business.
1 Example security systems n Kerberos n Secure shell.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Huawei Enterprise AnyOffice BYOD Solution
Virtual Private Network Access for Remote Networks
CLOUDENTIFY.
Virtual Private Networks and IPSec
DYNAMIC CONTENT DELIVERY
Virtual Private Networks
CCNA 3 Chapter 10 Virtual Trunking Protocol
Microsoft Windows NT 4.0 Authentication Protocols
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Securing the Network Perimeter with ISA 2004
Module 4 Remote Login.
Module 8: Concepts of a Network Load Balancing Cluster
0_kit End to End encryption in your app
Radius, LDAP, Radius used in Authenticating Users
Power BI Security Best Practices
EMV® 3-D Secure - High Level Overview
Creating Novell Portal Services Gadgets: An Architectural Overview
Amit R Bhatia / Puneeth Nayak
File Transfer Protocol
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Access and Information Protection Product Overview October 2013
Elektron Real-time NEWS over Web Socket
Thomson Reuters API Strategy
Microsoft Azure Removes Security and Backend Infrastructure Concerns for Social Network Firm “We were skeptical about moving to Azure in our early stages.
Cloud Web Filtering Platform
Edge Recorder Client
DRC Central Office Services
Developing for Windows Azure
Open Automation Software
Cengage Learning: Computer Networking from LANs to WANs
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
IoT Security and Privacy
Presentation transcript:

Thomson Reuters Contributions Channel REUTERS / Firstname Lastname Thomson Reuters Contributions Channel David.M.Thomas Developer Advocate - Platform APIs

The Contributions Channel Overview A New service allows clients to contribute content on the Elektron Network Hosting a cluster of servers that provides the Contributions logic previously placed at the client site All contributors (TREP, Contex and 3rd Party) will connect to this new service

3rd Party Application Integration Clients and solution providers can develop contribution applications using the Elektron APIs : Outputs are connected directly to the new Contributions Channel Uses Elektron SDK tunnel stream connections Uses OMM Post Messages Supports MarketPrice Model Credentials will be authenticated against our AAA platform

Tunnel Streams Available in the ETA Reactor and EMA A tunnel stream is a private stream with authentication Establishes a connection between Application and Contribution Gateway Allows multiple sub-streams to co-exist within the tunnel stream. Contributions are made using sub-streams EMA/ETAProvider EMA/ETA Consumer

Contributions Topology Contributions Service Gateway Contribution Channel Service Cluster Delivery Direct Or Internet Encrypted TLS over WAN 3rd Party App Elektron API

Benefits Removes the need for client sited contributions only server devices Provides a higher level of performance than Marketlink Provides a simpler contribution solution that is consistent with TREP publishing Uses strategic Elektron APIs rather than MFOT Use of Open Message Model will allow the contribution of more complex data types

Demonstration: Contributions Application Using EMA Java from the Elektron SDK Establish an encrypted connection to the server Create an OmmConsumer configured as "ChannelType::RSSL_ENCRYPTED" Make a TunnelStreamRequest request. Response: StatusMsg with StreamState = Open indicates the Tunnel Stream is open.

Demonstration: Contributions Application Perform a client login: Supply user name and password credentials. Response: RefreshMsg with StreamState = Open Contribute data using post messages Response: AckMsg An AckMsg provides an indication that the contribution was received by the service. If the AckMsg contains a NackCode then the contribution failed

Example PostMsg

Demonstration: Contributions Application View the result

References Developer Portal https://developers.thomsonreuters.com Tutorials Article