This document presents a framework for representing integration aspects in information system architectures (ISAs). It proposes new concepts of an IT Integration Block and IT Integration Service to describe a variety of integration scenarios between information systems, both within and between organizations. These concepts classify integration based on automation level, role type, and characteristics like technological approach, synchronism, and organizational level. The framework is illustrated with an example of integrating information systems for a food safety project.
IDC: Selecting the Optimal Path to Private CloudEMC
This IDC white paper discusses the challenges and benefits of various cloud paths: prebuilt or integrated infrastructure systems such as VCE Vblock, reference architectures such as EMC VSPEX, and traditional or "build your own" systems.
The use of an architecture–centered development process for delivering information technology began with
the introduction of client / server based systems. Early client/server and legacy mainframe applications did not
provide the architectural flexibility needed to meet the changing business requirements of the modern
publishing organization. With the introduction of Object Oriented systems, the need for an architecture–
centered process became a critical success factor. Object reuse, layered system components, data
abstraction, web based user interfaces, CORBA, and rapid development and deployment processes all
provide economic incentives for object technologies. However, adopting the latest object oriented technology,
without an adequate understanding of how this technology fits a specific architecture, risks the creation of an
instant legacy system.
Publishing software systems must be architected in order to deal with the current and future needs of the
business organization. Managing software projects using architecture–centered methodologies must be an
intentional step in the process of deploying information systems – not an accidental by–product of the
software acquisition and integration process.
Enterprise Architecture definition
System architecture
The Role of EA
Enterprise Frameworks:
Zachman Framework
The Open Group’s Architecture Framework (TOGAF)
The Foundation for Execution
Business architecture
Information architecture
Application architecture
Technology architecture
Implementation
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMSacijjournal
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds.
IDC: Selecting the Optimal Path to Private CloudEMC
This IDC white paper discusses the challenges and benefits of various cloud paths: prebuilt or integrated infrastructure systems such as VCE Vblock, reference architectures such as EMC VSPEX, and traditional or "build your own" systems.
The use of an architecture–centered development process for delivering information technology began with
the introduction of client / server based systems. Early client/server and legacy mainframe applications did not
provide the architectural flexibility needed to meet the changing business requirements of the modern
publishing organization. With the introduction of Object Oriented systems, the need for an architecture–
centered process became a critical success factor. Object reuse, layered system components, data
abstraction, web based user interfaces, CORBA, and rapid development and deployment processes all
provide economic incentives for object technologies. However, adopting the latest object oriented technology,
without an adequate understanding of how this technology fits a specific architecture, risks the creation of an
instant legacy system.
Publishing software systems must be architected in order to deal with the current and future needs of the
business organization. Managing software projects using architecture–centered methodologies must be an
intentional step in the process of deploying information systems – not an accidental by–product of the
software acquisition and integration process.
Enterprise Architecture definition
System architecture
The Role of EA
Enterprise Frameworks:
Zachman Framework
The Open Group’s Architecture Framework (TOGAF)
The Foundation for Execution
Business architecture
Information architecture
Application architecture
Technology architecture
Implementation
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMSacijjournal
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds.
Ar Accelerating Converged Infrastructure With FlexpodMichael Hudak
IDC investigates the transformation of IT delivery in the datacenter and the emerging role of pretested solutions that focus on unified, shared infrastructure. The paper focuses on the advent of converged infrastructure solutions that simplify the deployment and management of virtualized environments spanning server, storage, and networking components. The paper then takes a closer look at the FlexPod datacenter solution offered by NetApp and Cisco, with a focus on the VMware vSphere design configuration. IDC examines the importance of professional services to delivering the solution and the key role of a collaborative support model aimed at streamlining the support process for customers and channel partners.
Technology organization environment framework in cloud computingTELKOMNIKA JOURNAL
Cloud Computing is a rapidly emerging technology over the last few years, that has
abolished the burden of purchasing heavy hardware and software. Cloud computing
has been advantageous to Small and Medium-sized Enterprises (SMEs), though many
SMEs have not adopted to delve into its appealing benefits. To increase the cloud
adoption rate in these Enterprises, the most important thing is to understand the
aspects which influence the cloud adoption. The article focuses on these factors, which
influence the use of cloud services by establishing the three layer hierarchical framework
based on the grounded on the Technology Oriented Environmental (TOE)
framework through systematic literature review. Because cloud-based solutions offer
numerous benefits for companies, they have precious cloud determinants. This paper
therefore took into account the Technology Organization Environment TOE model for
Cloud Computing adoption. In addition, the questionaries designed at the end also
indicate the significant connection in the decision of adoption between three context
of TOE. Moreover, the designed questionaries has been used for the analysis of cloud
computing adoption in Bangladeshi SMEs.
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESSijccsa
The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide
advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.
Expert integrated systems are more than a static stack of well tuned
components—a server, some storage, networking and
database software, serving a fixed application at the top. Instead,
these systems are based on “patterns of expertise” which can
dramatically improve the responsiveness of the business.
IBM Global Financing can tailor financing solutions to your specific IT needs. For more information on great rates, flexible payment plans and loans, and asset buyback and disposal
Ar Accelerating Converged Infrastructure With FlexpodMichael Hudak
IDC investigates the transformation of IT delivery in the datacenter and the emerging role of pretested solutions that focus on unified, shared infrastructure. The paper focuses on the advent of converged infrastructure solutions that simplify the deployment and management of virtualized environments spanning server, storage, and networking components. The paper then takes a closer look at the FlexPod datacenter solution offered by NetApp and Cisco, with a focus on the VMware vSphere design configuration. IDC examines the importance of professional services to delivering the solution and the key role of a collaborative support model aimed at streamlining the support process for customers and channel partners.
Technology organization environment framework in cloud computingTELKOMNIKA JOURNAL
Cloud Computing is a rapidly emerging technology over the last few years, that has
abolished the burden of purchasing heavy hardware and software. Cloud computing
has been advantageous to Small and Medium-sized Enterprises (SMEs), though many
SMEs have not adopted to delve into its appealing benefits. To increase the cloud
adoption rate in these Enterprises, the most important thing is to understand the
aspects which influence the cloud adoption. The article focuses on these factors, which
influence the use of cloud services by establishing the three layer hierarchical framework
based on the grounded on the Technology Oriented Environmental (TOE)
framework through systematic literature review. Because cloud-based solutions offer
numerous benefits for companies, they have precious cloud determinants. This paper
therefore took into account the Technology Organization Environment TOE model for
Cloud Computing adoption. In addition, the questionaries designed at the end also
indicate the significant connection in the decision of adoption between three context
of TOE. Moreover, the designed questionaries has been used for the analysis of cloud
computing adoption in Bangladeshi SMEs.
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESSijccsa
The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide
advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.
Expert integrated systems are more than a static stack of well tuned
components—a server, some storage, networking and
database software, serving a fixed application at the top. Instead,
these systems are based on “patterns of expertise” which can
dramatically improve the responsiveness of the business.
IBM Global Financing can tailor financing solutions to your specific IT needs. For more information on great rates, flexible payment plans and loans, and asset buyback and disposal
Investigating the use of an Artificial Intelligence Model in an ERP Cloud-Bas...AI Publications
Enterprise Resource Planning (ERP) systems are necessary to improve an enterprise's management performance. However, the perception of information technology (IT) professionals about the integration of artificial intelligence (AI) and machine learning with ERP cloud service platforms is unknown. Few studies have examined how leaders can implement AI for strategic management, but no study has qualitatively explored AIs integration in the cloud ERP system. This qualitative phenomenological study explored IT professionals’ perceptions regarding the integration of AI and Supervised-machine (S-machine) learning into cloud service platforms in the enhancement of the cloud ERP system. Two research questions were developed for this study: 1) What are the perceptions of IT professionals regarding the use of an AI model to integrate SaaS and ERP? and 2) What are the perceptions of IT professionals regarding how AI can be integrated in order to enhance the security of using an ERP cloud-based system? Through a hermeneutical lens and a focus on integrating the Application Programming Interface (API), purposive sampling was used to interview five AI experts, three Machine Learning (ML) experts, five Cybersecurity experts, and two Cloud Service Providers provided their lived experiences with AI and S-machine learning. Five main themes emerged, including 1) use of an AI model to integrate SaaS and ERP helped perform work efficiently, 2) challenges for integrating AI into cloud service ERP and SaaS, 3) resources needed to fully implement an AI into cloud-service ERP or SaaS, 4) the best practices for developing and implementing an AI model for ERP and SaaS, and 5) how security of an ERP clouds-based system is optimized by integrating AI. The culmination of these findings has positive implications for individuals and organizations to improve management performance. While this study does not proposal a new theory, this study extends current literature on the application of theories related to technology integration.
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALijcsit
ABSTRACT
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
ISWC 2012 - Industry Track: "Linked Enterprise Data: leveraging the Semantic ...Antidot
ISWC 2012 - Industry Track: "Linked Enterprise Data: leveraging the Semantic Web stack in a corporate IS environment."
This paper has been selected and presented in the Industry track at ISWC 2012 Boston by Fabrice Lacroix – Antidot
This paper has been selected and presented in the Industry track at ISWC 2012 Boston by Fabrice Lacroix – Antidot.
ORIGINAL PAPERFuture software organizations – agile goals .docxvannagoforth
ORIGINAL PAPER
Future software organizations – agile goals and roles
Petri Kettunen1 & Maarit Laanti2
Received: 31 July 2017 /Accepted: 5 December 2017 /Published online: 16 December 2017
# The Author(s) 2017. This article is an open access publication
Abstract
Digital transformation is rapidly causing major, even disruptive changes in many industries. Moreover, global developments like
digital platforms (cloud) and IoTcreate fundamentally new connections at many levels between objects, organizations and people
(systems-of-systems). These are by nature dynamic and often work in real time – further increasing the complexity. These
systemic changes bring up new profound questions: What are those new software-intensive systems like? How are they created
and developed? Which principles should guide such organizational design? Agile enterprises are by definition proficient with
such capabilities. What solutions are the current scaled agile frameworks such as SAFe and LeSS proposing, and why? In this
paper, we aim to recognize the design principles of future software organizations, and discuss existing experiences from various
different organizations under transformations, and the insights gained. The purpose is to systematize this by proposing a
competence development impact-mapping grid for new digitalization drivers and goals with potential solutions based on our
agile software enterprise transformation experiences. Our research approach is based on the resource-based and competence-
based views (RBV, CBV) of organizations. We point out how most decision-making in companies will be more and more
software-related when companies focus on software. This has profound impacts on organizational designs, roles and competen-
cies. Moreover, increasing data-intensification poses new demands for more efficient organizational data processing and effective
knowledge utilization capabilities. However, decisive systematic transformations of companies bring new powerful tools for
steering successfully under such new business conditions. We demonstrate this via real-life examples.
Keywords Digital transformation . SAFe . LeSS . Agile enterprise . Systems thinking . Value streams
Introduction
Digital transformations are a cause of rapid and even disrup-
tive change in a majority of companies and future competitive
environments. Fundamentally novel models for organizations
and businesses (like Uber-type) are emerging, and traditional
companies as well must consider their structure and their roles
in achieving new business goals. Both the software producer
organization and the customer viewpoints should be under-
stood via comprehensive sense making. Companies now be-
gin to focus on software – either following strategy, or ad hoc,
when forced by competitive pressure imposed on them by
digitalization.
We view future competitive companies as agile and sus-
tainable, as well as more fundamentally software-based with
respect to both their outcomes (products ...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
An information system_architectural_framework
1. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
An Information System Architectural Framework
for Enterprise Application Integration
André Vasconcelos Miguel Mira da Silva António Fernandes José Tribolet
CEO - Centro de Engenharia Instituto Superior Técnico Instituto Superior Técnico CEO - Centro de Engenharia
Organizacional, INESC Av. Rovisco Pais Av. Rovisco Pais Organizacional, INESC
Rua Alves Redol 9 1049-001 Lisboa, Portugal 1049-001 Lisboa, Portugal Rua Alves Redol 9
1000-029 Lisboa, Portugal 1000-029 Lisboa, Portugal
andre.vasconcelos@ceo.inesc.pt mms@dei.ist.utl.pt antonio.fernandes@gsi.inesc.pt jose.tribolet@ceo.inesc.pt
Abstract Although this might be true, within certain proprietary
IS, the fact is that more and more organizations are
Information system (IS) architectures have not paid installing a number of incompatible information systems
enough attention to integration in the past because (some are ERPs, but most are specialized for a specific
integration was not important to build ISs from scratch. task) that cannot share a single database but need to share
However, with the variety and number of ISs in data. So the need to integrate information systems cannot
medium/large organizations increasing, including ERP be avoided anymore, and this leads to new challenges in
systems, the need for integration is bigger than ever. terms of information system architectures.
Furthermore, most organizations now want to integrate In this paper we build on previous research performed
their ISs with those belonging to other organizations. In by our research group (CEO) in this area and complement
this paper we propose an extension to our previous this research with a proposal to incorporate integration
proposals for representing IS architectures in order to aspects into an ISA.
properly support a large variety of integration scenarios The paper starts with an overview of information
between IS, including intra and inter organizations. In system architectures and presents our own CEO
particular we support manual and automatic, framework that had already identified high-level concepts
synchronous and asynchronous integration. We also for representing integration. In particular, a concept called
present an example to illustrate the proposal with real “IS Service” can be used to represent integration between
world IS integration needs. two information system components. In our previous
work however, nothing had been proposed to represent
Keywords: Information System Architecture, Information integration at the application or technological levels.
System Integration, CEO framework, Enterprise We then present a brief introduction to the most
Architecture, Enterprise Application Integration. important concepts in integration, in particular to show
how much richer services integration can provide for than
the current RPC-like synchronous services. These RPC-
1. Introduction like services, for which Web Services [2] are but the latest
incarnation, can be used to integrate software
components, but are clearly inappropriate to integrate
Integration between software components has always
information systems – especially across organizations.
been a fundamental part of any information system.
Assuming the limitations of current ISA to represent
Recently, its importance has been growing due to the need
integration are clear, we then propose a set of new
of integrating diverse information systems, both within
concepts, namely the IT Integration Block and the IT
and between organizations. The move towards ERPs in
Integration Service, which together can describe a variety
the last 10 years has not reduced the need for integration,
of real-world integration scenarios in ISA. The “Service”
but it has even increased it. And integrating diverse
concept is not limited to synchronous integration
information systems to react online to external events is a
anymore. In particular, we propose that integration should
necessary condition for e-business [1].
be classified according to automation level (manual or
Information system architectures (ISAs) have not paid
automatic) and role type (source or target). We also
sufficient importance to integration because they assume
propose that integration services should be characterized
that enforcing the existence of a single database
according to their technological, synchronism, and
eliminates the need for integration.
organizational level.
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 1
2. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
Finally we present a real-world example taken from a However, it should not be a definition of the software
project on food safety in which we participate. This used to implement the information system. Spewak also
example illustrates how the concepts proposed in the proposes a methodology – Enterprise Architecture
paper can be used to represent integration between Planning (EAP) – to define an application architecture
information systems, both at the IS and IT levels. The from informational and business requirements [9].
results obtained are then discussed and compared against More recently, several authors have adapted
other common approaches. Zachman’s framework and Spewak’s EAP to better
address their needs, including several proposals know as
2. Overview of Information System the American Federal Government [12], Joint Technical
Architecture Architecture [13], and the Treasury Enterprise
Architecture Framework [14].
The Information System Architecture (or ISA, for 2.3. Technological Architecture
short) represents the structure of the components, their
relationships, principles and directives [3] with the main This architecture defines the technologies that provide
purpose of supporting business [4]. an environment for application building and deployment.
In the 80s, a software architecture and ISA were At this level, the major technological concepts are
considered synonymous. But in the 90s emerged the need identified, such as technologies to implement
for manipulating concepts that exceeded the description applications, inter-process communication, data storage,
of how a system was internally built. The Zachman and so on [9].
Framework [5] can be considered the first important At Technological Architecture level, EAB (Enterprise
signal that software architectures were not enough. IT Architecture Blueprints) is a reference landmark [15].
While software architectures represent internal system Boar confirmed that IT architectures do not have a
details (using, for example, E-R and DFD diagrams) ISA repeatable, coherent, non-ambiguous and easily
focus on the high-level business processes [6], [7]. Using perceptible representation [15], proposing a set of
the “city” as a metaphor, we can use the concept of “IS blueprints for defining IT architectures in a systematic,
urbanization” to emphasize the need for models to guide coherent and rigorous way. However, all these proposals
the evolution of IS independently of current technological introduce new notions and icons, not supported by any
trends [8]. rules or standards. As a result, potential users are reluctant
An ISA can be divided into three levels [9]: to adopt these proposals because they are forced to
Informational (or Data) Architecture – represents acquire a high-level knowledge and experience before
main data types that support business; actually defining any IT architecture.
Application Architecture – defines applications
needed for data management and business support; 2.4. Comparison with Software Architectures
Technological Architecture – represents the main In the 90’s, software architecture had similar concerns.
technologies used in application implementation and In particular, there was no consensus in software
the infrastructures that provide an environment for IS architecture concepts [16]. As a result, the IEEE formed a
deployment. taskforce that defined a standard called “Recommended
Practice for Architectural Description of Software-
2.1. Informational Architecture Intensive Systems” to provide a conceptual framework for
The major purpose of the Informational Architecture is software architecture [6].
to identify and define the main data types that support Based on this IEEE standard, the Open Group
business development [9], [10]. For example, data (the proposed the TOGAF (The Open Group Architectural
support of the informational architecture) can be Framework) framework for ISA design and evaluation
categorized according to different dimensions, including: [17]. This framework provides not only a methodology
primitive vs. derived, private vs. public, and historical vs. for ISA development but also provides a taxonomy,
operational vs. provisional [11]. architectural principles and standards for ISA, mostly at
the technological level.
2.2. Application Architecture In addition, TOGAF proposes a technical reference
model that defines a taxonomy for coherent, consistent
The second architecture level defines the main
and hierarchical description of the services provided by
applications needed for data management and business
the application platform such as data management,
support [10]. This architecture defines the major
network, operating system, transaction processing, and
functional components of the architecture to guarantee
system administration. Finally, TOGAF also presents
access to the data in acceptable time, format and cost [9].
several architecture qualities that are inherent to the
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 2
3. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
architecture definition, such as performance, availability,
usability, adaptability, and portability. < CRUD
process
However, the TOGAF framework has several
limitations. The most import limitation is that the focus is
mainly technological, not addressing either the Business
informational or application architectures. Another service
limitation resides in the fact that only a set of IT notions IS Service
and principles are proposed, not concrete modeling
blueprints. This makes TOGAF interesting for thinking on relates
ISA from a technological viewpoint but clearly
inadequate for modeling ISA in a global and coherent Information Entity is used > IS Block has > operation
way.
2.5. The CEO Framework part of
In order to address the issues explained above, the
is implemented
Organizational Engineering Center (or CEO, for short, in
Portuguese) proposed the CEO framework [18] for
modeling enterprises using a restricted set of business relates
objects. The CEO framework was defined as an UML
profile [19] and evolved from recent research [20], [21]. exists
IT Block
Although the CEO framework cannot be used to define
a complete ISA, it presents some interesting extensions to IT Service
represent dependencies between businesses and systems.
The business objects defined in the framework are goals Figure 1. CEO UML Meta-model Extensions for ISA [22]
for strategy modeling; processes for business process
modeling, resources for business resource modeling, and The core concepts in the CEO framework profile are:
blocks for IS modeling. The CEO framework also ensures Business Process – a collection of activities that
consistency, easy of use and provides mechanisms to produces value to a customer;
maintain integrity with the ultimate goal of reducing the Information Entity – any person, place, physical thing
“impedance mismatch” between business and IT or concept that is relevant in the business context and
architectures. about which is possible and relevant (for the
Recently, CEO framework founding concepts at organization) to keep information;
Information System level where investigated and an UML IS Block – a collection of mechanisms and operations
profile for ISA modeling at informational, application and organized in order to manipulate data;
technological levels was proposed [22]. Figure 1 presents IT Block –infrastructure, application platform and
the current core concepts of the CEO framework (at ISA technological/software component that realizes (or
level). implements) an (or several) IS Block(s).
From a technological point of view the concepts
proposed are (represented bellow in Figure 2):
IT Infrastructure Block – represents the physical and
infra-structural concepts: the computational nodes
(servers, personal computers, mobile devices and so
on) and the non-computational nodes (for example,
printers, networks) that support application platforms;
IT Platform Block – represents the collection of
services needed for implementing and IT deploying
applications.
IT Application Block – represents the technological
implementation of an IS Block. At this level it is
relevant to consider the kind of IT Application Block
(namely presentation, logic, data and coordination
block), and its “technological principles” (for
example, if it is implemented using components,
modules, or objects), amongst other characteristics.
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 3
4. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
belonging to other companies, and technically is quite
IT Block feasible. However, in terms of IS architectures, it
becomes even more fuzzy to define the borders of an IS
and even the borders for an organization [23].
On the other hand, although there are many kinds of
integration, it is important to note that in the end of the
day all these are based on exchanging data between two
ISs [24]. The differences reside on how this data
IT Infrastructure Block IT Platform Block IT Application Block exchange occurs, what kind of data is exchanged, which
guarantees are offered, and so on. For example, the
Figure 2. IT Block metamodel method level exchanges data between two applications
while the data level exchanges data between two
It is interesting to note that in [22] some integration databases.
concepts are taken into account. Particular the Service Another source of confusion comes from the fact that
concept is proposed as an aggregation of operations integration is both a traditional technology but has also
provided by an architectural block, organized in three become very popular quite recently. In particular, Web
different categories: Services promise to revolutionize both EAI and B2B even
Business Service – a collection of operations though the technology behind – remote procedure call – is
provided by IS Blocks that support one (or several) nothing new. In fact, XML is just a data formatting
business process(es); language and solves only a small part of the integration
IS Service – a set of operations provided by an IS problem. Without transactions, security, and performance,
Block (to others IS Blocks); Web Services can be used to integrate applications inside
IT Service – the technological services provided by an IS but are clearly not appropriate for integrating IS,
application platforms (based on [17] research). and even less for B2B integration [25].
The Service is a core integration concept in ISA and Web Services discussed in a wider context become
will form the basis for our proposals presented in section even more confusing, from an ISA point of view. For
4. example, SOAP [26] – a standard for exchanging XML
between two applications – can be considered the most
2.6. Conclusion important part of Web Services. Not only SOAP
This overview demonstrates that, currently, there is addresses a small part of the integration problem –
still no mechanism to properly represent integration neglecting security, document types, quality of service,
concepts in ISA at all (informational, application and workflow definition, and so on – but also there are still
technological) levels in order to develop subsequent many problems to make SOAP compatible products to
inspection and/or simulation of different business and work together, e.g. Java and .NET.
technological scenarios. Though some recent approaches Besides that, SOAP is basically an old-fashion,
(for example CEO framework) provide a starting point for synchronous, non-transactional RPC and will suffer from
ISA modeling the integration concepts are not considered the problems experienced previously with DCOM and
in detail. CORBA [27]. And, in our opinion, the main differences
in SOAP – basically the adoption of XML and being
supported by most vendors – will not be enough to
3. Information Systems Integration
overcome these technological problems.
Fortunately, integration is much more rich and
Integration – also known as EAI, for Enterprise
powerful than Web Services advocates want us to believe
Application Integration – was always an important part of
and offers nowadays a rich variety of dimensions that
any information system. The popularity of standard ERP
could and should be represented as part of an IS
packages in the 90s was supposed to solve the need for
architecture. Some examples of issues around integration,
integration, but in fact only enlarged the problem; since
in no particular order, are:
the ERP cannot replace all operational IS, in particular the
• Integration can occur at the data, method, interface,
operational ISs that run the business, all these remaining
portal, and process level – this variety basically
ISs have to be integrated with the ERP.
represents how the application “sees” integration,
Since most organizations nowadays are more or less
although all levels of course exchange data;
satisfied with their IS, the main challenge became to
integrate internal ISs with other external ISs. This • Integration can occur inside a computer, inside an
integration between organizations – sometimes called Intranet, inside an Extranet, or on the public Internet
B2B integration – just extends integration to ISs – each zone will have its own guarantees of
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 4
5. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
bandwidth, require different kinds of security, and so The technological architecture defines which
on; technologies are used to exchange data, such as XML
• Integration can occur inside a department, inside an for formatting data structures, HTTP for
enterprise, inside an holding, inside a value chain, or communication protocol, and digital certificates for
between two (or more) unrelated enterprises – security. This is the level most computer experts are
decisions can usually be imposed inside a company, familiar with, but it address only a small part of the
but are more difficult inside an holding and even integration equation and is only relevant to those
more difficult (or downright impossible) to impose writing software.
on another company; This paper focus on the application and technological
• Integration can occur inside the same country or architectures using both existing and novel concepts:
between countries – for example, digital certificates The existing IS Block and IS Service concepts
issued in the USA cannot be used to sign digital (proposed in [22]) can be used to represent the
invoices in Europe; operations an information system depend on another.
• Integration can be synchronous or asynchronous – The novel IT Integration Block (a specialization of IT
asynchronous integration has no reply but has higher Block) and IT Service concepts (proposed in [22])
performance and is scalable; can be used to represent which applications exchange
• Integration can be transactional – guaranteeing that data and how they exchange data.
all integration steps take place (or none at all) and
extending the transaction concept to the other IS; 4. Modeling Integration in ISA
• Integration can offer many levels of security, from
zero to non-repudiation of reception. These different The previous sections emphasized the inexistence of
levels of security should be applied only when any praxis, mechanism or language for modeling
necessary (in particular, between companies on the integration concepts in ISA.
public Internet) since they complicate integration, This section proposes an original collection of
increase costs and reduce performance; concepts (including their graphical representations) that
• Integration can be used to exchange bytes (e.g. allow the semantic manipulation of integration in ISA.
TCP/IP), data structures (XML), documents such as
orders and invoices (EDIFACT or UBL), workflows 4.1. Integration at IS level
(ebXML) or business processes – most integration The representation of a concept is critical for its
projects these days are based on XML, but the real discussion and abstraction. In this paper, in compliance
problems start when documents are exchanged based with the CEO framework introduced in Section 2.5, we
on workflows that represent business processes; propose a set of extensions to the UML modeling
• Integration can be performed directly between two (standard) language [19] in order to accommodate the
ISs (e.g. peer-to-peer) or indirectly via an new integration concepts.
intermediary (e.g. a message broker) – most In fact, the CEO Framework did not define properly
asynchronous integration products also use an the concepts (and corresponding UML stereotypes) for
intermediary to store messages, but only at the Integration modeling in ISA, although these concepts are
implementation level; a broker offers more added crucial in any ISA.
value services, such as converting data between two We propose that the «IS Service» concept should be
different formats, defining and executing workflows, used as the core concept for modeling integration at the IS
and so on. level because the IS Service already describes how the
Of course, some of these issues are more important for operations, belonging to an IS Block, are aggregated and
some levels of IS architectures than other issues: made available to other IS Blocks. Although no new
The informational architecture defines what kind of stereotype is proposed at the application level, the IS
data types (high level, such as orders and invoices, Service is a foundation for modeling integration in ISA at
not integers and strings) are exchanged between two the application level and can be easily extended later if
ISs. Although these days XML seems so important, really necessary.
this level is not interested whether the document is
formatted according to EDIFACT or XML. 4.2. Integration IT level
The application architecture defines which
applications exchange data, what kind of data they The integration process can be divided into three parts
exchange and how they exchange that data. For (represented bellow in Figure 3): a source (the system that
example, exchange can be synchronous or calls the service or sends the message), a target and the
asynchronous, manual or automatic, and so on. integration port itself representing the relation between
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 5
6. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
source and target. At the IT level we propose to split the The IT Integration Block is not further specialized to
characteristics associated exclusively to the source, target, accommodate the large diversity of concepts and the
and those associated to the relation. continuously progression in this area. However,
depending on the objectives and the target audience, the
Source Relation Target IT Integration Block can be specialized to model
integration specific concepts such as message broker,
Figure 3. Integration Process WebServices, and so on. The case study, presented in the
Considering only the characteristics associated next section, exemplifies these issues.
exclusively to the system (source or target), the The IT Integration Service (proposed in [22]) can be
integration can be described along two dimensions: used to model the relation port of the integration process
Automation Level – the integration services executed as presented in Figure 3. We propose this component be
in the source or target system are accomplished characterized in terms of:
Automatically (no human interference) or Manually Technological Level –if integration takes place inside
(implies human interaction); a computer, inside an Intranet, inside an Extranet, or
Role Type – the system may be the source or the on the public Internet.
target of data. For example, in a web service, the Synchronism Level – integration between IT Blocks
source is the client; in a messaging product, the may occur synchronously (as in RPC, for example),
source is the IS sending the message. or asynchronously (usually with no reply, scalable
Using the IT concepts presented in Figure 2, we and with higher performance).
propose that IT integration should be adopted as a novel Organizational Level – distinguishes integration
concept to encapsulate both the platform (e.g., J2EE, .Net, between a department, inside an enterprise, inside an
CORBA, etc.) and/or the IT Application. Figure 4 holding, inside a value chain, or between two (or
presents our proposed «IT Integration Block» in the scope more) unrelated organizations.
of Figure 2. Figure 6 presents the proposed UML extensions in
detail.
IT Block
«IT Integration Service»
Technological Level: {Computer, Intranet, Extranet,
Internet}
Synchronism Level: {Asynchronous, Synchronous}
Organizational Level: {Department, Enterprise,
Enterprise Group, Value Chain, General Public}
IT Infrastructure Block IT Platform Block IT Application Block
Figure 6.IT Integration Service
The next section applies all these concepts to a
concrete real world example in order to validate these
proposals.
5. Case Study: SafeFood
IT Integration Block
The main objective of the SafeFood project is to create
an information system that supports retail company’s
Figure 4. Proposed UML extension for modeling efforts to guarantee the quality of their food products
integration concepts in ISA through the continuous exchange of (almost) real-time
Figure 5 presents the attributes proposed above for the data about those products.
IT Integration Block UML stereotype (in detail). The project involves not only a perishable products
distribution company but also many other external
« IT Integration Block » organizations, mainly suppliers. All these entities already
have their own information systems that must be
Automation Level: {Automatic,, Manual} integrated. For example, the Control Quality department
Role Type: {Source, Target}
is responsible for the products acceptance or rejection.
The products storage and their distribution to the stores
are performed by the Logistics Department. The Stores
Figure 5. IT Integration Block in detail are responsible for selling products to the customer. The
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 6
7. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
Agricultural unit is responsible for contract management « IS Block »
SafeFood
with the Producers Organization (named ahead as OP), System
which commits to delivery the perishable products on the
negotiated dates.
In Figure 7 the entire ISA at the application level is « IS Block »
Agricultural
« IS Block »
Commercial
« IS Block »
Procurement
« IS Block »
presented. The dependencies between the IS Blocks are Management
System
Management
System
Management
System
OP System
presented using «IS Service». The arrows mean the implementedby implementedby implementedby implementedby
dependencies between the IS Blocks. For example, the IS « IT Block» « IT Block» « IT Block» « IT Block»
Block “SafeFood System” depends from the service Agricultural Commercial Procurement
Management Management Management OP
provide by the IS Service “Control Quality API”.
« IS Service
»
« IT Integration Block » « IT Integration Block »
OP API
Contract Information Contract Information
sender Receiver
« IS Block » « IS Block » Automation Level: Automatic Automation Level: Automatic
Role Type: Source Role Type: Target
SafeFood
OP System « IT Integration Service »
System
Contract Information
« IS Service
» Technological Level: Extranet
SafeFood
Synchronism Level: Asynchronous
API Organizational Level: Value Chain
« IS Service
»
« IS Service
»
« IS Service
» Figure 9. Integration between IT Blocks in detail
Control
Logistics API Stores API
Quality API
The integration between the IT Block “Commercial
« IS Block » « IS Block » « IS Block »
Management” and the IT Block “OP” is performed
Control Quality Logistics
System System
Stores System through two IT Integration Blocks and an IT Integration
Service. In this example, the “Contract Information” is a
Figure 7. ISA at the application level data exchange between two organizations belonging to
the same Value Chain. This exchange is asynchronous
The dependencies between IS Blocks represent points and takes place inside an extranet (for example, a VPN on
of integration between those systems. In Figure 8 the the Internet).
dependencies between two concrete IS Blocks are The integration between the commercial management
represented in detail. IS and the procurement management is described in
« IS Service » Figure 10. This integration is accomplished via a
SafeFood API
Contract definition
intermediary system broker. The IT Integration Block
« IS Block »
Prices Proposal
« IS Block »
from the IT Block Message Broker corresponds to the
Adapters usually used in the System Broker.
SafeFood
OP System
System « IS Service »
« IS Block » « IS Block » « IS Block »
Comercial Procurement
Message
OP API Management
BrokerSystem Management
System System
Information of the lots Is implement Is implement
Is implement
Crops Confirmation
Prices Acceptance « IT Block» « IT Block» « IT Block»
Comercial Message Procurement
Management Broker Management
Figure 8. Dependences between SafeFood System and OP « IT Integration Block » « IT Integration Block » « IT Integration Block »
System Product Information
sender
Product Information
Adapter
Product Information
Receiver
Automation level: Automatic Automation level: Automatic Automation level: Automatic
Informational Level: Source Informational Level: Source / Target Informational Level: Target
The IS Block “SafeFood System” could be further
decomposed into three information systems (Agricultural « IT Integration Service » « IT Integration Service »
Product Information
Management System, Commercial Management System Technological level: Extranet
Product Information
Technological level: Extranet
and Procurement Management System) as presented in Synchronism Level: Assynchronous
Organizational Level: Value Chain
Synchronism Level: Assynchronous
Organizational Level: Value Chain
Figure 9. Each of these IS Blocks are implement by an IT
Block. Figure 10. Integration using a System Broker
In the example the Commercial System uses a Broker
to send the products information to the Procurement
System. A message broker is an integration intermediary
that can be used to exchange messages between other
information systems. This case study is particularly
interesting not only because message brokers are
positioning themselves as alternatives to both ERP and
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 7
8. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
application servers, but also because message brokers Another import approach in ISA is the TOGAF
play both the role of an information system and of an framework. When comparing TOGAF and our approach
integration system. one can notice that TOGAF has a different focus –
developing other issues, not addressed in our approach as
6. Discussion the architecture development method (ADM), but
disregarding others. Namely, TOGAF does not address
The case study presented in previous section illustrates integration issues in ISA at informational or application
possible scenarios where our proposals for representing levels (it focus at IT level); TOGAF also does not concern
integration in the ISA are explored. Further, the case about the notation used to represent the ISA (it address
study exemplifies how to represent the ISA at only the concepts in a ISA).
informational, application and technological levels,
having integration as its main focus. 7. Conclusion
The proposed extensions to the CEO Framework
provide the conceptual tools and visual modeling In this paper we first presented an overview of
primitives (supported in a standard modeling language – information system architectures and then concentrated on
UML) to model several integration concepts. The major their lack of support to properly represent integration. We
gap between our approach and existing research is on then proceeded with a brief introduction to the variety of
addressing integration not only from a technological integration models that exist in the real world, trying to
perspective but also from an informational and demystify the idea that all integration problems can be
application perspectives based on an organizational solved with Web Services.
framework. The main contribution of this paper is an extension to
Integration is sometimes only explored from a our previous proposal for representing ISA in order to
software-oriented perspective. This is usual the case when include a number of integration models at both the
using a pure software development approach (as waterfall application and IT levels. In particular, we proposed that
[28] or RUP [29]), where the focus is on a particular integration should have a number of characteristics (e.g.
system and on its implementation, not addressing the “big manual or automatic) and not be limited to synchronous
picture” – the relation between the new system and other services.
systems (from an informational, application and The paper also presented a real-world case study
technological perspectives). These software approaches (taken from a project in which we are involved) in order
are still valid when implementing a system, however they to illustrate the proposal with concrete integration
do not provide to the system architect the global problems between information systems.
perspective for planning and discussing integration In the future we intend to explore other integration
concepts in the global ISA (that should precede the concepts at the technological level, in particular how to
implementation of a particular software system). map the whole variety of integration technologies
Other approaches have a more general aim. For currently available to a limited number of primitive
instance, Zachman framework [5] provides the conceptual concepts. We are particularly interested in Web Services
tools for organizing and classifying the concepts that and integration across organizations where reliability and
should be addressed when planning the ISA (and latter the security are key issues.
enterprise architecture). Zachman framework provides a We are also interested to develop the technological
more general view over the enterprise and the IS, however tools to model integration, quantify different integration
it does not propose any notation for representation of ISA scenarios in information system architecture and help the
or integration concepts. Our approach, on the other hand, system architect in defining a system architecture using
integrated in an enterprise modeling framework (CEO different integration patterns.
framework) and defining the notation for integration
modeling in ISA (based on a standard modeling language) 8. References
addresses these issues.
[15] proposes a set of blueprints for modeling [1] Kalakota, Ravi and Marcia Robinson, E-Business 2.0,
information systems at a technological level (as presented Addison-Wesley Longman, Incorporated, 2000.
in section 2.3), introducing new notions and icons, not [2] W3C, World Wide Web Consortium, Web Services, 2001.
supported by any tools or standards. Our approach, as http://www.w3.org/2002/ws.
presented, is supported on the universal modeling [3] Garlan, D. et al., Architectural Mismatch (Why It’s Hard to
language (a standard supported in several tools) and Build Systems Out of Existing Parts), Proceedings 17th
addresses integration not only from the technological International Conference on Software Engineering, Seatle, WA,
April 23-30 1995, pp.170-185.
point of view.
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 8
9. Proceedings of the 37th Hawaii International Conference on System Sciences - 2004
[4] Maes, Rik, Daan Rijsenbrij, Onno Truijens, and Hans [26] Newcomer, Eric, Understanding Web Services: XML,
Goedvolk, Redefining Business – IT Alignment Through a WSDL, SOAP, and UDDI, Addison Wesley Professional,
Unified Framework, White Paper, May 2000. (ISBN: 0201750813), 2002.
http://www.cs.vu.nl/~daan/ [27] M. Mira da Silva, Information Systems Integration (In
[5] Zachman, John, A Framework for Information System Portuguese), FCA, 2003.
Architecture, IBM System Journal Vol.26 Nº 3, 1987, p.276 – [28] Boehm, Barry W., Software Engineering Economics,
292. Englewood Cliffs, NJ, Prentice Hall 1981.
[6] IEEE Architecture Working Group, Recommended Practice [29] Jacobson, Ivar, Grady Booch, and James Rumbaugh, The
for Architecture Description – Draft IEEE standard Unified Software Development Process, Adisson Wesley, 1999.
P1471/D4.1, IEEE, December 1998.
[7] Zijden, Stefan, Hans Goedvolk, and Daan Rijsenbrij,
Architecture: Enabling Business and IT Alignment in
Information System Development, 2000.
http://www.cs.vu.nl/~daan/
[8] Sassoon, Urbanisation des systèmes d’information, 1998
(in French).
[9] Spewak, Steven, and Steven Hill, Enterprise Architecture
Planning: Developing a Blueprint for Data, Applications and
Technology, Wiley-QED, ISBN 0-471-599859, 1992.
[10] DeBoever, L., Enterprise Architecture Boot Camp & Best
Practices: A Workshop, Meta Group, 1997.
[11] Inmon, W. H., Data Architecture – The Information
Paradigm, QED Technical Publishing Group, 1999.
[12] Federal Enterprise Architecture Framework, version 1.1.,
September 1999
[13] Department of Defense Joint Technical Architecture, July
2002.
[14] Treasury Enterprise Architecture Framework, July 2002.
[15] Boar, Bernard, Constructing Blueprints for Enterprise IT
Architecture, John Wiley & Sons, 1999.
[16] How do You Define Software Architecture?, Software
Engineering Institute, Carnegie Mellon University, December
2000. http://www.sei.cmu.edu/architecture/definitions.html
[17] Open Group, The Open Group Architectural Framework
(TOGAF) – Version 7, November 2001.
[18] Vasconcelos, A., A. Caetano, J. Neves, P. Sinogas, R.
Mendes, and J. Tribolet, A Framework for Modeling Strategy,
Business Processes and Information Systems, Proceedings of 5th
International Enterprise Distributed Object Computing
Conference EDOC, Seatle, USA, September 2001.
[19] UML Proposal to the Object Management Group, 1997.
http://www.rational.com/uml
[20] T. W. Malone et al., Tools for inventing organizations:
Towards a handbook of organizational processes, Management
Science, March 1999.
[21] Eriksson, Hans-Erik, and Magnus Penker, Business
Modeling with UML: Business Patterns at Work, John Wiley &
Sons, ISBN 0-471-29551-5, 2000.
[22] Vasconcelos, A., P. Sousa, and J. Tribolet, Information
System Architectures: Representation, Planning and Evaluation,
Proceedings of International Conference on Computer,
Communication and Control Technologies Orlando, U.S.A.,
July 2003.
[23] Linthicum, D., B2B Application Integration, Addison-
Wesley, 2001.
[24] Vernadat, François, Enterprise Modeling and Integration,
London, Chapman & Hall, 1996.
[25] M. Mira da Silva. Challenges for EDI Adoption by Small
and Medium-size Enterprises (SME). Accepted to the IADIS
International Conference e-Society, Lisbon, Portugal, 2003.
0-7695-2056-1/04 $17.00 (C) 2004 IEEE 9