SlideShare a Scribd company logo
INTEGRATIVE
PROGRAMMING
&
TECHNOLOGIES
• Integrative programming deals with an integration
approaches and techniques that connect different
components of IT infrastructure-people, applications,
platforms and databases to enable a secure,
intra and inter application collaboration.
• Integrative solutions enable an organization to integrate
business processes internally and externally with business
partners to create dynamic environments that supports
current and evolving business requirements, thereby
creating a global organization.
• Integration is the process of connecting multiple,
independently developed applications using
incompatible technologies into a single organization
wide system with information flowing seamlessly
among the integrated systems or components.
• Integration of multiple, independently developed, managed and maintained applications
components that may normally use incompatible technologies and heterogeneous
platforms” enables transmission of information between applications, automates flow of
data between applications that make up the business process flow.
• Integration is the process of combining separate applications into cooperating collections
of application.
OVERVIEW OF INTER SYSTEM
COMMUNICATION
• Inter-system communication is the
communication between a set of
heterogeneous systems that are integrated
together. These integrated systems which
put together many heterogeneous set of
subsystems and the produced objects are
extremely different, yet should contribute
to the same process.
Software integration includes one or
more of the following.
• System integration
• Functional integration or technology integration
• Incremental engineering
• Modification
Software integration includes one or
more of the following.
System integration
• Given two or more systems, subsystems or
components, each of which function properly
(satisfying their requirement within their
environment). The problem is to integrate them into
one larger system satisfying the combined
requirements within the newly formed environment
Software integration includes one or
more of the following.
Functional integration or technology integration
Given a software system, this may have been functioning
properly in the field for a significant period. The problem is
to integrate a new function or a new technology within the
system. The integrated system should provide the new
functionality or use the new technology, while preserving
the original system functionality.
Software integration includes one or
more of the following.
Incremental engineering
A software system can be developed and delivered using
available technologies and with less functionality than it is
intended to finally provide. New technologies and or more
functions then can be integrated within the system. The
problem is to design the system with such future
integration in mind.
Applications originally intended to operate
separately, later on are required to
interoperate with others. Some of the reasons
for integration are the following;
Technology change affects all layers; legacy does not go away so easily.
The architecture of the organization information system depends on
constraints related to the technology but also to the organization.
Within an enterprise, each department may have its own IT infrastructure,
systems and databases which are maintained independently. Integrating them
may bring additional value to the company.
Integration assists in formation of Zero Latency organization - when all
functions within the organization work with the same up-to-date information,
latency between applications is eliminated/ reduced.
Updating and integrating of applications is possible whenever required. New
applications can be created by integrating real time data from different parts
of the enterprise
Integration model defines how applications will be integrated by
defining the nature of and mechanisms for integration. Some of the
methods used for application integration are discussed in the
following section. These models include;
1) Presentation integration model allows the integration of new
software through the existing presentations of the legacy software.
This is typically used to create a new user interface but may be used
to integrate with other applications.
2) Data integration model allows the integration of software through
access to the data that is created, managed and stored by the
software typically for the purposes of reusing or synchronizing data
across applications.
3) Functional integration model allows the integration of software for
the purpose of invoking existing functionality from other new or
existing applications. The integration is done through interfaces to
the software.
All integration solutions have to deal with a few fundamental
challenges: some of the challenges of integration are;
Network unreliability
Distributed systems
Slow networks and
Heterogeneity
Modification complexity

More Related Content

What's hot

System integration
System integrationSystem integration
System integration
Anita Martinek
 
Advance database systems (part 1)
Advance database systems (part 1)Advance database systems (part 1)
Advance database systems (part 1)
Abdullah Khosa
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
Rohana K Amarakoon
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
EarlvonDeiparine1
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
Uc Man
 
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various ChallengesWeb 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Subhash Basistha
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMSkoolkampus
 
Context model
Context modelContext model
Context model
Ubaid423
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Lesson 4 Productivity Tools.pptx
Lesson 4 Productivity Tools.pptxLesson 4 Productivity Tools.pptx
Lesson 4 Productivity Tools.pptx
VinjelLibradilla2
 
Advanced Database System
Advanced Database SystemAdvanced Database System
Advanced Database System
sushmita rathour
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
System analysis and design chapter 2
System analysis and design chapter 2System analysis and design chapter 2
System analysis and design chapter 2
Einrez Pugao
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management System
Eddyzulham Mahluzydde
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
Mark John Lado, MIT
 
L1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technologyL1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technology
Marko-_
 

What's hot (20)

System integration
System integrationSystem integration
System integration
 
Advance database systems (part 1)
Advance database systems (part 1)Advance database systems (part 1)
Advance database systems (part 1)
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various ChallengesWeb 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMS
 
Context model
Context modelContext model
Context model
 
Network management
Network managementNetwork management
Network management
 
Lesson 4 Productivity Tools.pptx
Lesson 4 Productivity Tools.pptxLesson 4 Productivity Tools.pptx
Lesson 4 Productivity Tools.pptx
 
Advanced Database System
Advanced Database SystemAdvanced Database System
Advanced Database System
 
Computer security
Computer securityComputer security
Computer security
 
System analysis and design chapter 2
System analysis and design chapter 2System analysis and design chapter 2
System analysis and design chapter 2
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management System
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
L1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technologyL1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technology
 

Similar to INTEGRATIVE PROGRAMMING ch1.pptx

Module 1 - Introduction to system integration.pptx
Module 1 - Introduction to system integration.pptxModule 1 - Introduction to system integration.pptx
Module 1 - Introduction to system integration.pptx
PLUKmaryannjoaquin
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdf
JohnLagman3
 
Enterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) conceptsEnterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) concepts
Shantanu Thakre
 
Unit V
Unit VUnit V
07 software design
07   software design07   software design
07 software designkebsterz
 
07 software design
07   software design07   software design
07 software designkebsterz
 
Assessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing OrganizationsAssessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing Organizations
IJCSIS Research Publications
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
Techglyphs
 
How Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdfHow Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdf
Sufalam Technologies
 
TREA - transparent enterprise architecture
TREA - transparent enterprise architectureTREA - transparent enterprise architecture
TREA - transparent enterprise architecture
Jernej Vrčko
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processEric Saraceno
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06Jay van Zyl
 
Using Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems DevelopmentUsing Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems Development
IJEID :: International Journal of Excellence Innovation and Development
 
DevOps
DevOps DevOps
DevOps
Hakan Yüksel
 
Inversion of Control
Inversion of ControlInversion of Control
Inversion of Control
Glen Alleman
 
RESEARCH PROPOSAL2Businesses Security Policies and I.docx
RESEARCH PROPOSAL2Businesses Security Policies and I.docxRESEARCH PROPOSAL2Businesses Security Policies and I.docx
RESEARCH PROPOSAL2Businesses Security Policies and I.docx
gholly1
 
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Shaunak Gujjewar
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and AnswersBala Ganesh
 
Software evolution and maintenance basic concepts and preliminaries
Software evolution and maintenance   basic concepts and preliminariesSoftware evolution and maintenance   basic concepts and preliminaries
Software evolution and maintenance basic concepts and preliminaries
Moutasm Tamimi
 

Similar to INTEGRATIVE PROGRAMMING ch1.pptx (20)

Module 1 - Introduction to system integration.pptx
Module 1 - Introduction to system integration.pptxModule 1 - Introduction to system integration.pptx
Module 1 - Introduction to system integration.pptx
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdf
 
Enterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) conceptsEnterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) concepts
 
Unit V
Unit VUnit V
Unit V
 
07 software design
07   software design07   software design
07 software design
 
07 software design
07   software design07   software design
07 software design
 
10.1.1.107.2618
10.1.1.107.261810.1.1.107.2618
10.1.1.107.2618
 
Assessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing OrganizationsAssessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing Organizations
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
How Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdfHow Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdf
 
TREA - transparent enterprise architecture
TREA - transparent enterprise architectureTREA - transparent enterprise architecture
TREA - transparent enterprise architecture
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
Using Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems DevelopmentUsing Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems Development
 
DevOps
DevOps DevOps
DevOps
 
Inversion of Control
Inversion of ControlInversion of Control
Inversion of Control
 
RESEARCH PROPOSAL2Businesses Security Policies and I.docx
RESEARCH PROPOSAL2Businesses Security Policies and I.docxRESEARCH PROPOSAL2Businesses Security Policies and I.docx
RESEARCH PROPOSAL2Businesses Security Policies and I.docx
 
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and Answers
 
Software evolution and maintenance basic concepts and preliminaries
Software evolution and maintenance   basic concepts and preliminariesSoftware evolution and maintenance   basic concepts and preliminaries
Software evolution and maintenance basic concepts and preliminaries
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

INTEGRATIVE PROGRAMMING ch1.pptx

  • 2. • Integrative programming deals with an integration approaches and techniques that connect different components of IT infrastructure-people, applications, platforms and databases to enable a secure, intra and inter application collaboration. • Integrative solutions enable an organization to integrate business processes internally and externally with business partners to create dynamic environments that supports current and evolving business requirements, thereby creating a global organization.
  • 3. • Integration is the process of connecting multiple, independently developed applications using incompatible technologies into a single organization wide system with information flowing seamlessly among the integrated systems or components.
  • 4. • Integration of multiple, independently developed, managed and maintained applications components that may normally use incompatible technologies and heterogeneous platforms” enables transmission of information between applications, automates flow of data between applications that make up the business process flow. • Integration is the process of combining separate applications into cooperating collections of application.
  • 5. OVERVIEW OF INTER SYSTEM COMMUNICATION • Inter-system communication is the communication between a set of heterogeneous systems that are integrated together. These integrated systems which put together many heterogeneous set of subsystems and the produced objects are extremely different, yet should contribute to the same process.
  • 6. Software integration includes one or more of the following. • System integration • Functional integration or technology integration • Incremental engineering • Modification
  • 7. Software integration includes one or more of the following. System integration • Given two or more systems, subsystems or components, each of which function properly (satisfying their requirement within their environment). The problem is to integrate them into one larger system satisfying the combined requirements within the newly formed environment
  • 8. Software integration includes one or more of the following. Functional integration or technology integration Given a software system, this may have been functioning properly in the field for a significant period. The problem is to integrate a new function or a new technology within the system. The integrated system should provide the new functionality or use the new technology, while preserving the original system functionality.
  • 9. Software integration includes one or more of the following. Incremental engineering A software system can be developed and delivered using available technologies and with less functionality than it is intended to finally provide. New technologies and or more functions then can be integrated within the system. The problem is to design the system with such future integration in mind.
  • 10. Applications originally intended to operate separately, later on are required to interoperate with others. Some of the reasons for integration are the following; Technology change affects all layers; legacy does not go away so easily. The architecture of the organization information system depends on constraints related to the technology but also to the organization. Within an enterprise, each department may have its own IT infrastructure, systems and databases which are maintained independently. Integrating them may bring additional value to the company. Integration assists in formation of Zero Latency organization - when all functions within the organization work with the same up-to-date information, latency between applications is eliminated/ reduced. Updating and integrating of applications is possible whenever required. New applications can be created by integrating real time data from different parts of the enterprise
  • 11. Integration model defines how applications will be integrated by defining the nature of and mechanisms for integration. Some of the methods used for application integration are discussed in the following section. These models include; 1) Presentation integration model allows the integration of new software through the existing presentations of the legacy software. This is typically used to create a new user interface but may be used to integrate with other applications. 2) Data integration model allows the integration of software through access to the data that is created, managed and stored by the software typically for the purposes of reusing or synchronizing data across applications. 3) Functional integration model allows the integration of software for the purpose of invoking existing functionality from other new or existing applications. The integration is done through interfaces to the software.
  • 12. All integration solutions have to deal with a few fundamental challenges: some of the challenges of integration are; Network unreliability Distributed systems Slow networks and Heterogeneity Modification complexity

Editor's Notes

  1. Most of organizations consist of more than one department, running department specific applications and those applications interact with each other to achieve the overall objective of the organizations. Information systems change overtime by growing in their size, incorporating functionality of the existing standalone systems
  2. Most of organizations consist of more than one department, running department specific applications and those applications interact with each other to achieve the overall objective of the organizations. Information systems change overtime by growing in their size, incorporating functionality of the existing standalone systems
  3. To support common business processes and data sharing across applications, these applications need to be integrated. Application integration needs to provide efficient, reliable and secure data exchange between multiple enterprises applications. A lot of the problems to be addressed in Organizations Application Integration system from having to integrate standalone applications which have been developed independently, operate autonomously, and were not originally indented to be integrated with one another. Integration of applications, developed by different languages and running on different computing platforms is not an easy task. By definition, integration has to deal with multiple applications running on multiple platforms in different locations, making the term ‘simple integration’ pretty much difficult. Software vendors offer application integration suites that provide cross-platform, cross-language integration as well as the ability to interface with many popular packaged business applications. However, this technical infrastructure presents only a small portion of the integration complexities. The true challenges of integration span far across business and technical issues. All integration solutions have to deal with a few fundamental challenges: some of the challenges of integration are;