Mark founded Conneva, Inc. in 2003 to provide SOA and webMethods integration architecture design and development services to large enterprises.Services offered include Technical Account Management, Architecture Design and Development, Troubleshooting and Performance Tuning.Special focus on enterprise-class web services infrastructure including Service Oriented Architecture, Enterprise Services Bus and Web Services Security.
Comcast Cable- Enterprise Services Platform (September 2007 to Present)
- SOA Architect responsible for contract-first service analysis and design, service development and testing for Comcast's Enhanced Serviceability functional domain. Mentored Comcast architects and developers and contributed to enterprise SOA standards. Evaluated and recruited new developers and analysts for the project team.
- Authored services analysis artifacts using SparxSystems Enterprise Architect UML design tool. Following contract-first and message-first approaches, designed WS-I Basic Profile-conformant WSDL and XML schemas using XML Spy Enterprise. Managed service implementation in a Java, SpringWS, Hibernate/JPA and Oracle 10g / 11g environment. Created service proxies using BEA Aqualogic Service Bus (ALSB) for custom transformation and routing. Service interacted with CSG and Amdocs billing systems via calls to other Comcast ESP Services.
- Managed design and development of a web-based application responsible for Service Address creation and maintenance. JSP/Struts application relied exclusively on the Location Service layer for business logic. Supported rollout to over 2000 users.
- Supported Comcast ESP operations team by leading troubleshooting / root cause analysis initiatives. Analyzed performance issues and recommended corrective actions involving app server configuration, database tuning and hardware optimization.
Pennsylvania Justice Network - PA JNET (December 2006 to August, 2007)
- Lead SOA Architect on a project to develop WS-Security and SOA Governance strategies and initial policies. Also responsible for rapidly designing and developing custom Integration Server SOAP processor supporting WS-Security SAML tokens, LDAP authentication, XML validation, customized SOAP fault generation and logging for high priority criminal justice business services. Assisted JNET's Quality Control team with the selection of SOA testing tool software.
US Forest Service / National Wildfire Coordinating Group (January 2006 to June 2007)
- Lead SOA Architect on a project to design and deploy a service-oriented architecture for the United States Forest Service to expose ROSS application functionality used to manage wildfire fighting resource requests from hundreds of cooperating agencies. The project is using webMethods Integration Server (IS) 6.5, Broker 6.5 and BrokerJMS to provide the web services infrastructure used to invoke business services in the USFS J2EE applications.
- Modeled Services following Thomas Erl's SOA Analysis and Design approach. Designed XML schemas to represent messages, created multi-operation WSDL files using XML Spy Enterprise, designed WS-Security strategy, evaluated and selected SOA testing tools to be used by both developers and QA, trained new Integration Server developers, developed IS technical architecture and numerous Flow and Java services. Worked with project operations personnel to configure and certify webMethods Broker in High Availability (HA) configuration on AIX HACMP.\
webMethods Professional Services (December 2005 to January 2006)
- Worked with another webMethods Partner to develop a Service Oriented Architecture Assessment and Roadmap methodology to be used by webMethods Professional Services. Responsibilities include developing processes to create SOA Assessment and Roadmap deliverables, developing sample deliverables and preparing presentation materials for webMethods.
U.S. Department of State (May 2005 to December 2005)
- Designed and implemented State Department Enterprise Services Bus (ESB) core infrastructure and used that infrastructure to deliver integration between three DoS applications.
- Delivered ESB services included WS-Security, message routing, message transformation and auditing. Created XML Schemas describing ESB core data structures and application message definitions. Worked with DoS Public Key Infrastructure (PKI) team to build a flexible security framework that would support the initial low-risk integration while also supporting future applications requiring strong security tokens, messaging signing and message encryption.
- Products used included Integration Server 6.1, Broker 6.1, Trading Networks 6.1, Modeler/PRT 6.1 and ServiceNet 6.5 (for UDDI registry).
Airport Authority Hong Kong (AAHK) (April 2005)
- Conducted a fast-paced assessment and quality audit of an existing webMethods implementation with the goals of determining the quality of the work performed by another consulting firm, recommending corrective actions where warranted and designing an architecture that could be used to leverage the existing work while better preparing for numerous future integration projects.
U.S. Department of Defense (February 2005 - April 2005)
- Developed a JSP-based user interface for the webMethods Glue UDDI server. The interface provided a streamlined approach for registering web services which insulated the end user from the complexities of the UDDI API. The application allowed authorized users could create UDDI business entities and register web services for those entities. Services could be located by name, business entity or category.
Raytheon Intelligence and Information Services (April 2004 - February 2005)
Raytheon provides software development and management expertise to the United States Defense Industry and Intelligence Community:
- Created and delivered customized training for webMethods product architecture, Integration Server and webMethods-based Web Services
- Developed custom web services SOAP processor for Integration Server that performed common tasks of input document validation, payload extraction, WS-Security Enforcement, exception handling and service invocation.
- Developed integration between webMethods Integration Server and Netegrity Policy Server to enable WS-Security enforcement of project security policies using Security Markup Access Language (SAML).
- Operated an open area lab to support accelerated resolution of issues encountered in classified environments, access to new webMethods products and product versions and access to webMethods training for awaiting access personnel.