SlideShare ist ein Scribd-Unternehmen logo
1 von 19
[1]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Architecture of Message Oriented Middleware
Presented By
ANINDYA KUMAR JENA Roll # IT 200118152
Under the guidance of
Dr. Ravi P.Reddy
[2]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Middleware
Middleware is the software that assists an
application to interact or communicate with
other applications, networks, hardware, and/or
operating systems.
[3]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Types of Middleware
Types:-
Message-Oriented Middleware (MOM)
Transaction Processing Monitors (TPM)
Remote Procedure Calls (RPC)
Object Request Brokers (ORB)
[4]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Message Oriented Middleware
Message Oriented Middleware (or “MOM”) is
one particular form of middleware, which is
capable of facilitating the transportation of
asynchronous messages from one component
to another.
[5]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Example implementations of MOM are Sun’s
JMS,Microsoft’s MSMQ, and IBM’s MQSeries.
Forms of MOM:- (i) “Message Queuing”
(ii) “Publish-Subscribe”
Forms of MOM
[6]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Message Queuing
[7]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Publish-Subscribe
[8]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Implementations of MOM
JMS:-
 Java Message Service is a part of Sun's J2EE
suite, which provides a standard set of APIs
that developers can use to access the features
of any underlying messaging system .
 It supports both the Publish/Subscribe as well
as the Point-to-Point (Message Queuing)
models .
[9]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
JMS
[10]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
The Main Entities in JMS
JMS
Client JMS
Application
JMS
provider
Producer &
Consumer
[11]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
MSMQ
 MSMQ is Microsoft’s implementation of MOM.
 Messages are typically kept in queues that are
managed by Queue managers .
[12]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Key Points About MSMQ
MSMQ
MSMQ
Enterprise
Message
Delivery
Sites MQIS
[13]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
MSMQ Queues
Two types of queues in MSMQ.
1)Public queues
2)Private queues
Systems within the MSMQ Enterprise are
classified into Servers, Dependent Clients
and Independent Clients.
[14]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
MQSeries
 IBM’s implementation of MOM
Objects:- The word “object” refers to the “things”
that have to be set up after the product is installed.
 Types:-
1) Queue Manager
2) Queue
3) Channel
[15]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Architecture of MQSeries
[16]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Comparison
[17]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Comparison
[18]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
Communication is undoubtedly one of the
most prominent and essential requirements in
software systems, especially those that are
highly distributed, and MOM is playing an
important role in ensuring this vital need.
Conclusion
[19]
NationalInstituteofScience&Technology
Architecture of Message Oriented Middleware
Anindya Kumar Jena
THANK
YOU !!!

Weitere ähnliche Inhalte

Was ist angesagt?

An introduction-to-factor-analysis-of-information-risk-fair680
An introduction-to-factor-analysis-of-information-risk-fair680An introduction-to-factor-analysis-of-information-risk-fair680
An introduction-to-factor-analysis-of-information-risk-fair680
Kabogo
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Kai Wähner
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
Habibur Rahman
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
Cours- Sécurité des réseaux
Cours- Sécurité des réseaux Cours- Sécurité des réseaux
Cours- Sécurité des réseaux
Yassmina AGHIL
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 

Was ist angesagt? (20)

Building an Authorization Solution for Microservices Using Neo4j and OPA
Building an Authorization Solution for Microservices Using Neo4j and OPABuilding an Authorization Solution for Microservices Using Neo4j and OPA
Building an Authorization Solution for Microservices Using Neo4j and OPA
 
Intervention de Cybersécurité en BTS SIO
Intervention de Cybersécurité en BTS SIOIntervention de Cybersécurité en BTS SIO
Intervention de Cybersécurité en BTS SIO
 
REST APIs and MQ
REST APIs and MQREST APIs and MQ
REST APIs and MQ
 
An introduction-to-factor-analysis-of-information-risk-fair680
An introduction-to-factor-analysis-of-information-risk-fair680An introduction-to-factor-analysis-of-information-risk-fair680
An introduction-to-factor-analysis-of-information-risk-fair680
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notes
 
Cloud Computing Tools
Cloud Computing ToolsCloud Computing Tools
Cloud Computing Tools
 
RabbitMQ.pptx
RabbitMQ.pptxRabbitMQ.pptx
RabbitMQ.pptx
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
La sécurité du Cloud Computing
La sécurité du Cloud ComputingLa sécurité du Cloud Computing
La sécurité du Cloud Computing
 
Programmation réseau en JAVA
Programmation réseau en JAVAProgrammation réseau en JAVA
Programmation réseau en JAVA
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Cours- Sécurité des réseaux
Cours- Sécurité des réseaux Cours- Sécurité des réseaux
Cours- Sécurité des réseaux
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
ztna-2-0-report.pdf
ztna-2-0-report.pdfztna-2-0-report.pdf
ztna-2-0-report.pdf
 
Day 1 axway apim-training
Day 1   axway apim-trainingDay 1   axway apim-training
Day 1 axway apim-training
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
 

Andere mochten auch

Apache ActiveMQ - Enterprise messaging in action
Apache ActiveMQ - Enterprise messaging in actionApache ActiveMQ - Enterprise messaging in action
Apache ActiveMQ - Enterprise messaging in action
dejanb
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corba
Mohd Arif
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
Varun Arora
 

Andere mochten auch (18)

MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented Middleware
 
Message oriented middleware
Message oriented middlewareMessage oriented middleware
Message oriented middleware
 
Message Oriented Middleware (MOM)
Message Oriented Middleware (MOM)Message Oriented Middleware (MOM)
Message Oriented Middleware (MOM)
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
COM+ & MSMQ
COM+ & MSMQCOM+ & MSMQ
COM+ & MSMQ
 
Apache ActiveMQ - Enterprise messaging in action
Apache ActiveMQ - Enterprise messaging in actionApache ActiveMQ - Enterprise messaging in action
Apache ActiveMQ - Enterprise messaging in action
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message Queueing
 
Messaging With ActiveMQ
Messaging With ActiveMQMessaging With ActiveMQ
Messaging With ActiveMQ
 
Introduction to the DOM
Introduction to the DOMIntroduction to the DOM
Introduction to the DOM
 
Presentation On Com Dcom
Presentation On Com DcomPresentation On Com Dcom
Presentation On Com Dcom
 
ASP, ASP.NET, JSP, COM/DCOM
ASP, ASP.NET, JSP, COM/DCOMASP, ASP.NET, JSP, COM/DCOM
ASP, ASP.NET, JSP, COM/DCOM
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corba
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
 
Corba concepts & corba architecture
Corba concepts & corba architectureCorba concepts & corba architecture
Corba concepts & corba architecture
 
PPT on Microsoft Corporation
PPT on Microsoft CorporationPPT on Microsoft Corporation
PPT on Microsoft Corporation
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
 

Ähnlich wie Architecture of message oriented middleware

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
IAEME Publication
 

Ähnlich wie Architecture of message oriented middleware (20)

A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
A Survey   Embedded Systems Supporting By Different Operating Systems.pdfA Survey   Embedded Systems Supporting By Different Operating Systems.pdf
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
Chapter 5. infrastructure ti
Chapter 5. infrastructure tiChapter 5. infrastructure ti
Chapter 5. infrastructure ti
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Performance Analysis in MANET Routing Protocol using Machine Learning Algorit...
Performance Analysis in MANET Routing Protocol using Machine Learning Algorit...Performance Analysis in MANET Routing Protocol using Machine Learning Algorit...
Performance Analysis in MANET Routing Protocol using Machine Learning Algorit...
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
ICUAS
ICUASICUAS
ICUAS
 
Introduction to Android Programming by Dr.M.Pyingkodi-kongu engineering c...
Introduction to  Android   Programming by  Dr.M.Pyingkodi-kongu engineering c...Introduction to  Android   Programming by  Dr.M.Pyingkodi-kongu engineering c...
Introduction to Android Programming by Dr.M.Pyingkodi-kongu engineering c...
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Physical Design, Logical Design – IoT Enabling Technologies
Physical Design, Logical Design – IoT Enabling TechnologiesPhysical Design, Logical Design – IoT Enabling Technologies
Physical Design, Logical Design – IoT Enabling Technologies
 
IRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of ThingsIRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of Things
 

Mehr von Sajan Sahu (20)

Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Dna computing
Dna computingDna computing
Dna computing
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Architecture of message oriented middleware