The document discusses the integration of distributed enterprise applications. It provides an overview of the historical development of distributed enterprise application architectures, from early centralized mainframes to modern multi-tier architectures. It also reviews major integration technologies and discusses recent research trends, challenges and opportunities in integrating distributed industrial applications across networks, systems, devices and organizations.
This document provides an overview of e-manufacturing and related concepts. It discusses how e-manufacturing uses internet technologies to integrate customers, products, and suppliers. Key aspects discussed include e-maintenance, e-diagnostics, and how e-manufacturing tools can provide benefits like reduced downtime, lower costs, and improved customer satisfaction. The document also examines the evolution of e-manufacturing and how concepts like e-business, e-intelligence, and predictive maintenance have contributed to the development of integrated e-factory systems.
End-User Computing Insights: A study of digital maturityDImension Data
Dimension Data has gained valuable insights through working with top global clients in the domain of end-user computing over the past five years.
Our report delivers these insights to your business – so you can benchmark your journey and take the next steps in end-user computing with confidence.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Velocis Systems Pvt. Ltd. is a leading IT solutions provider with 19+ years of experience. It has over 750 IT professionals across offices in India and Singapore. Velocis offers a wide range of IT services including infrastructure management, software and applications development, business process management, unified communications, and managed services. It works with clients across various industries including BFSI, IT/ITES, government, and education.
How to Build a Consumerization of IT StrategyMicrosoft
As technology becomes more central in people’s personal lives, consumer technologies have been steadily entering into the workplace and increasingly blurring the lines between home and work. This trend, known as the consumerization of IT, has the potential to play a significant role in improving business productivity and agility for enterprises.
The consumerization of IT helps organizations realize increased productivity and enhance workforce capabilities, while maximizing IT investments.
This white paper presents: • An introduction to the consumerization of IT. This description discusses general industry drivers and the Microsoft perspective about mobile workforces and the consumerization of IT.
• The value proposition of adopting a consumerization of IT strategy. Benefits include increased employee productivity and satisfaction.
• Enterprise device options. This section highlights the trade-offs between agility and control (business-centric versus IT-focused decisions).
This white paper is one part of the “Microsoft Recommendations for a Consumerization of IT Strategy” series. This series introduces the phenomenon known as the consumerization of IT, including strategies for supporting the proliferation of devices in the workplace and supporting work tasks on personal devices at diverse locations.
Introduction to the issues arising in Information Systems integration.
Materiale realizzato per il corso di Sistemi Informativi Aziendali del Politecnico di Torino - http://bit.ly/sistinfo
the evolving enterprise architecture: a digital transformation perspective is a paper describing the role of IoT in the enterprises and how the EA is related to that.
Una plataforma de software para control de procesos en el sector agroindustrialSergio Mancera
This document discusses a software framework for process control in agroindustrial applications. It proposes using the Internet Communications Engine (ICE) middleware to meet requirements such as flexibility, adaptability, and timely information sharing. The framework is intended to support growing system complexity and heterogeneity. A prototype application has been implemented based on this framework to test its effectiveness for agroindustrial process control.
This document provides an overview of e-manufacturing and related concepts. It discusses how e-manufacturing uses internet technologies to integrate customers, products, and suppliers. Key aspects discussed include e-maintenance, e-diagnostics, and how e-manufacturing tools can provide benefits like reduced downtime, lower costs, and improved customer satisfaction. The document also examines the evolution of e-manufacturing and how concepts like e-business, e-intelligence, and predictive maintenance have contributed to the development of integrated e-factory systems.
End-User Computing Insights: A study of digital maturityDImension Data
Dimension Data has gained valuable insights through working with top global clients in the domain of end-user computing over the past five years.
Our report delivers these insights to your business – so you can benchmark your journey and take the next steps in end-user computing with confidence.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Velocis Systems Pvt. Ltd. is a leading IT solutions provider with 19+ years of experience. It has over 750 IT professionals across offices in India and Singapore. Velocis offers a wide range of IT services including infrastructure management, software and applications development, business process management, unified communications, and managed services. It works with clients across various industries including BFSI, IT/ITES, government, and education.
How to Build a Consumerization of IT StrategyMicrosoft
As technology becomes more central in people’s personal lives, consumer technologies have been steadily entering into the workplace and increasingly blurring the lines between home and work. This trend, known as the consumerization of IT, has the potential to play a significant role in improving business productivity and agility for enterprises.
The consumerization of IT helps organizations realize increased productivity and enhance workforce capabilities, while maximizing IT investments.
This white paper presents: • An introduction to the consumerization of IT. This description discusses general industry drivers and the Microsoft perspective about mobile workforces and the consumerization of IT.
• The value proposition of adopting a consumerization of IT strategy. Benefits include increased employee productivity and satisfaction.
• Enterprise device options. This section highlights the trade-offs between agility and control (business-centric versus IT-focused decisions).
This white paper is one part of the “Microsoft Recommendations for a Consumerization of IT Strategy” series. This series introduces the phenomenon known as the consumerization of IT, including strategies for supporting the proliferation of devices in the workplace and supporting work tasks on personal devices at diverse locations.
Introduction to the issues arising in Information Systems integration.
Materiale realizzato per il corso di Sistemi Informativi Aziendali del Politecnico di Torino - http://bit.ly/sistinfo
the evolving enterprise architecture: a digital transformation perspective is a paper describing the role of IoT in the enterprises and how the EA is related to that.
Una plataforma de software para control de procesos en el sector agroindustrialSergio Mancera
This document discusses a software framework for process control in agroindustrial applications. It proposes using the Internet Communications Engine (ICE) middleware to meet requirements such as flexibility, adaptability, and timely information sharing. The framework is intended to support growing system complexity and heterogeneity. A prototype application has been implemented based on this framework to test its effectiveness for agroindustrial process control.
Social Media - Transforming B2B Organizations: Contemporary Concerns StudyVishrut Shukla
The document is a project report submitted by Viveka Sra and Vishrut Shukla to Prof. Seema Gupta on social media and how it is transforming B2B organizations. It details an exploratory study conducted on how Cisco Systems and Oracle Corporation utilize various social media platforms both internally and externally. The report analyzes the different social channels used by each company, the type of content posted on each channel, and metrics on audience size. It aims to evaluate the effectiveness of the companies' social media strategies and provide best practice guidelines for other organizations.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
This document provides a summary of a term paper on handheld devices and BYOD (Bring Your Own Device) adoption in enterprises. It discusses drivers of BYOD such as increased use of mobile devices and collaborative applications. Executives at Cisco were interviewed and noted that BYOD can boost productivity but challenges include security issues and changing employee behaviors. The document also analyzes factors fueling BYOD adoption such as the overlap of work and personal tasks on mobile devices. However, BYOD implementation presents security and policy challenges for IT that companies are working to address.
This document describes an in-house file tracking system designed for large organizations. The system digitalizes the traditional paper-based method of tracking files as they are transferred between departments. It uses barcodes to uniquely identify files and track their status and location. The system is built using web technologies like Python for the backend and has a multi-layer architecture. It includes interfaces for logging in, viewing files, creating new files, and dispatching files between departments. The system aims to automate file tracking to reduce delays and improve workflow across an organization.
An analysis of security trends in the Financial Services industry. 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world.
Timothy B. Jones discusses perspectives on innovation and enterprise computing. He observes trends showing more consumer technology innovation than enterprise and how this is disrupting businesses. Prosumers are bringing consumer tech into offices, undermining existing enterprise software. A new "LAMP stack" is enabling applications that enhance productivity at lower costs. This is leading to the emergence of "Enterprise 2.0" using web 2.0 technologies internally to improve collaboration and replace client-server architectures with more flexible applications. Early adopter organizations are seeing benefits, and target verticals include financial services, retail, consulting and more.
This document discusses an assignment for an INF 220 class on developing an Internet of Things (IoT) product proposal. It provides background on various applications of IoT technologies in different markets such as manufacturing, media, environmental monitoring, infrastructure management, energy management, healthcare, home automation, transportation, and large-scale city deployments. The assignment asks students to select one of these markets and write a 5-7 page paper proposing an original IoT product for that market, justifying its need, comparing it to similar existing products, and explaining how it is better or different.
The document discusses how cloud computing is changing the IT model and project delivery. It defines cloud computing and its key characteristics like on-demand access to pooled computing resources. Cloud represents the "industrialization of IT" by automating processes like previous innovations in telecoms and manufacturing. The need to reduce out of control management costs of traditional IT is clear. While initially an IT concern, business leaders now see cloud as extremely important to overall business success. The future will see a co-existence of traditional "systems of record" and newer "systems of engagement" applications developed for and delivered via the cloud.
The document discusses network management and mobility. It covers business networks and their functions of mobility, collaboration, relationships and search. Wireless broadband networks like 3G and 4G are described along with technologies like WiMAX and LTE. Network management portals are discussed as well as collaboration tools. Issues of network infrastructure, performance, intranets, extranets and VPNs are also summarized.
This document discusses data, text, and document management. It covers file management systems, database management systems, data warehouses, and enterprise content management. Effective data management is important for organizations to access and use data efficiently. It reduces data redundancy, inconsistency, and isolation issues. Database management systems help solve problems of file-based systems by providing centralized access to data. Data warehouses further organize vast amounts of data for analysis and decision making.
Information technology for management (6th edition)MShuibMJ
The document summarizes the organization and contents of the 6th edition of the textbook "Information Technology for Management" by Turban, Leidner, McLean, and Wetherbe from 2008. The textbook is divided into 6 parts covering IT in organizations, infrastructure, the web revolution, organizational applications, managerial systems, and implementing/managing IT. Each part contains chapters that provide overviews of key topics, cases, and resources to support student learning.
This document discusses how smart, connected products are transforming competition through three core elements - physical components, smart capabilities via sensors and software, and connectivity. These new technologies allow products to monitor use, control functions remotely, optimize performance, and operate autonomously. This shifts industry structures by changing how value is created and captured, competitive advantages are secured, and industry boundaries are defined as products become part of broader systems. Companies must make strategic choices around business models, data management, and whether to develop open or closed systems to take advantage of opportunities while securing competitive differentiation.
The document introduces software architecture and architectural design. It discusses that architectural design is important for understanding how a software system should be organized. The objectives are to understand the importance of architecture, decisions made in the design process, and architectural patterns. It also covers topics like architectural views, patterns, and application architectures.
For more classes visit
www.snaptutorial.com
INF 220 Week 2 Assignment Source of Competitive Advantage
This team assignment is meant to provide experience with real-world applicability in working in teams.
The “Sources of Competitive Advantage” image above shows the focus of competitive advantage for seven
The software development process heavily relies on requirement engineering as it forms the base for entire process. Although software engineering is full of methods for requirement analysis, the problem we face is which method to select and how to apply it. It is expected that we should be able to get clear and complete idea about what is expected by the user from the proposed system. This puts emphasis on requirement analysis process. The method we need to adopt should enable us to get clear and complete set of requirements. The requirement engineering process dependent on abilities of the persons carrying out the process also the nature of system puts certain constraints on the process. . This paper is an attempt to look at certain problems posed by the requirement engineering process and possible corrective measures against it to help improve overall software quality.
Cloud computing: Advantages and challenges in the software industry and mobil...Annie Pham
Through the majority of publications and studies, this writing presents the understanding and assessment of changes in the mobile business under the impact of cloud computing technology.
Viability of bring your-own-computer BYOC programsMasaf Dawood
The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
By: Masaf Dawood
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ijseajournal
Software development process presents various types of models with their corresponding phases required to be accordingly followed in delivery of quality products and projects. Despite the various expertise and skills of systems analysts, designers, and programmers, systems failure is inevitable when a suitable development process model is not followed. This paper focuses on the Iterative and Incremental Development (IID)model and justified its role in the analysis and design software systems. The paper adopted the qualitative research approach that justified and harnessed the relevance of IID in the context of systems analysis and design using the Vocational
Career Information System (VCIS) as a case study. The paper viewed the IID as a change-driven software development process model. The results showed some system specification, functional specification of system and design specifications that can be used in implementing the VCIS using the IID model. Thus, the paper concluded that in systems analysis and design, it is imperative to consider a suitable development process that reflects the engineering mind-set, with heavy emphasis on good analysis and design for quality assurance.
The document discusses data storage design in systems analysis and design. It covers two main data storage formats: files and databases. Files are lists of electronic data organized for specific transactions, while databases contain grouped information related through a database management system (DBMS). The document also discusses moving from logical to physical data models, and optimizing data storage for efficiency and access speed using techniques like normalization, denormalization, indexing, and clustering.
Mba ii u v enterprise application integrationRai University
Enterprise application integration (EAI) uses software and systems to integrate enterprise computer applications that typically cannot communicate to share data or business rules, such as supply chain, customer relationship, and business intelligence applications. EAI provides a common infrastructure and methodology to connect existing and new applications while ensuring data consistency, business rule independence from specific vendors, ongoing support, and security and privacy requirements. Common EAI standards include XML, SOAP, WSDL, and UDDI, and it uses techniques like object-oriented programming, message brokers, and middleware. EAI allows enterprises to modernize legacy systems while adopting new technologies.
The document describes lessons learned from developing protocols to enable data sharing in a virtual enterprise. It discusses protocols selected by the NIIIP Consortium that build on STEP to allow engineering organizations to share technical product data over the Internet. The protocols included SDAI Java/IDL bindings, EXPRESS-X for data mapping, and STEP Services for data integration. These were used to implement a Virtual Enterprise Product Data Repository (VEPR) demonstrated in the last of three cycles to integrate product data from multiple sources. Key lessons included the need for standards to contribute and access controlled data in a VEPR as well as for applications to operate on data from different repositories.
Social Media - Transforming B2B Organizations: Contemporary Concerns StudyVishrut Shukla
The document is a project report submitted by Viveka Sra and Vishrut Shukla to Prof. Seema Gupta on social media and how it is transforming B2B organizations. It details an exploratory study conducted on how Cisco Systems and Oracle Corporation utilize various social media platforms both internally and externally. The report analyzes the different social channels used by each company, the type of content posted on each channel, and metrics on audience size. It aims to evaluate the effectiveness of the companies' social media strategies and provide best practice guidelines for other organizations.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
This document provides a summary of a term paper on handheld devices and BYOD (Bring Your Own Device) adoption in enterprises. It discusses drivers of BYOD such as increased use of mobile devices and collaborative applications. Executives at Cisco were interviewed and noted that BYOD can boost productivity but challenges include security issues and changing employee behaviors. The document also analyzes factors fueling BYOD adoption such as the overlap of work and personal tasks on mobile devices. However, BYOD implementation presents security and policy challenges for IT that companies are working to address.
This document describes an in-house file tracking system designed for large organizations. The system digitalizes the traditional paper-based method of tracking files as they are transferred between departments. It uses barcodes to uniquely identify files and track their status and location. The system is built using web technologies like Python for the backend and has a multi-layer architecture. It includes interfaces for logging in, viewing files, creating new files, and dispatching files between departments. The system aims to automate file tracking to reduce delays and improve workflow across an organization.
An analysis of security trends in the Financial Services industry. 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world.
Timothy B. Jones discusses perspectives on innovation and enterprise computing. He observes trends showing more consumer technology innovation than enterprise and how this is disrupting businesses. Prosumers are bringing consumer tech into offices, undermining existing enterprise software. A new "LAMP stack" is enabling applications that enhance productivity at lower costs. This is leading to the emergence of "Enterprise 2.0" using web 2.0 technologies internally to improve collaboration and replace client-server architectures with more flexible applications. Early adopter organizations are seeing benefits, and target verticals include financial services, retail, consulting and more.
This document discusses an assignment for an INF 220 class on developing an Internet of Things (IoT) product proposal. It provides background on various applications of IoT technologies in different markets such as manufacturing, media, environmental monitoring, infrastructure management, energy management, healthcare, home automation, transportation, and large-scale city deployments. The assignment asks students to select one of these markets and write a 5-7 page paper proposing an original IoT product for that market, justifying its need, comparing it to similar existing products, and explaining how it is better or different.
The document discusses how cloud computing is changing the IT model and project delivery. It defines cloud computing and its key characteristics like on-demand access to pooled computing resources. Cloud represents the "industrialization of IT" by automating processes like previous innovations in telecoms and manufacturing. The need to reduce out of control management costs of traditional IT is clear. While initially an IT concern, business leaders now see cloud as extremely important to overall business success. The future will see a co-existence of traditional "systems of record" and newer "systems of engagement" applications developed for and delivered via the cloud.
The document discusses network management and mobility. It covers business networks and their functions of mobility, collaboration, relationships and search. Wireless broadband networks like 3G and 4G are described along with technologies like WiMAX and LTE. Network management portals are discussed as well as collaboration tools. Issues of network infrastructure, performance, intranets, extranets and VPNs are also summarized.
This document discusses data, text, and document management. It covers file management systems, database management systems, data warehouses, and enterprise content management. Effective data management is important for organizations to access and use data efficiently. It reduces data redundancy, inconsistency, and isolation issues. Database management systems help solve problems of file-based systems by providing centralized access to data. Data warehouses further organize vast amounts of data for analysis and decision making.
Information technology for management (6th edition)MShuibMJ
The document summarizes the organization and contents of the 6th edition of the textbook "Information Technology for Management" by Turban, Leidner, McLean, and Wetherbe from 2008. The textbook is divided into 6 parts covering IT in organizations, infrastructure, the web revolution, organizational applications, managerial systems, and implementing/managing IT. Each part contains chapters that provide overviews of key topics, cases, and resources to support student learning.
This document discusses how smart, connected products are transforming competition through three core elements - physical components, smart capabilities via sensors and software, and connectivity. These new technologies allow products to monitor use, control functions remotely, optimize performance, and operate autonomously. This shifts industry structures by changing how value is created and captured, competitive advantages are secured, and industry boundaries are defined as products become part of broader systems. Companies must make strategic choices around business models, data management, and whether to develop open or closed systems to take advantage of opportunities while securing competitive differentiation.
The document introduces software architecture and architectural design. It discusses that architectural design is important for understanding how a software system should be organized. The objectives are to understand the importance of architecture, decisions made in the design process, and architectural patterns. It also covers topics like architectural views, patterns, and application architectures.
For more classes visit
www.snaptutorial.com
INF 220 Week 2 Assignment Source of Competitive Advantage
This team assignment is meant to provide experience with real-world applicability in working in teams.
The “Sources of Competitive Advantage” image above shows the focus of competitive advantage for seven
The software development process heavily relies on requirement engineering as it forms the base for entire process. Although software engineering is full of methods for requirement analysis, the problem we face is which method to select and how to apply it. It is expected that we should be able to get clear and complete idea about what is expected by the user from the proposed system. This puts emphasis on requirement analysis process. The method we need to adopt should enable us to get clear and complete set of requirements. The requirement engineering process dependent on abilities of the persons carrying out the process also the nature of system puts certain constraints on the process. . This paper is an attempt to look at certain problems posed by the requirement engineering process and possible corrective measures against it to help improve overall software quality.
Cloud computing: Advantages and challenges in the software industry and mobil...Annie Pham
Through the majority of publications and studies, this writing presents the understanding and assessment of changes in the mobile business under the impact of cloud computing technology.
Viability of bring your-own-computer BYOC programsMasaf Dawood
The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
By: Masaf Dawood
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ijseajournal
Software development process presents various types of models with their corresponding phases required to be accordingly followed in delivery of quality products and projects. Despite the various expertise and skills of systems analysts, designers, and programmers, systems failure is inevitable when a suitable development process model is not followed. This paper focuses on the Iterative and Incremental Development (IID)model and justified its role in the analysis and design software systems. The paper adopted the qualitative research approach that justified and harnessed the relevance of IID in the context of systems analysis and design using the Vocational
Career Information System (VCIS) as a case study. The paper viewed the IID as a change-driven software development process model. The results showed some system specification, functional specification of system and design specifications that can be used in implementing the VCIS using the IID model. Thus, the paper concluded that in systems analysis and design, it is imperative to consider a suitable development process that reflects the engineering mind-set, with heavy emphasis on good analysis and design for quality assurance.
The document discusses data storage design in systems analysis and design. It covers two main data storage formats: files and databases. Files are lists of electronic data organized for specific transactions, while databases contain grouped information related through a database management system (DBMS). The document also discusses moving from logical to physical data models, and optimizing data storage for efficiency and access speed using techniques like normalization, denormalization, indexing, and clustering.
Mba ii u v enterprise application integrationRai University
Enterprise application integration (EAI) uses software and systems to integrate enterprise computer applications that typically cannot communicate to share data or business rules, such as supply chain, customer relationship, and business intelligence applications. EAI provides a common infrastructure and methodology to connect existing and new applications while ensuring data consistency, business rule independence from specific vendors, ongoing support, and security and privacy requirements. Common EAI standards include XML, SOAP, WSDL, and UDDI, and it uses techniques like object-oriented programming, message brokers, and middleware. EAI allows enterprises to modernize legacy systems while adopting new technologies.
The document describes lessons learned from developing protocols to enable data sharing in a virtual enterprise. It discusses protocols selected by the NIIIP Consortium that build on STEP to allow engineering organizations to share technical product data over the Internet. The protocols included SDAI Java/IDL bindings, EXPRESS-X for data mapping, and STEP Services for data integration. These were used to implement a Virtual Enterprise Product Data Repository (VEPR) demonstrated in the last of three cycles to integrate product data from multiple sources. Key lessons included the need for standards to contribute and access controlled data in a VEPR as well as for applications to operate on data from different repositories.
AN OVERVIEW OF EXISTING FRAMEWORKS FOR INTEGRATING FRAGMENTED INFORMATION SYS...ijistjournal
Literatures show that there are several structured integration frameworks which emerged with the aim of facilitating application integration. But weakness and strength of these frameworks are not known. This paper aimed at reviewing these frameworks with the focus on identifying their weakness and strength. To accomplish this, recommended comparison factors were identified and used to compare these frameworks. Findings shows that most of these structure frameworks are custom based on their motives. They focus on integrating applications from different sectors within an organization for the purpose of eliminating communication inefficiencies. There is no framework which guides application’s integrators on goals of integrations, outcomes of integration, outputs of integration and skills which will be required for types of applications expected to be integrated. The study recommended further study on integration framework especial on designing unstructured framework which will support and guide application’s integrators with consideration on consumer’s surrounding environment.
AN OVERVIEW OF EXISTING FRAMEWORKS FOR INTEGRATING FRAGMENTED INFORMATION SYS...ijistjournal
Literatures show that there are several structured integration frameworks which emerged with the aim of facilitating pplication integration. But weakness and strength of these frameworks are not known. This
paper aimed at reviewing these frameworks with the focus on identifying their weakness and strength. Toaccomplish this, recommended comparison factors were identified and used to compare these frameworks.Findings shows that most of these structure frameworks are custom based on their motives. They focus onintegrating applications from different sectors within an organization for the purpose of eliminating communication inefficiencies. There is no framework which guides pplication’s integrators on goals of integrations, outcomes of integration, outputs of integration and skills which will be required for
types of applications expected to be integrated. The study recommended further study on integration
framework especial on designing unstructured framework which will support and guide application’s
integrators with consideration on consumer’s surrounding environment.
Software engineering in industrial automation state of-the-art reviewTiago Oliveira
This document summarizes recent developments in software engineering for industrial automation systems. It discusses how software is becoming increasingly important and complex in industrial automation, representing 40% of system costs in some cases. The document reviews key areas of software engineering as they relate to industrial automation, including requirements, design, construction, testing, maintenance, and standards/norms. It provides an overview of typical automation system architectures and software functions.
This document discusses research into connecting industrial control systems to cloud-based mobile technologies securely. The researchers used a DevOps approach to develop cloud applications that can securely connect to and manage industrial control systems from mobile devices. They demonstrated this by connecting a PLC International RS-M2M gateway to an IBM Bluemix cloud platform. This allowed remote monitoring and control of industrial equipment from mobile devices through the cloud in a secure manner, addressing a challenge in industrial cybersecurity.
Industrial Control Systems Go Mobile in the CloudLockheed Martin
Industrial control systems are increasingly becoming interconnected with local area networks, wide area networks, extranet networks, and cloud computing environments. Cloud and mobile technologies provide a competitive advantage for global companies. In this research, a DevOps approach to cloud-based applications development was used to create a capability for industrial control systems management and reporting.
Architecture Framework for Resolution of System Complexity in an EnterpriseIOSR Journals
This document presents an architecture framework for resolving system complexity in an enterprise. It discusses how enterprise architecture can be used to address issues like requirement complexity, organizational complexity, process complexity, and design complexity. The framework breaks down the enterprise information system into subsystems like back-end systems, front-end systems, management tools, and communication systems. It also separates concerns into different architecture layers - an external enterprise model, conceptual enterprise model, front-end systems, back-end systems, and management tools. The framework is intended to provide a structured approach to managing complexity by organizing enterprise data and functions across the different systems and models.
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...IJITCA Journal
In contrast to the increasing degree of automation in the production industry, commissioning and maintenance activities will essentially be limited to manual activities. Production involves repetitive actions that are manageable and clearly defined as a process. Unlike this, commissioning and maintenance have to deal with uncontrollable, undefined, and non - standardized processes. The paper provides a
framework for a multimedia assistance system for singletons. It was found that the paradigm has to consist of five key components to provide tailored assistance to customers. These key components are Expertise, Infrastructure, Application & Platforms, Security & Privacy and Business Process & Business Model. The resulting stack and the overlaying business model are called "CaRE – Custom Assistance for Remote Employees". With possible Architectural Smells and Anti-Pattern in mind, a Microservice Architecture shall be presented which forms the backend-system of CaRE.
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...IJITCA Journal
In contrast to the increasing degree of automation in the production industry, commissioning and maintenance activities will essentially be limited to manual activities. Production involves repetitive actions that are manageable and clearly defined as a process. Unlike this, commissioning and maintenance have to deal with uncontrollable, undefined, and non - standardized processes. The paper provides a framework for a multimedia assistance system for singletons. It was found that the paradigm has to consist of five key components to provide tailored assistance to customers. These key components are Expertise, Infrastructure, Application & Platforms, Security & Privacy and Business Process & Business Model. The resulting stack and the overlaying business model are called "CaRE – Custom Assistance for Remote Employees". With possible Architectural Smells and Anti-Pattern in mind, a Microservice Architecture shall be presented which forms the backend-system of CaRE.
Constructing a software requirements specification and design for electronic ...Ra'Fat Al-Msie'deen
Requirements engineering process intends to obtain software services and constraints. This process is essential to meet the customer's needs and expectations. This process includes three main activities in general. These are detecting requirements by interacting with software stakeholders, transferring these requirements into a standard document, and examining that the requirements really define the software that the client needs. Functional requirements are services that the software should deliver to the end-user. In addition, functional requirements describe how the software should respond to specific inputs, and how the software should behave in certain circumstances. This paper aims to develop a software requirements specification document of the electronic IT news magazine system. The electronic magazine provides users to post and view up-to-date IT news. Still, there is a lack in the literature of comprehensive studies about the construction of the electronic magazine software specification and design in conformance with the contemporary software development processes. Moreover, there is a need for a suitable research framework to support the requirements engineering process. The novelty of this paper is the construction of software specification and design of the electronic magazine by following the Al-Msie'deen research framework. All the documents of software requirements specification and design have been constructed to conform to the agile usage-centered design technique and the proposed research framework. A requirements specification and design are suggested and followed for the construction of the electronic magazine software. This study proved that involving users extensively in the process of software requirements specification and design will lead to the creation of dependable and acceptable software systems.
The future of software engineering: Visions of 2025 and beyond IJECEIAES
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
In the 1990s, many companies implemented packaged software solutions like SAP and Oracle ERP, but these systems were difficult to integrate. Each system stored redundant customer data, requiring manual updates when data changed. This led to inconsistent data across systems. To address this, companies sought to integrate their systems, giving rise to the field of enterprise application integration (EAI). EAI uses middleware to integrate disparate applications and data in a way that is flexible and isolates changes in one application from impacting others. Middleware provides generic interfaces that applications can use to communicate, replacing brittle point-to-point integration and improving manageability, scalability, and other benefits.
Advanced infrastructure for pan european collaborative engineering - E-collegXavier Warzee
This article presents challenges, visions, and solutions for a true Pan-
European collaborative engineering infrastructure that is a target of the IST project
E-COLLEG. The consortium aims at the definition of a transparent infrastructure
that will enable engineers from various domains to collaborate during the design of
complex heterogeneous systems.
This document discusses application assembly using web services. It proposes that web services allow non-technical people to construct complex business software by assembling reusable software components/services. However, there are still challenges to address like how to take abstract concepts into software and ensure quality attributes like performance and security. The document presents a "separation continuum" model to understand the different elements that make up business systems from abstract requirements to software implementation. It argues that application assembly using independently developed web services is feasible if standards are followed and the right assembly tools are available.
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
This document proposes and evaluates a solution to securely disseminate sensitive IoT data using FIWARE and Intel SGX. The solution uses FIWARE components for authentication and authorization, and introduces a new Key Vault component that uses Intel SGX to securely store and manage encryption keys. Sensitive IoT data from smart meters is encrypted before being sent to the FIWARE Orion Context Broker for processing. Consumers that are SGX applications can decrypt and process the data securely within the SGX enclave. The evaluation shows the solution provides privacy and security guarantees without harming scalability or availability.
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...CrimsonpublishersMedical
Change is said to be constant but despite the benefits of change to Information Technology Infrastructure (ITI), managers, researchers and enthusiasts are uncertain about the future. A survey of literature shows that the association between ITI and change management are divergent in interrelationships. Many ITI consumers find it difficult to accommodate change due to several challenges involved. Technological developments coming into play has led to whole lot gradual changes. This paper describes the journey of ITI from standalone computers to cloud of things, the motivation for their transition alongside merits and demerits. It also discusses each of this method in brief and also provides their applications. It states the importance of computer networks today using fast and novel approaches. Finally, this paper presents a new model for managing change in ITI.
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOLijseajournal
Communicating an organisation's requirements in a semantically consistent and understandable manner
and then reflecting the potential impact of those requirements on the IT infrastructure presents a major
challenge among stakeholders. Initial research findings indicate a desire among business executives for a
tool that allows them to communicate organisational changes using natural language and a model of the IT
infrastructure that supports those changes. Building on a detailed analysis and evaluation of these findings,
the innovative CRESUS-T support tool was designed and implemented. The purpose of this research was to
investigate to what extent CRESUS-T both aids communication in the development of a shared
understanding and supports collaborative requirements elicitation to bring about organisational, and
associated IT infrastructural, change. In order to determine the extent shared understanding was fostered,
the support tool was evaluated in a case study of a business process for the roll out of the IT software
image at a third level educational institution. Statistical analysis showed that the CRESUS-T support tool
fostered shared understanding in the case study, through increased communication. Shared understanding
is also manifested in the creation of two knowledge representation artefacts namely, a requirements model
and the IT infrastructure model. The CRESUS-T support tool will be useful to requirements engineers and
business analysts that have to gather requirements asynchronously.
Cloud Based Development for Medical Pharmacy and DCA ApplicationIRJET Journal
1. The document proposes a cloud-based integration framework using Boomi AtomSphere to connect electronic medical records from various drug agencies and medical pharmacies.
2. Data from different databases and systems would be integrated through Boomi's connectors and processes to enable sharing of medical records between pharmacies and drug control administrations.
3. This framework aims to improve data sharing and interactions between drug control authorities and medical pharmacies by developing a smart, connected system for medical records in the cloud.
Similar to Integration of distributed enterprise applications a survey (20)
The document is a podcast transcript that discusses OPC UA and related topics. It includes interviews with experts about OPC UA security, commercial kitchen equipment, AutoID devices, and use cases. It also provides information on accessing OPC Foundation podcasts and videos that explain OPC UA concepts. The transcript promotes the benefits of OPC UA for enabling interoperability across industrial applications and domains.
Transformation of simulink models to iec 61499 function blocks for verificati...Tiago Oliveira
This document discusses a new approach to transform Simulink models into IEC 61499 Function Block models. This transformation allows Simulink models to be used for verification of distributed control systems specified using IEC 61499. The transformation is achieved by formally defining the syntax and semantics of both Simulink and IEC 61499 Function Blocks, and establishing a mapping between the two. This enables closed-loop simulation of plant and controller models to validate distributed control systems designs.
O documento discute a implementação de estratégias de controle multimalha utilizando ferramentas PIMS e a norma IEC 61131-3. Ele descreve como essas tecnologias permitem sintonizar controladores e implementar desacopladores de maneira mais eficiente, melhorando o desempenho dos sistemas de controle industrial.
Enterprise integration and interoperability in manufacturing systems trends ...Tiago Oliveira
This document discusses enterprise integration and interoperability in manufacturing systems. It addresses the need for integration across all levels of an enterprise, from management to the shop floor, to facilitate information sharing and decision making. The document outlines several challenges to achieving full enterprise and process model interoperability, including the need for common reference models, effective interoperability mechanisms, supporting infrastructures, and standardized technologies. Future research areas are identified in collaborative networks, enterprise modeling, validation of models, and reuse of models. Overall the document argues that enterprise integration and interoperability are crucial for manufacturing enterprises to adapt to new technologies and business environments.
Communication in industrial automation what is going onTiago Oliveira
1) Fieldbus systems have been successfully introduced for industrial automation, but Ethernet is now being used more for local real-time communication systems.
2) Future scenarios will require heterogeneous networks combining local, wide area, wired, and wireless networks operated by different authorities.
3) The paper addresses ongoing activities using heterogeneous networks for industrial automation, including defining real-time classes, using wireless communication, and implementing functional safety and security concepts.
Applications of agent based systems in intelligent manufacturing - reviewTiago Oliveira
Agent-based systems have been applied to intelligent manufacturing in various areas such as enterprise integration, collaboration, process planning and scheduling, and shop floor control. This paper provides an updated review of recent work in these areas. It discusses how agents can be used to encapsulate functionalities, represent physical resources, and facilitate negotiation and collaboration. The paper also identifies several key requirements for next-generation manufacturing systems and discusses how agent-based approaches help address requirements such as integration, open architecture, communication, and quick response to changes.
A review of soa modeling approaches for enterprise information systemsTiago Oliveira
This document reviews and compares several approaches to modeling services for service-oriented architecture (SOA) in enterprise information systems. It discusses SOA-RM, SOA-RFA, SOA Ontology, SOMF, PIM4SOA, SoaML, and SOMA modeling approaches. The findings indicate that while each approach has strengths and weaknesses, combining aspects of the SOMA methodology with the SoaML modeling language allows for more detailed and systematic modeling of services to enable flexible SOA solutions.
Centro universitário jorge amado curso de engenharia de petróleo e gás pdfTiago Oliveira
A empresa de tecnologia anunciou um novo smartphone com câmera aprimorada, maior tela e melhor desempenho. O dispositivo também possui recursos adicionais de inteligência artificial e segurança de dados aprimorados. O lançamento do novo smartphone está programado para o final deste ano.
Engenharia de reservatorios de petroleo 2006Tiago Oliveira
Este documento describe los pasos para configurar una nueva red inalámbrica. Explica que primero se debe instalar el hardware como el enrutador y las tarjetas de red inalámbricas. Luego se configura la seguridad de la red usando claves WEP o WPA. Finalmente, se conectan los dispositivos a la red y se comprueba que todo funcione correctamente.
Engenharia de perfuração_e_completação_em_poços_de_petróleoTiago Oliveira
O documento descreve os processos e equipamentos utilizados na engenharia de perfuração e completação de poços de petróleo, incluindo a história da perfuração, sistemas de sonda, fluidos de perfuração, técnicas de construção de poços e equipamentos de completação.
O documento apresenta símbolos utilizados em projetos de automação industrial de acordo com a norma ANSI/ISA-S5.1. Ele descreve tabelas com letras de identificação para variáveis e funções, símbolos para linhas de instrumentação, localização de instrumentos e atuadores.
EtherCAT é uma rede Ethernet de campo rápida, síncrona e flexível que permite a comunicação em tempo real no nível de entrada e saída. Ela elimina atrasos de gateways e subsistemas ao transmitir dados diretamente entre dispositivos de E/S sem interrupções. EtherCAT oferece tempos de atualização extremamente curtos, largura de banda máxima e mapeamento de dados flexível.
Este documento fornece instruções para a instalação e configuração de uma máquina de usinagem CNC chamada GL 240 fabricada pela Romi. Contém informações sobre medidas de segurança, requisitos de instalação elétrica e pneumática, layout recomendado e especificações técnicas.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
2. 36 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014
Initiative (iNEMI) revealed that many industry systems did not
cooperate with each other [17]. Afterwards, substantial efforts
were made to integrate disparate applications and systems in
industry sectors. Nowadays many industries such as telecom-
munication, manufacturing, logistics, and energy have imple-
mented and integrated distributed enterprise applications such
as distributed control systems in factory automation, e-manufac-
turing systems, and distributed electronics production systems
[3], [18]–[20]. For example, a factory management system may
include an order processing application, a production sched-
uling application and a production control application which re-
side in three separate servers [21]. The three distributed appli-
cations then cooperate with each other to achieve their planned
business purpose. The literature also shows that distributed en-
terprise applications sometimes perform better or required less
resources than a large centralized software system [19] for some
industrial applications such as manufacturing control software
and manufacturing execution systems due to the increased de-
mand for agility, flexibility and scalability, dispersed users in
various locations, and unanticipated system change [1], [19].
In an effort to help readers understand the current status and
future trends of integrating enterprise application in industries,
we reviewed the past, present and future development related to
the enterprise architectures and enabling technologies for inte-
grating distributed enterprise applications. The main topics of
interest to industrial informatics readers include distributed en-
terprise architectures, middleware technologies for integrating
distributed enterprise applications in industries, and research
trends and challenges involved in the integration of distributed
enterprise applications. We hope this paper can help readers be-
come more aware of the challenges and opportunities that exist
in this increasingly important area and bring their expertise to
help address research challenges for integrating various enter-
prise applications in industries.
The rest of this paper is organized as follows. Section II
provides an introduction to the historical development of
distributed enterprise application architectures. Section III
provides a brief overview about the major distributed appli-
cation integration technologies developed in the past decades.
Recent research work and progress on enterprise application
integration technologies are presented in Section IV. Future
trends and research challenges are presented and discussed in
Section V. Conclusions are given in Section VI.
II. HISTORICAL DEVELOPMENT: DISTRIBUTED ENTERPRISE
APPLICATION ARCHITECTURES
Distributed enterprise application architectures have under-
gone an extensive evolution. Early generation enterprise ap-
plications were built on centralized mainframes [22], [23]. As
the capacity of personal computers increased, many applica-
tions and tasks were moved to the user’s computers to better
satisfy the business or processing needs. As a result, first-gen-
eration distributed enterprise applications were mainly devel-
oped using a simple two-tier client/server networked infrastruc-
ture [23], [24]. As the amounts of data continue to increase, a
three-tier architecture became popular in enterprise application
development in the mid-late 1990s [22]. On a three-tier architec-
ture, software components are divided into three layers: a user
interface layer, an application processing layer (middle tier),
and a database management and processing layer [22]. Middle-
ware such as CORBA are often deployed to the middle tier to
integrate distributed enterprise applications including indepen-
dently developed applications [22], [23]. In addition, transaction
processing (TP) monitors often run on the middle tier for scala-
bility, workload, and resource balancing needs [22].
As Web applications become widespread, the three-tier archi-
tecture was extended by adding web clients (mainly browsers)
and web servers (e.g., Apache) [14]. Furthermore, the three-tier
architecture continues to evolve and subsequently the multi-
tier architecture appears. For example, additional tiers are often
introduced between client and other layers such as data layer
for security, workload and resource balancing, and performance
monitoring [22], [23].
III. INTEGRATION OF DISTRIBUTED ENTERPRISE APPLICATIONS:
THE PAST
This paper mainly concerns application integration on het-
erogeneous platforms. The research community came up with
the EAI solution to help achieve quality application integration.
EAI provides ways to integrate heterogeneous applications on
different systems and platforms [8].
Integration can be studied through different dimensions in-
cluding integration scope, integration point of view (views from
users, designers and developers), integration layer and integra-
tion level [22]. Furthermore, intra-enterprise integration can be
divided into horizontal and vertical integration [21], [22]. Inter-
enterprise integration includes business to business and busi-
ness to customer integration [22]. Integration levels can be at
hardware, platform, syntactical, and semantic levels [22]. From
the technology perspective, many researchers found it useful to
examine the system integration by focusing on different layers
[25]. Below is a brief introduction to integration on different
layers.
A. Communication Layer Integration
Integrating distributed applications requires those separate
applications to be able to communicate with each other and
to exchange data and information. For example, an application
may need to know the current status and operations of a remote
application in order to perform certain tasks such as scheduling.
Typically, protocols such as HTTP and IIOP are used to facili-
tate information exchange among different applications [25].
B. Data Integration
Research on data integration mainly deals with moving or
federating data between different types of data sources [22],
[26]. Data integration involves a lot of data mapping and con-
version among different elements including data source schema,
targeted data schema, and the mapping relationship between
data source schema and targeted data schema [25], [27]. The
drawback of data integration is that developers will have to un-
derstand and maintain the underlying schemas regularly to ad-
dress any changes [27].
C. Business Logic Integration
Integration at this layer includes integration in the sublayers
such as basic coordination, functional interfaces, business
3. HE AND XU: INTEGRATION OF DISTRIBUTED ENTERPRISE APPLICATIONS: A SURVEY 37
Fig. 1. The use of middleware in distributed applications.
protocol and policies, and nonfunctional properties [25]. A
traditional way for the application integration involves complex
system and network programming [25], [27]. Thus, maintaining
the traditional integrated enterprise system was quite difficult to
developers. To make the application integration at the business
logic level easier, the research community mainly focuses on
the development of middleware technologies. A number of
middleware technologies have been developed to build and
integrate distributed enterprise applications [28] in the past
two decades. Middleware is designed to help developers and
make distributed systems design less challenging [28], [29].
By adopting the middleware, we can easily separate applica-
tions from the underlying operating systems, hardware, and
network environments [2]. Due to the advantages brought by
middleware, the literature has witnessed an extensive use of
middleware technologies in industrial environments [3], [6],
[21]. As an important integration technology, middleware tech-
nologies are often used by industrial enterprises to integrate new
applications, emerging technologies and legacy applications
[8]. Typically, a middleware for communication comprises
two types of remote communications: message-passing, and/or
remote-invocation [6]. Additionally, middleware can provide
functions to ensure reliability, scalability, and performance
to enterprise systems [28], [29]. Fig. 1 illustrates the use of
middleware in distributed applications.
There are many types of middleware such as RPC-based
middleware, message-oriented middleware, event-based mid-
dleware, database middleware, transaction processing (TP)
monitors, security middleware, agent-based middleware, and
service oriented middleware [22], [30], [31]. In addition, some
large companies such as SAP implement their own custom
middleware as part of their application solution. Each of these
technologies and approaches has their own advantages and
disadvantages. As custom middleware has limited system
portability, interoperability, and configurability [2], our review
mainly focus on general purpose middleware technologies.
Our review shows that the most commonly used general
purpose middleware technologies at the business logic layer
for integrating distributed enterprise applications include the
RPC-based (remote invocation) middleware and message-ori-
ented middleware [6], [29]. Below is a brief introduction to
some of the major middleware technologies.
1) Distributed Computing Environment (DCE): DCE was
designed and developed to support distributed applications in
heterogeneous environments in early 1990’s [32], [33]. DCE
technology includes multiple components such as RPC, Direc-
tory Services, Time Service, and many other Services [32], [33].
DCE is supported by many different platforms and legacy oper-
ating systems. A main advantage of DCE is that the DCE RPC
facility enables software components on different platforms to
interact [22]. Compared to traditional networking programming
methods, RPC is relatively simpler to code [32]. However, DCE
does not have strong support mechanisms for object-oriented
languages because RPC is designed to be procedural since the
beginning [33]. As a result, DCE has lost its popularity in recent
years [33].
2) Distributed Component Object Model (DCOM): DCOM
is a technology developed by Microsoft to improve communi-
cation among software modules or components on the network
[32]. Using DCOM, two objects on two separate computers are
able to call each other’s methods. DCOM supports object-ori-
ented languages like C++ and Java. DCOM is well supported
by Windows platforms [33]. However, DCOM only supports a
few non-Windows operating systems, which limits the use of
DCOM for heterogeneous networks [33].
3) Common Object Request Broker Architecture (CORBA):
CORBA was invented in the early 1990s. Different from
DCOM, CORBA is platform and language independent.
CORBA supports a variety of systems and programming lan-
guages and has ability to integrate legacy software applications
[33]. Object Request Broker (ORB), a core component of
CORBA, is responsible for passing client side requests to
applications on remote servers [22], [33]. CORBA provides
specifications to help developers develop distributed applica-
tions across diverse platforms and environments [22]. CORBA
had applications in many domains including telecommunica-
tions, finance, medicine, and manufacturing [35]. However,
CORBA was complicated and difficult to use properly. As a
result, the interest in CORBA has declined sharply [33] and
CORBA is no longer popular in the middleware marketplace.
But some strengths of CORBA have been incorporated into
technologies such as J2EE and Web services [33].
4) Java Remote Method Invocation (RMI): Java RMI was
released by Sun around 1997 and Java RMI supports the de-
velopment of distributed applications using Java language [36].
Java RMI offers developers a way to implement distributed Java
applications. For example, a Java application on a computer
can invoke the methods of other remote Java objects on dif-
ferent computers [22], [36]. As Java is platform-independent,
Java RMI-based applications can be executed on many different
computing platforms [36]. However, RMI heavily relies on Java
language and does not work easily with other types of program-
ming languages such as C++ [36].
5) Message Oriented Middleware (MOM): MOM relies on
messages to enable communication between separate systems
[6]. Using the message passing and queueing mechanism, MOM
is able to carry information and action requests between dis-
tributed applications [6], [25]. MOM provides strong support
4. 38 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014
for asynchronous communications [6]. Main disadvantages of
MOM include limited support mechanisms for scalability, lack
of industrial standards, and poor portability [26]. MOM has
been used successfully in some industrial systems such as in-
tegrated manufacturing systems [20], [25].
D. Presentation Layer Integration
The integration in the presentation layer mainly focuses on
the user interface (UI) integration [27]. Presenting integrated
and consistent view for users is the main goal of UI integra-
tion [37]. So far, the research community has not done enough
work at the presentation level [27]. A recent example of user
interface integration is Web mashup such as integrating Google
Map with other applications [37]. Portlet is another UI integra-
tion technology and has the technical potential to help produce
more customizable and flexible portal applications [37]. Further
work on effective standardization and instructional design at the
presentation level is needed for effective user interface integra-
tion to take place [27].
IV. RECENT RESEARCH ON THE TECHNOLOGY INTEGRATION
OF DISTRIBUTED ENTERPRISE APPLICATIONS
In this section, we give a brief introduction to recent research
work on the integration of distributed enterprise applications
technologies. Both perspectives from developers and users are
examined respectively. From the developers’ perspective, en-
abling technologies for system developments including J2EE,
.Net framework, and other web-based technologies are dis-
cussed; from the users’ perspective, integration-related studies
based on grid computing and cloud computing are introduced.
A. Enabling Technologies for System Development
1) Java 2 Enterprise Edition (J2EE): J2EE has emerged as
a leading platform for developing enterprise applications [38].
J2EE contains a number of technologies such as “Enterprise
Java Beans, RMI, Java Server Pages (JSP), and XML” [38].
Particularly, the Enterprise JavaBeans (EJB) provides a sim-
plified method to develop component-based distributed appli-
cations over heterogeneous environments [22], [25]. J2EE has
been used extensively in industrial systems. For example, J2EE
was used as a system framework to integrate supply chain al-
liance enterprises’ information systems [39].
2) Microsoft’s .Net Framework: The .Net Framework pro-
vides support for objects developed by different Microsoft pro-
gramming technologies to communicate with each other [34]. It
allows programmers to create programs in different languages
and allows their execution on different runtime systems and en-
vironments [34]. The .NET framework also provides a way for
an object on one computer to call objects on a different com-
puter using remoting infrastructure [40]. As .Net runs only on
Windows systems, .Net technology has been rarely used in het-
erogeneous environments [34], [40].
3) Web Services, Service-Oriented Architecture (SOA) and
Enterprise Service Bus (ESB): As traditional middleware such
as CORBA and DCOM are typically used for Intranet appli-
cations and often has trouble to cross firewall boundaries [22],
[42], web services have been created to support the integration
of Internet applications in recent years [42]. A Web service usu-
ally contains various functions that can be organized as a single
entity and can be published to the Web as a new service [41],
[42]. Web services use the HTTP protocol transport informa-
tion and thus can easily pass requests through firewalls [22],
[41], [42].
Web services are building blocks for constructing Web-based
distributed applications and they are being considered by many
researchers as a suitable middleware for Internet-related appli-
cation integration [41], [42]. Both J2EE and .Net can be used as
programming tools by developers to create web services. Web
services play an important role for integrating different middle-
ware systems [41], [42]. As different middleware has different
advantages, many enterprises have used various middleware
over the years. However, middleware technologies and products
from different vendors often have trouble to easily interoperate
[43]. As a result, enterprises have to find other ways to integrate
these different middleware systems. In some cases, ad-hoc tech-
niques such as adapters were used or developed to support the
integration needed by enterprises [2], [43]. But oftentimes, the
integration is hard due to its complexity, lack of technical ex-
pertise and costs [2]. Web Services and its underlying principle
named Service-oriented architecture are considered good solu-
tions for such middleware-to-middleware interaction [2], [43].
SOA is a recent trend in integrating heterogeneous systems
and different middleware systems [43]. SOA provides detailed
guidelines and specifications to explain how services can be
described, discovered and/or used [8], [22]. In SOA, devel-
opers organize and package different software applications as
services. Each service includes an interface which specifies
the operations available and types of messages it can handle
[8], [43]. In industrial systems, SOA has been widely adopted
and applied to transportation systems, manufacturing execution
system, healthcare medical system, electronic power applica-
tion system, electronics production systems, factory ordering
systems, etc., [8], [20], [44]–[46].
Service-oriented integration depends on Enterprise Service
Bus (ESB). ESB is able to work across different middleware
products and standards to implement enterprise-wide SOA [2],
[8]. ESB can shield from different protocols (e.g., CORBA
IIOP, J2EE RMI) [2] to implement the smooth data flow and
exchange among different application systems [47]. Thus,
SOA-based ESB is often viewed as a new middleware tech-
nology by many researchers and practitioners. An example
is that an electronic power application system was integrated
by using ESB in Northern China [47]. Fig. 2 illustrates an
SOA-oriented integration environment using ESB. In sum-
mary, Web services, SOA and ESB provide a promising and
valuable framework for inter-enterprise integration.
B. Users’ Integrated Solutions
The selection of a solution to integrate specific distributed
enterprise applications depends on many factors such as the
variety of resources and the complexity of businesses. Ade-
quate computing solutions should be considered to support the
system-level integration of distributed applications. In this sec-
tion, we briefly discuss two key integration solutions from the
users’ perspective: grid computing and cloud computing.
5. HE AND XU: INTEGRATION OF DISTRIBUTED ENTERPRISE APPLICATIONS: A SURVEY 39
Fig. 2. An SOA-oriented integration environment using ESB.
1) Grid Computing: Grid computing has been adopted to
solve some complex integration problems. For example, a .Net-
based enterprise grid computing system was developed to con-
struct enterprise desktop grids and applications for users [48].
Key issues related to grid computing are heterogeneity, relia-
bility, reconfiguration, scheduling, and security. For example,
Goel and Sobolewski [49] discussed the security issue of a grid
system and developed a trust model for the system evaluation.
Currently, the tested grid systems or applications are still limited
to the low-level event responses and strong couplings are not ad-
equately involved in the integration of distributed components.
2) Cloud Computing: Cloud computing has been used to
support the integration of distributed applications recently. An
e-HUB was developed as a SaaS platform to support the integra-
tion of distributed enterprise [50]. Enterprise applications can
be plugged into the platform as needed. It is advantageous if
the e-HUB evolves into a new platform where e-services can
be easily deployed and integrated [50]. Delic and Riley [51] ar-
gued the enterprise knowledge architecture has evolved from
enterprise stack to grid computing and will evolve to an enter-
prise knowledge cloud in a few years. Despite recent advances
in grid computing and cloud computing, so far the achievements
in these areas have been fragmented. Few enterprises have suc-
cessfully applied grid computing or cloud computing to support
high-level enterprise operation and application integration.
V. FUTURE PERSPECTIVES
A. Trends
Integrating of various industry applications are an ongoing
task for industry enterprises that are adopting new technologies
and embedded devices. Some new trends in this area include the
following.
1) As web services, SOA and ESA are being increasingly
used to integrate existing and legacy applications, it is be-
coming increasingly important to ensure Quality-of-Ser-
vice (QoS) for effective integration [52]. As different web
service applications often have different QoS requirements
and may cause conflicts between each other for resources
such as bandwidth and processing time, it is necessary
to develop empirically tested QoS integration models to
check the QoS parameters, examine the defined service
levels and quality, identify issues, and implement mech-
anism for dynamically selecting QoS-aware web services
[53]–[55]. We expect to see models like trusted service co-
operation and integration model [49]–[51] to be deployed
in industrial enterprises.
2) The amount of data in industrial applications increases ex-
ponentially. There is an increasing need to integrate Online
Analytical Processing (OLAP), knowledge discovery, data
mining functions and data sources for decision support, in-
formation integration, and other business needs [56]–[58].
Application-specific middleware such as data mining mid-
dleware [56] will be increasingly developed and deployed
for industrial information system integration.
3) The semantic web technology and the popular social net-
working technology are still in their infancy in terms of
their use in industrial applications [59], [60]. The integra-
tion of semantic web technology and the social networking
technology with sensor data is expected to grow in indus-
trial applications [61] and to add more values to customers
and partners [59] in industrial settings. Various ontology
approaches for semantic integration and interoperability
[22] will become mature and more applicable in industrial
environments.
4) Mobile applications, embedded systems and smart em-
bedded devices have been increasingly deployed in
industry enterprises [61], [62]. This creates new op-
portunities and challenges to build communication and
interoperability between industrial systems and embedded
systems or devices [62]. Due to its strong support for
both autonomy and interoperability, SOA approaches
have the capabilities to implement communication and
data exchange between embedded systems/devices and
various applications [62]. We expect to see that industry
applications are increasingly integrated with services
running on networked, resource-limited mobile devices
and smart embedded devices using SOA approaches. On
the other hand, techniques such as embedded Web servers
[63], gateway implementation and XML [64], [65] and
TCP/IP-based protocol application programming [63],
[64] will continue to be used to exchange data with a
variety of heterogeneous Networked Control Systems
(NCS) and commercial Programmable Logic Controllers
(PLC) deployed in the industry over the years [63].
B. Some Research Challenges
1) As more and more industrial enterprise are adopting Web
services to integrate various applications and devices, se-
curity challenges become more prominent. For example,
security risk may arise in various stages of the industrial
process such as the diagnosis, troubleshooting, and main-
tenance stages [3] because information exchange and de-
vice access have to go through multiple networks now.
2) Many industrial enterprises have “distributed real-time
control systems (DRCS)” which interact with sensors and
actuators over the network [65]. Generally, DRCS needs
to be more reliable, robust, and efficient than data-centric
applications [65]. Particularly, industrial enterprises such
as power plants have strict performance constraints and
response time requirements on their industrial systems
and applications [65], [66]. For example, many industrial
6. 40 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014
automation and control systems collect data from hetero-
geneous sensors and require real-time analyses for the
data collected from a variety of heterogeneous sensors
[66]–[69]. As DRCS is playing an increasingly crucial
role in critical industrial operations and transactions, new
integration techniques such as real-time distribution mid-
dleware, distributed real-time Java [6] and real-time SOA
solutions [66], [67] are needed to address performance
concerns, and mitigate integration risks such as data
quality issues, accountability, and security issues [70].
3) In practice, the integration of enterprise applications and
devices may collapse due to various unanticipated changes
[70]. Thus, research on the integration reliability including
data and information reliability is highly valued by all in-
dustrial enterprises [66]. New guidelines and methods such
as task load balance, fault-tolerant and message scheduling
and transaction mechanisms needed to be further devel-
oped to ensure the reliability, robustness, maintainability,
and rapid diagnosing of integrated industrial applications
and devices in various environments.
4) As new technologies and devices are constantly introduced
into industrial systems, user interface integration for indus-
trial systems poses many new problems [27] like various
interface types, standards, definitions, and service inter-
faces (functional, discovery, binding, etc.) [71]. Interface
integration requires a good understanding of various ap-
plications, devices and enterprise-wide integration require-
ments. Currently, there is a lack of conceptual modeling
techniques that can effectively help analysts comprehend
enterprise-wide integration requirements [72].
5) In recent years, new technologies such as wireless sensor
networks (WSNs), Internet of Things (IoT) and Radio Fre-
quency Identification (RFID) have been deployed to indus-
trial systems such as logistics systems, material flow sys-
tems, and supply chain management systems [73]. These
new technologies made the integration of industrial ap-
plications, devices and various interfaces more difficult.
There is a lack of services, guidelines, quality assurance,
and standard architecture for allowing interactions of het-
erogeneous devices, sensors, aggregators, actuators, and
diverse applications while increasing reusability and re-
ducing various privacy and security concerns and issues
[74]. For example, researchers identified a lack of ser-
vices which can effectively connect users to appropriate
sensor networks as the amount of data sources in sensor
network increases [75]. Deployment of built-in user-re-
lated services on physical devices still need further re-
search work to ensure the expected functionality and per-
formance [76]. Various middleware solutions and architec-
tures (e.g., publisher and subscriber architecture, message
bus architecture, ontology architecture) for integrating in-
dustrial applications, RFID, WSN, and IoT have been pro-
posed [22], [62], [66], [75]–[83]. However, these solutions
and architectures are typically designed for respective do-
mains. The scalability and customization of these middle-
ware solutions and architectures are still challenging issues
[84].
VI. CONCLUSION
EAI is concerned with the interaction and communication
of various applications on heterogeneous environments [22].
So far, many techniques have been developed to integrate dis-
tributed enterprise applications. In this paper, we have surveyed
the current status of the integration of distributed enterprise ap-
plications and discussed the research directions. As enterprises
continue to add and/or deploy more applications, integrating
distributed enterprise applications becomes inevitable for enter-
prises that need to achieve competitive advantages. As industry
enterprises are increasingly adopting multitier client/server, In-
ternet and service-oriented architectures for their enterprise ap-
plications and industrial devices [20], [35], [85], we have to ad-
dress the need and requirement for interoperability in the in-
dustrial enterprise environment [21]. Currently, there are still
many research challenges such as user interface integration, re-
liability, performance management and security risk manage-
ment [3], data mining for distributed applications [86], [87],
architecture design and optimization for wireless, RFID, and
real-time sensor network [75], [88], and control architecture for
the sensor, actuator and control service implementation [71].
These challenges will have to be effectively addressed or over-
come in order for industrial systems to become more effective
[8].
REFERENCES
[1] V. S. Tanenbaum, Distributed Systems, Principles and Paradigms.
Englewood Cliffs, NJ: Prentice Hall, 2002.
[2] S. Vinoski, “Integration with web services,” IEEE Internet Comput.,
vol. 7, no. 6, pp. 75–77, Nov.-Dec. 2003.
[3] Y. Xu, R. Song, L. Korba, L. Wang, W. Shen, and S. Lang, “Distributed
device networks with security constraints,” IEEE Trans. Ind. Informat.,
vol. 1, no. 4, pp. 217–225, Nov. 2005.
[4] “Function blocks for industrial-process measurement and control sys-
tems,” 2000, IEC TC65/WG6, IEC-TC65/WG6 Committee.
[5] D. S. Linthicum, Enterprise Application Integration. Essex, U.K.:
Addison-Wesley Longman Ltd., 2000.
[6] P. B. Val, M. Garcia-Valls, and I. Estevez-Ayres, “Simple asynchronous
remote invocations for distributed real-time Java,” IEEE Trans. Ind.
Informat., vol. 5, no. 3, pp. 289–298, Aug. 2009.
[7] K. Qureshi, “Enterprise application integration,” in Proc. IEEE 2005
Int. Conf. Emerging Technologies, Islamabad, Pakistan, Sep. 17–18,
2005, pp. 340–345.
[8] L. Xu, “Enterprise systems: State-of-the-art and future trends,” IEEE
Trans. Ind. Informat., vol. 7, no. 4, pp. 630–640, Nov. 2011.
[9] Z. D. Zhou, R. Valerdi, and S. M. Zhou, “Guest editorial,” IEEE Trans.
Ind. Informat., vol. 8, Special Section on Enterprise Systems, no. 3, p.
630, Aug. 2012.
[10] W. Viriyasitavat, L. Xu, and A. Martin, “SWSpec: The requirements
specification language in service workflow environments,” IEEE
Trans. Ind. Informat., vol. 8, no. 3, pp. 631–638, Aug. 2012.
[11] L. Xu, W. Viriyasitavat, P. Ruchikachorn, and A. Martin, “Using
propositional logic for requirements verification of service workflow,”
IEEE Trans. Ind. Informat., vol. 8, no. 3, pp. 639–646, 2012.
[12] J. Guo, L. Xu, G. Xiao, and Z. Gong, “Improving multilingual semantic
interoperation in cross-organizational enterprise systems through con-
cept disambiguation,” IEEE Trans. Ind. Informat., vol. 8, no. 3, pp.
647–658, Aug. 2012.
[13] Y. H. Yin, J. Y. Xie, L. Xu, and H. Chen, “Imaginal thinking-based
human-machine design methodology for the configuration of reconfig-
urable machine tools,” IEEE Trans. Ind. Informat., vol. 8, no. 3, pp.
659–668, Aug. 2012.
[14] L. Xu, C. Wang, Z. Bi, and J. Yu, “AutoAssem: An automated assembly
planning system for complex products,” IEEE Trans. Ind. Informat.,
vol. 8, no. 3, pp. 669–678, Aug. 2012.
7. HE AND XU: INTEGRATION OF DISTRIBUTED ENTERPRISE APPLICATIONS: A SURVEY 41
[15] L. Li, R. Ge, S. M. Zhou, and R. Valerdi, “Guest editorial integrated
healthcare information systems,” IEEE Trans. Inform. Technol.
Biomed., vol. 16, no. 4, pp. 515–517, 2012.
[16] Y. H. Yin, Y. J. Fan, and L. Xu, “EMG and EPP-integrated human-ma-
chine interface between the paralyzed and rehabilitation exoskeleton,”
IEEE Trans. Inform. Technol. Biomed., vol. 16, no. 4, pp. 542–549,
2012.
[17] “Roadmap for board assembly,” in NEMI Technology Roadmaps 1996
Edition. Herndon, VA, USA: INEMI, Dec. 1996, .
[18] S. Chen, “Open design of networked power quality monitoring sys-
tems,” IEEE Trans. Instrument. Meas., vol. 53, no. 2, pp. 597–601,
Apr. 2004.
[19] A. Lüder, A. Klostermeyer, J. Peschke, A. Bratoukhine, and T. Sauter,
“Distributed automation: PABADIS versus HMS,” IEEE Trans. Ind.
Informat., vol. 1, no. 1, pp. 31–38, Feb. 2005.
[20] I. M. Delamer and J. L. M. Lastra, “Service-oriented architecture for
distributed publish/subscribe middleware in electronics production,”
IEEE Trans. Ind. Informat., vol. 2, no. 4, pp. 281–294, Nov. 2006.
[21] A. Kalogeras, J. Gialelis, C. Alexakos, M. Georgoudakis, and S.
Koubias, “Vertical integration of enterprise industrial systems utilizing
web services,” IEEE Trans. Ind.Informat., vol. 2, no. 2, pp. 120–128,
May 2006.
[22] S. Izza, “Integration of industrial information systems: From syntactic
to semantic integration approaches,” Enterprise Inform. Syst., vol. 3,
no. 1, pp. 1–57, 2009.
[23] V. Matena, S. Krishnan, L. DeMichiel, and B. Stearns, Applying En-
terprise JavaBeans™: Component-Based Development for the J2EE™
Platform, 2nd ed. Reading, MA, USA: Addison-Wesley, 2003.
[24] A. Sinha, “Client-server computing,” Communications of the ACM,
vol. 35, no. 7, pp. 77–98, Jul. 1992.
[25] B. Benatallah and H. R. Motahari-Nezhad, “Service oriented architec-
ture: Overview and directions,” Advances in Software Engineering A.
Ferro and E. Boerger, Eds., vol. 5316/2008, Lecture Notes in Computer
Science, pp. 116–130, 2008.
[26] D. Chen, G. Doumeingtsb, and F. Vernadatc, “Architectures for
enterprise integration and interoperability: Past, present and future,”
Comput. Ind., vol. 59, no. 7, pp. 647–659, 2008.
[27] F. Daniel, J. Yu, B. Benatallah, F. Casati, M. Matera, and R. Saint-Paul,
“Understanding UI integration: A survey of problems, technologies,
and opportunities,” IEEE Internet Computi., vol. 11, no. 3, pp. 59–66,
May-Jun. 2007.
[28] P. Bernstein, “Middleware: A model for distributed systems services,”
Commun. ACM, pp. 86–98, 1996.
[29] S. L. Ooi and M. T. Su, “Integrating enterprise application using mes-
sage-oriented middleware and J2EE technologies,” in Proc. Int. Conf.
Comput. Informat., Jun. 2006, pp. 1–5.
[30] W. Emerich, “Software engineering and middleware: A roadmap,”
in Proc. Conf. Future of Software Eng., Limerick, Ireland, 2000, pp.
117–129.
[31] Q. Chen, J. Yao, and R. Xing, “Middleware components for e-com-
merce infrastructure: An analytical review,” J. Issues in Inform. Sci.
Inform. Technol., vol. 3, pp. 137–146, 2006.
[32] “Open Software Foundation,” in OSF DCE Application Development
Guide, 1.0.2 ed. Cambridge, MA: Open Software Foundation, 1994,
Revision 1.0.
[33] Recommendations for Using DCE, 1998., DCOM, and CORBA Mid-
dleware, Sponsored by: DISA/JIEO Center for Computer Systems En-
gineering (JEXF).
[34] Microsoft Corporation, “DCOM technical overview,” 2011. [Online].
Available: http://technet.microsoft.com/en-us/library/cc722925.aspx,
Available:
[35] S. Vinoski, “CORBA: Integrating diverse applications within dis-
tributed heterogeneous environments,” IEEE Commun. Mag., vol. 35,
no. 2, pp. 46–55, Feb. 1997.
[36] J. Maassen, R. van Nieuwpoort, R. Veldema, H. E. Bal, T. Kielmann,
C. Jacobs, and R. Hofman, “Efficient Java RMI for parallel program-
ming,” ACM Trans. Prog. Lang. Syst., vol. 23, no. 6, 2001.
[37] F. Bellas, “Standards for second-generation portals,” IEEE Internet
Comput., vol. 8, no. 2, pp. 54–60, Mar.-Apr. 2004.
[38] R. Johnson, “J2EE development frameworks,” Computer, vol. 38, no.
1, pp. 107–110, Jan. 2005.
[39] H. Zhang, B. Zhang, and B. Liu, “Information integration solutions
based on J2EE for supply chain enterprises,” in Proc. Int. Conf.
Manage. Serv. Sci. (MASS), Wuhan, China, 2011, pp. 1–4.
[40] S. Khan, K. Qureshi, and H. Rashid, “Performance comparison of ICE,
HORB, CORBA and dot NET remoting middleware technologies,” Int.
J. Comput. Appl., vol. 3, no. 11, pp. 15–18, 2010.
[41] J. Roy and A. Ramanujan, “Understanding web services,” IT Profess.,
vol. 3, no. 6, pp. 69–73, 2001.
[42] M. D. Hanes, S. C. Ahalt, and A. K. Krishnamurthy, “A comparison
of Java RMI, CORBA, and web services technologies for distributed
SIP applications,” in High Performance Embedded Computing Annual
Workshop (HPEC), 2002.
[43] S. Baker and S. Dobson, “Comparing service-oriented and distributed
object architectures,” in Proc. Int. Symp. Distrib. Obj. Appl., 2005, pp.
631–645, LNCS 3760: p.
[44] Y. H. Yin and J. Y. Xie, “Reconfigurable manufacturing execution
system for pipe cutting,” Enterprise Inform. Syst., vol. 5, no. 3, pp.
287–299, 2011.
[45] L. Duan, W. N. Street, and E. Xu, “Healthcare information systems:
Data mining methods in the creation of a clinical recommender
system,” Enterprise Inform. Syst., vol. 5, no. 2, pp. 169–181, 2011.
[46] M. Dumitrache, S. Dumitra, and M. Baciu, “Web services integration
with distributed applications,” J. Appl. Quantitative Methods, vol. 5,
no. 2, pp. 223–233, 2010.
[47] R. Xu, J. Bai, and Y. Wang, “The research and implementation of
power application system integration based on enterprise service bus,”
in Proc. IEEE Int. Conf. Intell. Comput. Intell. Syst. (ICIS), Beijing,
China, 2010, pp. 466–469.
[48] A. Luther, R. Buyya, R. Ranjan, and S. Venugopal, “Alchemi: A
.NET-based enterprise grid computing system,” in Proc. 6th Int.
Conf. Internet Comput. (ICOMP’05), Las Vegas, NV, USA, June
27–30, 2005.
[49] S. Goel and M. Sobolewski, “Trust and security in enterprise grid com-
puting environment,” in Proc. IASTED Int. Conf. Commun., Netw., In-
form. Security, New York, NY, USA, Dec. 10–12, 2003.
[50] D. Concha, J. Espadas, D. Romero, and A. Molina, “The e-hub evo-
lution: From a custom software architecture to a software-as-a-ser-
vice implementation,” Comput. Industry, vol. 61, no. 2, pp. 145–151,
2010.
[51] K. A. Delic and J. A. Riley, “Enterprise knowledge clouds: Next gen-
eration KM systems?,” in Proc. Int. Conf. Inform., Process, Knowl.
Manage., 2009, pp. 49–53.
[52] B. S. Farroha and D. L. Farroha, “Policy-based QoS requirements in a
SOA enterprise framework—An investigative analysis,” in Proc. IEEE
Military Commun. Conf., 2007, pp. 1–7.
[53] J. Ai, J. , J. Gao, J. Yu, and Z. Zhao, “A concept for QoS integration
in trusted and autonomic service cooperation,” in Proc. 1st Int. Conf.
Inform. Sci. Eng. (ICISE2009), 2009, pp. 3922–3925.
[54] X. Wang and X. Xu, “DIMP: An interoperable solution for software
integration and product data exchange,” Enterprise Inform. Syst., vol.
6, no. 3, pp. 291–314, 2012.
[55] R. Mietzner, F. Leymann, and T. Unger, “Horizontal and vertical com-
bination of multi-tenancy patterns in service-oriented applications,”
Enterprise Inform. Syst., vol. 5, no. 1, pp. 59–77, 2011.
[56] V. T. Ravi and G. Agrawal, “Integrating and optimizing transactional
memory in a data mining middleware,” in Proc. Int. Conf. High Per-
form. Comput. (HiPC), 2009, pp. 215–224.
[57] B. Liu, S. G. Cao, and W. He, “Distributed data mining for E-business,”
Inform. Technol. Manage., vol. 12, no. 1, pp. 1–13, 2011.
[58] E. Xu, M. Wermus, and D. B. Bauman, “Development of an integrated
medical supply information system,” Enterprise Inform. Syst., vol. 5,
no. 3, pp. 385–399, 2011.
[59] J. G. Breslin, D. O’Sullivan, A. Passant, and L. Vasiliu, “Semantic
web computing in industry,” Comput. Ind., vol. 61, no. 8, pp. 729–741,
2010.
[60] G. Governatori and R. Iannella, “A modeling and reasoning framework
for social networks policies,” Enterprise Inform. Syst., vol. 5, no. 1, pp.
145–167, 2011.
[61] M. Kaplan and M. Haenlein, “Users of the world, unite! The chal-
lenges and opportunities of social media,” Business Horizons, vol. 53,
pp. 59–68, 2010, S..
[62] D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, “Inter-
acting with the SOA-based internet of things: Discovery, query, selec-
tion, and on-demand provisioning of web services,” IEEE Trans. Ser-
vices Comput., vol. 3, no. 3, pp. 223–235, Jul.-Sep. 2010.
[63] A. Jestratjew and A. Kwiecien, “Performance of HTTP protocol in
networked control systems,” IEEE Trans. Ind. Informat., 2012, DOI:
10.1109/TII.2012.2183138.
[64] T. Sauter and M. Lobashov, “How to access factory floor information
using internet technologies and gateways,” IEEE Trans. Ind. Informat.,
vol. 7, no. 4, pp. 699–712, Nov. 2011.
[65] S. Eberle, “Adaptive internet integration of field bus systems,” IEEE
Trans. Ind. Informat., vol. 3, no. 1, pp. 12–20, Feb. 2007.
8. 42 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014
[66] L. Du, C. Duan, S. Liu, and W. He, “Research on service bus for dis-
tributed real-time control systems,” in Proc. 6th IEEE Joint Int. Inform.
Technol. Artif. Intell. Conf., 2011, pp. 401–405.
[67] T. Cucinotta, A. Mancina, G. F. Anastasi, G. Lipari, L. Mangeruca, R.
Checcozzo, and F. Rusinà, “A real-time service-oriented architecture
for industrial automation,” IEEE Trans. Ind. Informat., vol. 5, no. 3,
pp. 267–277, Aug. 2009.
[68] T. Cucinotta, L. Palopoli, L. Abeni, D. Faggioli, and G. Lipari, “On
the integration of application level and resource level QoS control for
real-time applications,” IEEE Trans. Ind. Informat., vol. 6, no. 4, pp.
479–491, Nov. 2010.
[69] X. Liu, Q. Wang, S. Gopalakrishnan, W. He, L. Sha, H. Ding, and K.
Lee, “ORTEGA: An efficient and flexible online fault tolerance archi-
tecture for real-time control systems,” IEEE Trans. Ind. Informat., vol.
4, no. 4, pp. 213–224, Nov. 2008.
[70] R. Gleghorn, “Enterprise application integration: A manager’s perspec-
tive,” IT Professional, vol. 7, no. 6, pp. 17–23, 2005.
[71] A. Pohl, H. Krumm, F. Holland, I. Luck, and F.-J. Stewing, “Service-
orientation and flexible service binding in distributed automation and
control systems,” in Proc. 22nd Adv. Inform. Netw. Appl. Workshops,
2008, pp. 1393–1398.
[72] N. Bolloju, “Conceptual modeling of systems integration require-
ments,” IEEE Software, vol. 26, no. 5, pp. 66–74, Sep.-Oct. 2009.
[73] S. Kumar, B. Kadow, and M. Lamkin, “Challenges with the introduc-
tion of radio-frequency identification systems into a manufacturer’s
supply chain—A pilot study,” Enterprise Inform. Syst., vol. 5, no. 2,
pp. 235–253, 2011.
[74] S. Bandyopadhyay, M. Sengupta, S. Maiti, and S. Dutta, “Role of mid-
dleware for internet of things: A study,” Int. J. Comput. Sci. Eng. Survey
(IJCSES), vol. 2, no. 3, pp. 94–105, 2011.
[75] C. Gadea, B. Ionescu, and D. Ionescu, “Real-time collaborative intelli-
gent services for sensor networks,” in Proc. ICCC-CONTI 2010, May
2010, pp. 511–516.
[76] G. Candido, A. W. Colombo, J. Barata, and F. Jammes, “Service-ori-
ented infrastructure to support the deployment of evolvable production
systems,” IEEE Trans. Ind. Informat., vol. 7, no. 4, pp. 759–767, Nov.
2011.
[77] F. Gandino, B. Montrucchio, M. Rebaudengo, and E. R. Sanchez, “On
improving automation by integrating RFID in the traceability manage-
ment of the agri-food sector,” IEEE Trans. Ind. Electron., vol. 56, no.
7, pp. 2357–2365, Jul. 2009.
[78] Y. Tian, J. V. Geiger, H. B. Su, S. V. Kumar, and P. R. Houser, “Mid-
dleware-based sensor web integration,” IEEE J. Sel. Topics Appl. Earth
Observations and Remote Sensing, vol. 3, no. 4, pp. 467–472, Dec.
2010.
[79] S. Haller, S. Kanouskos, and C. Schroth, “The Internet of Things in an
enterprise context,” in Future Internet Systems (FIS). New York, NY,
USA: Springer, 2009, vol. 5468, pp. 14–28, LCNS.
[80] C. Lee and C. Chung, “RFID data processing in supply chain manage-
ment using a path encoding scheme,” IEEE Trans. Knowl. Data Eng.,
vol. 23, no. 5, pp. 742–758, May 2011.
[81] M. Kranz, P. Holleis, and A. Schmidt, “Embedded interaction inter-
acting with the Internet of things,” IEEE Internet Comput., pp. 46–53,
Mar./Apr. 2010.
[82] T. Perumal, A. R. Ramli, C. Y. Leong, K. Samsudin, and S. Mansor,
“Middleware for heterogeneous subsystems interoperability in intel-
ligent buildings,” Autom. Construction, vol. 19, no. 2, pp. 160–168,
2010.
[83] L. Xu, “Information architecture for supply chain quality manage-
ment,” Int. J. Prod. Res., vol. 49, no. 1, pp. 183–198, Jan. 2011.
[84] H. Panetto and A. Molina, “Enterprise integration and interoperability
in manufacturing systems: Trends and issues,” Comput. Ind., vol. 59,
no. 7, pp. 641–646, 2008.
[85] G. Cândido, A. W. Colombo, J. Barata, and F. Jammes, “Service-ori-
ented infrastructure to support the deployment of evolvable production
systems,” IEEE Trans. Ind. Informat., vol. 7, no. 4, pp. 759–767, Nov.
2011.
[86] D. M. Chiang, C. Lin, and M. Chen, “The adaptive approach for storage
assignment by mining data of warehouse management system for dis-
tribution centres,” Enterprise Inform. Syst., vol. 5, no. 2, pp. 219–234,
2011.
[87] L. Duan and L. Xu, “Business intelligence for enterprise systems: A
survey,” IEEE Trans. Ind. Informat., vol. 8, no. 3, pp. 679–687, Aug.
2012.
[88] S. Li, L. Xu, X. Wang, and J. Wang, “Integration of hybrid wireless
networks in cloud services oriented enterprise information systems,”
Enterprise Inform. Syst., vol. 6, no. 2, pp. 165–187, 2012.
Wu He received the B.S. degree in computer science
from DongHua University, Shanghai, China, in
1998, and the Ph.D. degree in information science
from the University of Missouri, Columbia, MO,
USA, in 2006.
His research interests include enterprise applica-
tions, data mining, and knowledge management.
Li Da Xu (M’86–SM’11) received the M.S. degree
in information science and engineering from the
University of Science and Technology of China,
Hefei, Anhui Province, in 1981, and the Ph.D. degree
in systems science and engineering from Portland
State University, Portland, OR, USA, in 1986.
He serves as the Founding Chair of IFIP TC8
WG8.9 and the Founding Chair of the IEEE SMC
Society Technical Committee on Enterprise Infor-
mation Systems.