The document does not contain any text to summarize. It only contains the letters "AS". In 3 sentences or less, I am unable to provide a meaningful summary as there is no context or content to summarize from the given text.
Introduction to DevScope
Enterprise Application Integration Challenges
Introduction to BizTalk Server 2010
- What is? What does BizTalk do? And what type of problems it solves?
- Major features
Job Market
Integration intervention: Get your apps and data up to speedKenneth Peeples
SOA has been the defacto methodology for enterprise application and process integration, because loosely coupled components and composite applications are more agile and efficient. The perfect solution? Not quite.
The data’s always been the problem. The most efficient and agile applications and services can be dragged down by the point-to-point data connections of a traditional data integration stack. Virtualized data services can eliminate the friction and get your applications up to speed.
In this webinar we'll show you how to (replay at http://www.redhat.com/en/about/events/integration-intervention-get-your-apps-and-data-speed):
-Quickly and easily create a virtual data services layer to plug data into your SOA infrastructure for an agile and efficient solution
-Derive more business value from your services.
Open Group Conference 2011 - The Canonical Data ZoneGary Farrow
This is a presentation I gave at the Open Group Conference in London 2011. It discusses the role of data in Service Oriented Architectures and introduces the idea of a 'Canonical Data Zone' (CDZ). The issues in selecting a data standard for the CDZ are discussed with examples from the payments systems processing domain.
BizTalk Server – Basics principles of mapsSandro Pereira
Maps or transformations are one of the most common components in the integration processes. They act as essential translators in the decoupling between the different systems to connect. In this article, as we explore the BizTalk Mapper Designer, we will explain its main concepts, covering slightly themes such as product architecture, BizTalk Schemas and some of the most widely used standards in the translation of messages.
Introduction to DevScope
Enterprise Application Integration Challenges
Introduction to BizTalk Server 2010
- What is? What does BizTalk do? And what type of problems it solves?
- Major features
Job Market
Integration intervention: Get your apps and data up to speedKenneth Peeples
SOA has been the defacto methodology for enterprise application and process integration, because loosely coupled components and composite applications are more agile and efficient. The perfect solution? Not quite.
The data’s always been the problem. The most efficient and agile applications and services can be dragged down by the point-to-point data connections of a traditional data integration stack. Virtualized data services can eliminate the friction and get your applications up to speed.
In this webinar we'll show you how to (replay at http://www.redhat.com/en/about/events/integration-intervention-get-your-apps-and-data-speed):
-Quickly and easily create a virtual data services layer to plug data into your SOA infrastructure for an agile and efficient solution
-Derive more business value from your services.
Open Group Conference 2011 - The Canonical Data ZoneGary Farrow
This is a presentation I gave at the Open Group Conference in London 2011. It discusses the role of data in Service Oriented Architectures and introduces the idea of a 'Canonical Data Zone' (CDZ). The issues in selecting a data standard for the CDZ are discussed with examples from the payments systems processing domain.
BizTalk Server – Basics principles of mapsSandro Pereira
Maps or transformations are one of the most common components in the integration processes. They act as essential translators in the decoupling between the different systems to connect. In this article, as we explore the BizTalk Mapper Designer, we will explain its main concepts, covering slightly themes such as product architecture, BizTalk Schemas and some of the most widely used standards in the translation of messages.
Enterprise Content Management, Documentum Overview. This presentation shows what is ECM, why we need ECM, EMC History, EMC Content Management Portfolio, Documentum and Captiva Products overview
The presentation on BizTalk Server 2009 discusses how it goes beyond traditional integration paradigms of hub and spoke and provide a hybrid architecture that takes advantage of key aspects of both models, namely scale-out for throughput and centralized management. It is discussed that the basic functions of BizTalk server includes: document transportation, document conversion and business process management. It is also shown how Information Worker services could add layers outside BizTalk server to provide extended functionalities including Business Activity Services (BAS), Business Activity Monitoring (BAM) and Human Workflow Services (HWS). In brief, BizTalk and application integration and how it processes messages along with a case study of a real application integration scenario is part of the presentation.
Front-Ending the Web with Microsoft Officegoodfriday
Come learn how to make your Web service instantly recognizable to over 400 million people worldwide. Hear how Microsoft Office has evolved to provide for developers to extend the world's most widely used productivity suite with services from the Web.
Enterprise Data Integration for Microsoft Dynamics CRMDaniel Cai
This is the deck that I used for my presentation for XrmVirtual on Apr 9, 2013, which discusses various options that you may have for Microsoft Dynamics CRM data migration and integration.
Data quality functions were already being provided as services for Unix, Windows and Linux, before the analysts of Gartner had invented the term SOA. For the most part, technical reasons were the decisive factor for this architecture. In addition to this, the implementation of service-oriented
architectures results in new and changed
requirements for data quality services
and also increases the opportunities and benefits which they can create.
Presentation was a part of INSIGHT Series webinar hosted monthly by Rapidflow Apps. This webinar was mainly to provide information to new customers on the capabilities of Oracle PIM Data Hub and the existing customers some of the new features in release R12 and the upgrade options
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)Daniel Cai
This is the deck that I presented to CRMUG Summit 2013 in Tampa. During the session, I tried to discuss various options that you may have for Microsoft Dynamics CRM data migration and integration, including some best practices that you can leverage. This deck is an updated version of my XrmVirtual presentation on Apr 9, 2013.
Logical Data Fabric and Data Mesh – Driving Business OutcomesDenodo
Watch full webinar here: https://buff.ly/3qgGjtA
Presented at TDWI VIRTUAL SUMMIT - Modernizing Data Management
While the technological advances of the past decade have addressed the scale of data processing and data storage, they have failed to address scale in other dimensions: proliferation of sources of data, diversity of data types and user persona, and speed of response to change. The essence of the data mesh and data fabric approaches is that it puts the customer first and focuses on outcomes instead of outputs.
In this session, Saptarshi Sengupta, Senior Director of Product Marketing at Denodo, will address key considerations and provide his insights on why some companies are succeeding with these approaches while others are not.
Watch On-Demand and Learn:
- Why a logical approach is necessary and how it aligns with data fabric and data mesh
- How some of the large enterprises are using logical data fabric and data mesh for their data and analytics needs
- Tips to create a good data management modernization roadmap for your organization
Enterprise Content Management, Documentum Overview. This presentation shows what is ECM, why we need ECM, EMC History, EMC Content Management Portfolio, Documentum and Captiva Products overview
The presentation on BizTalk Server 2009 discusses how it goes beyond traditional integration paradigms of hub and spoke and provide a hybrid architecture that takes advantage of key aspects of both models, namely scale-out for throughput and centralized management. It is discussed that the basic functions of BizTalk server includes: document transportation, document conversion and business process management. It is also shown how Information Worker services could add layers outside BizTalk server to provide extended functionalities including Business Activity Services (BAS), Business Activity Monitoring (BAM) and Human Workflow Services (HWS). In brief, BizTalk and application integration and how it processes messages along with a case study of a real application integration scenario is part of the presentation.
Front-Ending the Web with Microsoft Officegoodfriday
Come learn how to make your Web service instantly recognizable to over 400 million people worldwide. Hear how Microsoft Office has evolved to provide for developers to extend the world's most widely used productivity suite with services from the Web.
Enterprise Data Integration for Microsoft Dynamics CRMDaniel Cai
This is the deck that I used for my presentation for XrmVirtual on Apr 9, 2013, which discusses various options that you may have for Microsoft Dynamics CRM data migration and integration.
Data quality functions were already being provided as services for Unix, Windows and Linux, before the analysts of Gartner had invented the term SOA. For the most part, technical reasons were the decisive factor for this architecture. In addition to this, the implementation of service-oriented
architectures results in new and changed
requirements for data quality services
and also increases the opportunities and benefits which they can create.
Presentation was a part of INSIGHT Series webinar hosted monthly by Rapidflow Apps. This webinar was mainly to provide information to new customers on the capabilities of Oracle PIM Data Hub and the existing customers some of the new features in release R12 and the upgrade options
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)Daniel Cai
This is the deck that I presented to CRMUG Summit 2013 in Tampa. During the session, I tried to discuss various options that you may have for Microsoft Dynamics CRM data migration and integration, including some best practices that you can leverage. This deck is an updated version of my XrmVirtual presentation on Apr 9, 2013.
Logical Data Fabric and Data Mesh – Driving Business OutcomesDenodo
Watch full webinar here: https://buff.ly/3qgGjtA
Presented at TDWI VIRTUAL SUMMIT - Modernizing Data Management
While the technological advances of the past decade have addressed the scale of data processing and data storage, they have failed to address scale in other dimensions: proliferation of sources of data, diversity of data types and user persona, and speed of response to change. The essence of the data mesh and data fabric approaches is that it puts the customer first and focuses on outcomes instead of outputs.
In this session, Saptarshi Sengupta, Senior Director of Product Marketing at Denodo, will address key considerations and provide his insights on why some companies are succeeding with these approaches while others are not.
Watch On-Demand and Learn:
- Why a logical approach is necessary and how it aligns with data fabric and data mesh
- How some of the large enterprises are using logical data fabric and data mesh for their data and analytics needs
- Tips to create a good data management modernization roadmap for your organization
How can Oracle Forms (or other legacy) applications be modernized to fit in a contemporary IT architecture? Trends, concepts and technologies are discussed.
Organisations are adopting microservices to keep pace with business innovation; whilst needing to meet the resilience, scalability and security requirements critical for digital solutions. Enterprise relational DBs are often a barrier to this transformation, but they needn’t be.
This presentation delves into the challenges faced by enterprises during digital transformation and modernization initiatives which are often hamstrung by the inherent monolithic nature of enterprise databases.
Many Oracle data-centric applications consist of an intricate web of hundreds of tables, housing hundreds of thousands of lines of PL/SQL code executed within the database via packaged procedures. These relational databases have enabled us to safely and securely manage structured data for several decades, but over time they grow more complex and harder to maintain, slowing down delivery and seriously degrading application performance, business innovation all but grinds to a halt.
Given the impracticality and cost associated with complete rewrites, many organisations are turning to Microservices Architecture, to extract value from existing assets whilst gradually deconstructing the monolithic architecture to facilitate evolutionary changes.
This presentation outlines a systematic and phased approach, based on experience from multiple client initiatives, highlighting the crucial role of this transformation in enabling the creation of APIs that drive new business initiatives. The concept of domain separation, a pivotal element in the migration process, will be introduced, along with options to move certain data retrieval and processing to more appropriate architectures
Lessons from Building Large-Scale, Multi-Cloud, SaaS Software at DatabricksDatabricks
The cloud has become one of the most attractive ways for enterprises to purchase software, but it requires building products in a very different way from traditional software
IBM WebSphere Message Broker Application Development Presentation gives introduction to WMB and MQ concepts.
Proficiency Level: Beginner to Intermediate.
This document should not be considered as reference for WMB and MQ concepts. This is only an understanding document.
Please post your comments/reviews/suggestions/complaints here or email me: vvijayaraghava@hotmail.com
I tried to upload the Powerpoint presentation, but the document is not getting uploaded. Hence uploading the presentation in the form of PDF.
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Denodo
Watch full webinar here: https://bit.ly/34iCruM
Many organizations are embarking on strategically important journeys to embrace data and analytics. The goal can be to improve internal efficiencies, improve the customer experience, drive new business models and revenue streams, or – in the public sector – provide better services. All of these goals require empowering employees to act on data and analytics and to make data-driven decisions. However, getting data – the right data at the right time – to these employees is a huge challenge and traditional technologies and data architectures are simply not up to this task. This webinar will look at how organizations are using Data Virtualization to quickly and efficiently get data to the people that need it.
Attend this session to learn:
- The challenges organizations face when trying to get data to the business users in a timely manner
- How Data Virtualization can accelerate time-to-value for an organization’s data assets
- Examples of leading companies that used data virtualization to get the right data to the users at the right time
Enabling a Data Mesh Architecture with Data VirtualizationDenodo
Watch full webinar here: https://bit.ly/3rwWhyv
The Data Mesh architectural design was first proposed in 2019 by Zhamak Dehghani, principal technology consultant at Thoughtworks, a technology company that is closely associated with the development of distributed agile methodology. A data mesh is a distributed, de-centralized data infrastructure in which multiple autonomous domains manage and expose their own data, called “data products,” to the rest of the organization.
Organizations leverage data mesh architecture when they experience shortcomings in highly centralized architectures, such as the lack domain-specific expertise in data teams, the inflexibility of centralized data repositories in meeting the specific needs of different departments within large organizations, and the slow nature of centralized data infrastructures in provisioning data and responding to changes.
In this session, Pablo Alvarez, Global Director of Product Management at Denodo, explains how data virtualization is your best bet for implementing an effective data mesh architecture.
You will learn:
- How data mesh architecture not only enables better performance and agility, but also self-service data access
- The requirements for “data products” in the data mesh world, and how data virtualization supports them
- How data virtualization enables domains in a data mesh to be truly autonomous
- Why a data lake is not automatically a data mesh
- How to implement a simple, functional data mesh architecture using data virtualization
Deliver Dynamic and Interactive Web Content in J2EE Applicationsinfopapers
F. Stoica, Deliver dynamic and interactive Web content in J2EE applications, Proceedings of the Central and East European Conference in Business Information Systems, Cluj-Napoca, Romania, ISBN 973-656-648-X, pp. 780-789, 2004
Key Methodologies for Migrating from Oracle to PostgresEDB
This presentation reviews the key methodologies that all members of your team should consider, before planning a migration from Oracle to Postgres including:
• Prioritizing the right application or project for your first Oracle migration
• Planning a well-defined, phased migration process to minimize risk and increase time to value
• Handling common concerns and pitfalls related to a migration project
• Leveraging resources before, during, and after your migration
• Becoming independent from an Oracle database – without sacrificing performance
With EDB Postgres’ database compatibility for Oracle, it is easy to migrate from your existing Oracle databases. The compatibility feature set includes compatibility for PL/SQL, Oracle’s SQL syntax, and built in SQL functions. This means that many applications can be easily migrated over to EDB Postgres. It also allows you to continue using your existing Oracle skills.
For more information please contact us at sales@enterprisedb.com
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
2. LEGACY SYSTEMS
▪ Considering with lagacy system
▪ Current enterprise landscape
▪ Specific high priority problem/specific productivity
improvement
▪ Paths to connect systems
▪ Fragmentation of system
▪ New system, latest technology
3. LEGACY SYSTEMS
▪ As time goes on, system become out of date
1.Changes in technology
2.Changes in business operation.
▪ In large corporation, local units develop business
solutions.
▪ Business data(different form, names and ways).
▪ Client server system.
▪ Information system.
▪ Internet and electronic commerce.
4. DATA WAREHOUSE
▪ Why datawarehouse?
▪ Consistent information is more difficult to access
▪ Seldom retain the data for longer periods of time
▪ Tools to provide analysis on ad hoc basis
▪ ODS
▪ Data cleansing and transformation
▪ Reconciliation of data
▪ Accumulate data for years(historical)
▪ Storage requirements extremely large
5. DATA WAREHOUSE
▪ Addition and retrieval, no updates
▪ Datamart (specific data, specific purpose)
▪ ODS will phased out
▪ Batch processing
▪ Key challenge
6. INTRODUCTION
▪ EAI was an approach to integration of applications first developed in the
late 1990s.
▪ Pre-dated widespread use of JEE, XML and Web Services.
▪ EAI currently has become subsumed into Service Oriented Architecture
software stacks
▪ However, the need for the underlying capabilities have not changed.
7. MIDDLEWARE
▪ Interaction between applications across
heterogeneous platforms
▪ Solution to integrating set of servers and
applications under a common service interface
▪ Basic infrastucture behind distributed information
system
8. ENTERPRISE APPLICATION
INTEGRATION
▪ Extends middleware capabilities to cope with
application integration
▪ Uses application logic layers of different middleware
systems as building blocks
10. Purchased Application
Package(s) – ERP etc.
New Web-based
application(s)
Legacy
Application
System(s)
Program
Program
Program
Program
Program
Program
Program
Program
Program
IT REALITY – ISLANDS OF COMPUTING
Enterprise IT reflects the structure and history of each enterprise not
the business processes required today
Departments have their own IT systems
Legacy systems are left in place and new systems built
separately.
11. TACTICAL APPROACH TO INTEGRATING THE
BUSINESS
Each requirement is addressed with a point to point solution
Typically consisting of a data transfer mechanism and a format
converter.
Increasing levels of supplier/client integration points further
complicates the situation.
12. Enterprise integration requirement
Unrestricted sharing of data and business processes throughout
the networked applications or data sources in an organization
Extend to customers, suppliers and regulators
The Linking of Data, Business Processes, Applications to
automate business processes
While ensuring that there are consistent qualities of
service (security, reliability etc)
Reduce the on-going cost of maintenance and reduce the
cost of rolling out new systems.
13. Enterprise integration requirement
Unrestricted sharing of data and business processes throughout
the networked applications or data sources in an organization
Extend to customers, suppliers and regulators
The Linking of Data, Business Processes, Applications to
automate business processes
While ensuring that there are consistent qualities of
service (security, reliability etc)
Reduce the on-going cost of maintenance and reduce the
cost of rolling out new systems.
14. DIFFICULTIES
▪ Different operating system
▪ Support for different interfaces and functionality
▪ Different data format
▪ Different security requirements
▪ Different infrastructure and interaction protocols
15. ELECTRONIC COMMERCE
▪ Direct communication with end costomers
▪ Data exchange with business partners
▪ New business relations
▪ New marketplace, global
16. ELECTRONIC COMMERCE
▪ Promote product and services
▪ B2C
▪ Promotes sales and customer loyalty
▪ B2C, web server and supporting applications
▪ Direct communication makes the business more
responsive
▪ B2B
▪ EDI
▪ Auction and Bid
17. WEB ENABLED APPLICATIONS
▪ Web Access to applications
▪ Web browsers
▪ Access anywhere in the world
▪ PC(not a practical user device)
19. EXTENSIBLE MARKUP
LANGUAGE
▪ free-form expression of data structures in a
universal character set
▪ refinement of the basic syntax of HTML
▪ Preferred medium for the exchange of data
▪ tagged data format
▪ elements(a descriptive tag and an associated value)
▪ described by a DTD or XML Schema document
20. EXTENSIBLE MARKUP
LANGUAGE
key strengths of XML
1.It carries with it descriptive tags that provide
meaning to the content
2.It facilitates transformation
3.XML is replacing Electronic Document
Interchange (EDI).
21. EXTENSIBLE MARKUP
LANGUAGE
▪ XML parser
▪ XML Stylesheet Language (XSL)
▪ Document Object Model (DOM)
▪ Compatible with HTTP
▪ preferred syntax in EAI environment
▪ Open Application Group (OAG), Documents
standards
▪ preferred syntax for B2B exchanges
▪ incorporated in the Simple Object Access Protocol
(SOAP)
23. WORKFLOW MANAGEMENT
▪ Manages the execution of activities
▪ Activities
1.perform operations directly
2.invoke applications
3.delegate tasks to humans
▪ From batch processing to eventbased processing
▪ Formalize processes
▪ Enforce compliance
24. WORKFLOW MANAGEMENT
▪ Monitor performance
▪ Process improvements
▪ Coordinate distributed and concurrent activities.
▪ Interoperation of different workflow systems
▪ Object Management Group (OMG)
▪ Convergence of Workflow management and EAI
technologies
▪ Affects the design and scope of applications
25. DISTRIBUTED OBJECTS
▪ Development of systems with distributed components
▪ Objects: shared services or objects of a business application.
26. DISTRIBUTED OBJECTS
▪ Primary distributed object technologies:
• (CORBA) from the OMG
• (COM+) from Microsoft
• (EJB) from Sun Microsystems
27. DISTRIBUTED OBJECTS
CORBA offers three particular benefits:
1. It enables a robust, scalable solution.
2. It supports messaging between objects
implemented in different languages.
3. It is the product of an industry consortium and
enables interoperability between products from
different vendors.
28. DISTRIBUTED OBJECTS
▪ COM+:
1.Its products and operating systems
2.de facto reference
▪ EJB:
1.Specifications aligned to CORBA
2.Multiple vendors
29. COMPONENTS
▪ Object technology; reusable components.
▪ Reuse: individual applications or development teams
▪ A Short Historical Perspective
▪ Component Interface and Connections
▪ Performing Services Transparently
30. A SHORT HISTORICAL
PERSPECTIVE
▪ Programming languages, can be seen from either
▪ The run-time point of view or,
▪ The design and reuse perspective
31. COMPONENT INTERFACE
AND CONNECTIONS
▪ ADLs primarily address the issues related to the early
phases of software engineering:
▪ Design
▪ Analysis
▪ They identify a number of concepts, such as:
▪ Architecture, configurations, connectors, bindings,
properties, hierarchical models, style, static analysis and
behavior.
32. COMPONENT
INTERACTIONS
Iteractions with
traditional software entities
Interactions
with
other
components
Interactions with
other
components
Interactions with
component infrastructure
Components
Traditional
software entities
Component
Infrastructure
33. MAJORS STEPS IN CBD
LIFECYCLEAspect Phase Actor
Interface Definition Designer
Assembly Assembly Architect
Implementation Implementation Developer
Lifecycle Packaging,
Deployment
Administrator
Framework,
run-time support
Execution End User
35. COMPONENTS AND
PORTS
▪ Components
▪ Represent the computational elements and data stores of a
system.
▪ Ports
▪ Are the points of interaction between a component and its
environment.
Component
Port
36. CONNECTORS AND
ROLES
▪ Connectors
▪ Represent interactions between components such as
method calls or an SQL connection between a client and a
database server.
▪ The interface of a connector is defined as a set of
roles
Connector
Role
37. SYSTEMS AND
ATTACHMENTS
▪ The structure of a system is specified by a set of
components, a set of connectors, and a set of
attachments.
▪ Attachment
▪ Links a component port to a connector role.
Attachement
39. JAVA BEAN
COMPONENT MODEL
▪ Key Features
▪ Interface of a Component
▪ Implementation of a Component
▪ Components Assembly
▪ Packaging and Deployment
40. KEY FEATURES
▪ Bean Box
▪ "A Java Bean is a reusable software component that
can be manipulated visually in a builder tool”.
▪ The Java Bean was designed for the construction of
graphical user interface (GUI).
▪ Explicitly tailored to interact in two different contexts:
▪ At composition time, within the builder tool.
▪ At execution time, with the runtime environment.
41. INTERFACE OF A
COMPONENT
▪ This model defines four types of port:
▪ methods,
▪ properties,
▪ event sources and
▪ event sinks called listeners.
Read-only property
Write-only property
Property
Method
Event source
Event sink (listener)
Bounded property
v Vetoable property
ro
wo
1 Unicast event source
Ports
42. IMPLEMENTATION OF A
COMPONENT
▪ Most bean components are implemented by a simple
Java object, the object being encapsulated in the
component, but there are more sophisticated
implementations possible.
▪ Wrapping a legacy object.
▪ Multiple-objects implementation.
▪ Dependency on traditional entities.
44. COMPONENTS
ASSEMBLY
▪ Assembly is one of the key features of Java Bean
though no not specific solution is provided.
▪ Different ways of assembling components are supplied.
Component-based assembly Heterogeneous assembly
45. PACKAGING AND
DEPLOYMENT
▪ Java Beans define a model for packaging
components into archives.
▪ Includes the definition of dependency relationships between
the package items.
▪ The customization code can be more complex than
the component itself!
▪ Each package item can be marked "Design Only", so
that they can be removed in a final application.
46. JAVA
▪ Portability via JVM
▪ Complemented the JVM with the JDK
▪ encapsulate platform differences
▪ Java applets
▪ Memory management
▪ Remote Message Invocation
▪ Java Transaction API
47. ▪ Java Messaging Service
▪ Java Naming and Directory Interface
▪ Java Database Connectivity
▪ Java 2 Enterprise Edition
48. ▪ Which technology provides adequate tools for
analysis on ad hoc basis
▪ Which type of computing and technology will be
required for B2C
▪ How XML is replacing EDI
▪ Which technology enforce compliance and
improvements in business process
▪ What are 3 genuine technologies for creating
distributed objects and compare contrast those 3
49. UNIFIED MODELING
LANGUAGE
▪ Unified Modeling Language (UML) by OMG.
▪ Based on a specification developed by Rational
Software
▪ OMG specification experts represent efforts of 21
tool vendors and industry experts
▪ Wide acceptance in the industry
▪ Efforts to expand its scope.
▪ Visualizations and diagramming techniques
▪ commonly is the class diagram
50.
51. ▪ Common Warehouse Metamodel (CWM)
▪ Enterprise Distributed Object Computing (EDOC), EAI,
and action semantics(under development)
▪ Workflow process(anticipated)
▪ Complemented by XML Model Interchange (XMI)
▪ Generating skeleton, class code from specifications
▪ Complete large-scale applications from UML sre
expected
▪ Reducing the effort of programming applications with
interoperability
52. MODEL DRIVEN
ARCHITECTURE (MDA)
▪ using UML to define
technology-
independent models to
map them for specific
technologies.
▪ standard specifications
for services,
applications, and
components with
operability
54. ▪ Used with digital certificates
▪ Digital certificates are issued by a trusted
certification authority
▪ encrypted with the authority's private key
▪ The systems and services for issuing and using
certificates are called the PKI.
▪ Mechanism to obtain certified identification from a
trusted authority
▪ Without previously being identified
55. ▪ Used by Secure Sockets Layer (SSL)
▪ Sender and receiver can authenticate each other
with their digital certificates
▪ authenticate a message received from a specified
source
▪ the export of public key encryption technology from
the United States was restricted as a threat to
national security
56. DIGITAL SIGNATURES
▪ Employ public key technology
▪ Signature authenticates the document
▪ Prevents the signer from repudiating the document
▪ To attach a digital signature
1.the document is first processed by a digest function
2.The digest value is then encrypted with the signer's
private key and attached to the digital document
3.The recipient can execute the same digest function
decrypt the signature with the originator's public key
57. DIGITAL SIGNATURES
▪ If the two digest values are equal, the signature
verifies
▪ Federal legislation was adopted recently giving
digital signatures the same legal effect as signatures
on paper documents
▪ This opens the door to widespread replacement of
paper legal documents
▪ The consequence is that the scope of business
transactions conducted over the Internet will be
expanded greatly.
58. WIRELESS INTERFACE
DEVICES
▪ Cellular phones have become commonplace
▪ Enables new forms of Internet purchases
▪ Frees employees to conduct business anywhere and
at any time
▪ The Web pages accessed by these devices cannot be
formatted the same as Web pages for conventional
Web browser displays
▪ Web sites accessed by these devices must recognize
device limitations
60. KNOWLEDGE MANAGEMENT
▪ Technical support for knowledge management is still
in the early stages
▪ Knowledge management is a second-order business
function
▪ It is difficult to implement and sustain such systems
when mainstream systems involve inconsistent data,
diverse technologies, and constant change.
▪ As enterprises implement consistent architectures,
we can expect to see a growth in knowledge
management facilities linked to business processes
and applications.
61. AGENT TECHNOLOGY
▪ A software agent is an autonomous program that
senses and reacts to its environment
▪ Its environment may include information about the
actions of other agents.
▪ Agent itself will determine if, when, and how it will
perform its function.
▪ A simple agent:to monitor some activity, raise an
alarm
▪ More sophisticated agents:to direct the flow of work
62. AGENT TECHNOLOGY
▪ Agents also might be employed for knowledge
management
▪ Agent technology is still in its infancy
▪ Consistent enterprise architecture will be a key
enabler for such technology.
63. INTERACTIVE VOICE
▪ Few applications make use of voice input or output
▪ Voice input and output require additional
functionality and increase the risk of errors
▪ Voice input and output also enable hands- and eyes-
free operation in activities and environments that
are not conducive to conventional terminal
interaction.
▪ Interactive voice communication will require yet
another form of message formatting. Enterprise
applications will need to anticipate these
requirements when they prepare and accept
message content.
64. MODEL DRIVEN
ARCHITECTURE
▪ The Model Driven Architecture strategy of the OMG
provides the ability to specify applications and
standards as Platform Independent Models (PIM)
that can be mapped to evolving technical platforms.
▪ Tools provide the ability to transform a PIM
specification to executable code
▪ Standard mappings will enable independently
developed applications and components to be
interoperable
▪ The UML Profile for Enterprise Distributed Object
Computing(EDOC ) provides the modeling elements
for the platform-independent specification of
component-based, large-scale systems
65. ▪ The technology to implement MDA exists, the
standards and tools for composing large-scale
applications are under development.