This presentation shows how the ADORE framework is used to tame the complexity of orchestration design, based on a case study defined by Kienzle et al. This case study (Car Crash Crisis Management System) is defined as a common requirement set used to compare Aspect Oriented Modeling techniques.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document describes a case study on a Car Crash Crisis Management System (CCCMS) to validate an approach for behavioral composition in service-oriented architectures. The CCCMS contains 8 main success scenarios, 27 business extensions, and 3 non-functional properties. The scenarios and extensions were modeled as business processes and atomic services respectively, which were then composed together using the proposed algorithms.
Using Domain Feature to handle Feature InteractionsSébastien Mosser
Software Product Lines in general and feature diagrams in particular support the modeling of software variability. Un- fortunately, features may interact with each other, leading to feature interaction issues. Even if detected at the im- plementation level, interaction resolution choices are part of the business variability. In this paper, we propose to use a stepwise process to deal with feature interactions at the domain level: the way an interaction is resolved is consid- ered as a variation point in the configuration process. This method and the associated implementation are applied onto a concrete case study (the jSeduite information system).
Behavioral Compositions in Service-Oriented ArchitectureSébastien Mosser
The document discusses the benefits of exercise for both physical and mental health. It notes that regular exercise can reduce the risk of diseases like heart disease and diabetes, improve mood, and reduce feelings of stress and anxiety. Exercise is also credited with boosting brain health and improving cognitive function as we age.
The document summarizes the Italian education system. It describes the various levels, including nursery school for ages 3-6, primary school for ages 6-11 which is compulsory, and first level secondary school for ages 11-14 which is also compulsory. It then discusses high school, which students can enter after completing the first 8 years of primary and secondary education. It notes that reforms are coming to the Italian education system due to budget cuts that have decreased resources like teachers, staff, and funding, but that teachers are working to improve methods using technology and strategies, and that education remains important to Italian society and Europe.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document describes a case study on a Car Crash Crisis Management System (CCCMS) to validate an approach for behavioral composition in service-oriented architectures. The CCCMS contains 8 main success scenarios, 27 business extensions, and 3 non-functional properties. The scenarios and extensions were modeled as business processes and atomic services respectively, which were then composed together using the proposed algorithms.
Using Domain Feature to handle Feature InteractionsSébastien Mosser
Software Product Lines in general and feature diagrams in particular support the modeling of software variability. Un- fortunately, features may interact with each other, leading to feature interaction issues. Even if detected at the im- plementation level, interaction resolution choices are part of the business variability. In this paper, we propose to use a stepwise process to deal with feature interactions at the domain level: the way an interaction is resolved is consid- ered as a variation point in the configuration process. This method and the associated implementation are applied onto a concrete case study (the jSeduite information system).
Behavioral Compositions in Service-Oriented ArchitectureSébastien Mosser
The document discusses the benefits of exercise for both physical and mental health. It notes that regular exercise can reduce the risk of diseases like heart disease and diabetes, improve mood, and reduce feelings of stress and anxiety. Exercise is also credited with boosting brain health and improving cognitive function as we age.
The document summarizes the Italian education system. It describes the various levels, including nursery school for ages 3-6, primary school for ages 6-11 which is compulsory, and first level secondary school for ages 11-14 which is also compulsory. It then discusses high school, which students can enter after completing the first 8 years of primary and secondary education. It notes that reforms are coming to the Italian education system due to budget cuts that have decreased resources like teachers, staff, and funding, but that teachers are working to improve methods using technology and strategies, and that education remains important to Italian society and Europe.
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Stuart Charlton
Stuart Charlton's presentation at the 2008 Sys-Con Cloud Computing Expo in San Jose, CA
Revised for the 2009 Sys-Con Cloud Computing Expo in New York City
This document provides an overview of the Information Strategy Planning (ISP) process. The summary is:
The ISP process involves (1) analyzing business plans and needs, (2) building data, function, and information architecture models, and (3) defining a business systems architecture and implementation roadmap. The goal is to align information management support with organizational needs and enabling technologies through business process redesign and a technical architecture that integrates business functions into a seamless network of systems.
This is the main presentation we gave at the Open Source World Conference in Málaga, Spain in 2008.
It is a tutorial of concepts and how to work with Osmius the Open Source Monitoring Tool
An Introduction To Rational's New Requirements ComposerOneSpring LLC
OneSpring Director of Business Development Mark Sandefur presents an introduction to IBM's Rational Requirements Composer and it's impact on the requirements definition space.
Itac benoit long deck final eng - feb 12 2013KBIZEAU
Shared Services Canada is transforming IT service delivery through a multi-step methodology. It aims to simplify technology infrastructure, standardize processes, modernize systems and make services more cost effective. The transformation will consolidate data centres, modernize networks and transition to a cloud-based infrastructure over three waves from 2013 to 2020. It uses a five step plan-build-operate methodology for individual service transformations.
CDP - Global Outlook for Business IntelligenceVincent Kwon
The presentation discusses trends in business intelligence, including standardization, mashups, data quality, governance, pre-built analytics, dashboarding, collaboration, competency centers, and leveraging analytics. It provides examples of how these trends are impacting analysts and being adopted by local New Zealand and international companies.
The use of Enterprise Performance Management (EPM) software for speeding an organization's financial reporting and planning and budgeting can have a direct impact on the bottom line...
Presentation: Enterprise Architecture design In 3 Minutes or soAdrian Grigoriu
The document provides an overview of enterprise architecture for Qantas Airline. It discusses the enterprise, including its structure and operations. It also discusses enterprise architecture, which provides a blueprint describing stakeholders' value streams and how technology and organizational resources execute them. Enterprise architecture enables enterprise-wide strategic roadmapping and transformation through project portfolio management. It helps streamline operations, increase agility, and provide competitive advantages.
In few years, the Business Applications in Enterprises will look very different. This quick deck will tell you how COTS solutions would change, how Enterprise Platforms would change, and how the Enterprise Applications Development would change. Let us know what you think!!!
Royston D.S. Fernandes is an experienced leader with over 15 years of experience in infrastructure project management. He has effectively managed concurrent, critical, and complex projects for various large organizations. Some of his accomplishments include delivering a $20 million wireless work management solution project and managing infrastructure projects across client clusters as Program Management Office for IBM's second largest financial services client.
Enterprise Open Cloud Forum: Restructuring IT For Profit in a Cloud WorldRackspace
In this session of the Enterprise Open Cloud Forum you will learn:
-What an IT department should look like in a cloud world
-How to reallocate internal IT resources after partnering with a service provider
-How to turn IT into an innovation engine
-How to assess your in-house skill sets: skills to develop and new skills to hire
Most of all, you will learn how to redefine, reorganize and revise roles and responsibilities, to bring the most value to your business. There is a right and a wrong way to restructure your IT department in a cloud world… and we will show you how driving business value drives business profit.
Defiance with its deep domain expertise and technology expertise in the enterprise and
cloud computing space offers best-in-class enterprise business solutions on Microsoft
Dynamics.
This document describes replicating installation facts data from SAP IS-U to custom fields in SAP CRM service contracts. It provides details on the required middleware objects and development of two BAdIs - one in IS-U to add the data to the middleware container, and one in CRM to download it and map to the appropriate CRM table and field. Sample code for the BAdIs is included to demonstrate how to transfer the IS-U installation facts to a custom field in CRM service contract items.
The document discusses balancing business value and risk when developing software solutions. It recommends an iterative and incremental approach using user story mapping and mapping stories to address technical risks first, create a minimum viable product, and then add additional features. An example story map is provided showing how stories could address technical risks first, then create an end-to-end scenario with minimum functionality, and later add more features and functionality. The goal is to validate solutions and problems early while managing technical debt and time to market in a sustainable way.
Business Process Management - From Market Consolidation to Process InnovationMichael zur Muehlen
This document summarizes a talk on business process management (BPM) given by Michael zur Muehlen. It provides background on zur Muehlen and Stevens Institute of Technology. It then outlines different types of BPM projects and challenges, including trying to model everything versus starting with a pilot process. It also discusses how BPM has evolved from a focus on workflow automation to using business rules engines and standards. The document concludes by discussing process modeling standards like BPMN and the Business Process Definition Metamodel.
ModelDR: how to industrialise business reportingGreg Soulsby
Learn how to:
A) Design business reports in a structured, repeatable and robust way
B) Map your business domain data to the business report
C) Enable auto generation of your report specifications and code
This most important when:
- You have a lot of business reports to design, build and maintain.
- You must implement a complex business reports, such as a regulatory report, and it has to be done right and on time.
This is the representation I gave at the NoMagic UML Conference 2013.
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Wil van der Aalst
Process mining can help analyze multi-tenant processes in the cloud in three key ways:
1) It allows for cross-organizational process mining by analyzing event logs from different organizations using cloud-based systems.
2) It supports the use of configurable process models to deal with process variability across organizations and account for different configurations in the cloud.
3) Process mining techniques like discovery, conformance checking, and extension can provide insights into processes and configurations in the cloud to detect deviations, bottlenecks, and suggest improvements.
Business Partner Datastream Arabia, INFOR EAMjcvd12
Solutions of Datastream Arabia LLC is looking for business partners to sell and implement their Infor Enterprise Asset Management (EAM) software in GCC countries. As an EAM solution provider, they help organizations improve asset performance, labor productivity, inventory levels, and other operational metrics. Becoming a business partner offers opportunities to increase sales percentages, access marketing funds, and receive product training and support. Their EAM software has over 10,000 customers worldwide and has proven benefits for industries including manufacturing, healthcare, and public sectors.
A commutative model composition operator to support software adaptationSébastien Mosser
The document proposes a commutative operator for composing software adaptation models. It introduces a set-based representation of adaptations as added and deleted model elements. This allows modeling adaptation composition as set operations, ensuring properties like commutativity and consistency checking. An implementation of the approach in a domain-specific language is described, along with validation using a car crash crisis management system case study.
Towards CloudML, a Model-Based Approach to Provision Resources in the CloudsSébastien Mosser
The Cloud-computing paradigm advocates the use of re- sources available “in the clouds”. In front of the multiplicity of cloud providers, it becomes cumbersome to manually tackle this heterogene- ity. In this paper, we propose to define an abstraction layer used to model resources available in the clouds. This cloud modelling language (CloudML) allows cloud users to focus on their needs, i.e., the modelling the resources they expect to retrieve in the clouds. An automated provi- sioning engine is then used to automatically analyse these requirements and actually provision resources in clouds. The approach is implemented, and was experimented on prototypical examples to provision resources in major public clouds (e.g., Amazon EC2 and Rackspace).
More Related Content
Similar to Taming Orchestration Design Using ADORE
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Stuart Charlton
Stuart Charlton's presentation at the 2008 Sys-Con Cloud Computing Expo in San Jose, CA
Revised for the 2009 Sys-Con Cloud Computing Expo in New York City
This document provides an overview of the Information Strategy Planning (ISP) process. The summary is:
The ISP process involves (1) analyzing business plans and needs, (2) building data, function, and information architecture models, and (3) defining a business systems architecture and implementation roadmap. The goal is to align information management support with organizational needs and enabling technologies through business process redesign and a technical architecture that integrates business functions into a seamless network of systems.
This is the main presentation we gave at the Open Source World Conference in Málaga, Spain in 2008.
It is a tutorial of concepts and how to work with Osmius the Open Source Monitoring Tool
An Introduction To Rational's New Requirements ComposerOneSpring LLC
OneSpring Director of Business Development Mark Sandefur presents an introduction to IBM's Rational Requirements Composer and it's impact on the requirements definition space.
Itac benoit long deck final eng - feb 12 2013KBIZEAU
Shared Services Canada is transforming IT service delivery through a multi-step methodology. It aims to simplify technology infrastructure, standardize processes, modernize systems and make services more cost effective. The transformation will consolidate data centres, modernize networks and transition to a cloud-based infrastructure over three waves from 2013 to 2020. It uses a five step plan-build-operate methodology for individual service transformations.
CDP - Global Outlook for Business IntelligenceVincent Kwon
The presentation discusses trends in business intelligence, including standardization, mashups, data quality, governance, pre-built analytics, dashboarding, collaboration, competency centers, and leveraging analytics. It provides examples of how these trends are impacting analysts and being adopted by local New Zealand and international companies.
The use of Enterprise Performance Management (EPM) software for speeding an organization's financial reporting and planning and budgeting can have a direct impact on the bottom line...
Presentation: Enterprise Architecture design In 3 Minutes or soAdrian Grigoriu
The document provides an overview of enterprise architecture for Qantas Airline. It discusses the enterprise, including its structure and operations. It also discusses enterprise architecture, which provides a blueprint describing stakeholders' value streams and how technology and organizational resources execute them. Enterprise architecture enables enterprise-wide strategic roadmapping and transformation through project portfolio management. It helps streamline operations, increase agility, and provide competitive advantages.
In few years, the Business Applications in Enterprises will look very different. This quick deck will tell you how COTS solutions would change, how Enterprise Platforms would change, and how the Enterprise Applications Development would change. Let us know what you think!!!
Royston D.S. Fernandes is an experienced leader with over 15 years of experience in infrastructure project management. He has effectively managed concurrent, critical, and complex projects for various large organizations. Some of his accomplishments include delivering a $20 million wireless work management solution project and managing infrastructure projects across client clusters as Program Management Office for IBM's second largest financial services client.
Enterprise Open Cloud Forum: Restructuring IT For Profit in a Cloud WorldRackspace
In this session of the Enterprise Open Cloud Forum you will learn:
-What an IT department should look like in a cloud world
-How to reallocate internal IT resources after partnering with a service provider
-How to turn IT into an innovation engine
-How to assess your in-house skill sets: skills to develop and new skills to hire
Most of all, you will learn how to redefine, reorganize and revise roles and responsibilities, to bring the most value to your business. There is a right and a wrong way to restructure your IT department in a cloud world… and we will show you how driving business value drives business profit.
Defiance with its deep domain expertise and technology expertise in the enterprise and
cloud computing space offers best-in-class enterprise business solutions on Microsoft
Dynamics.
This document describes replicating installation facts data from SAP IS-U to custom fields in SAP CRM service contracts. It provides details on the required middleware objects and development of two BAdIs - one in IS-U to add the data to the middleware container, and one in CRM to download it and map to the appropriate CRM table and field. Sample code for the BAdIs is included to demonstrate how to transfer the IS-U installation facts to a custom field in CRM service contract items.
The document discusses balancing business value and risk when developing software solutions. It recommends an iterative and incremental approach using user story mapping and mapping stories to address technical risks first, create a minimum viable product, and then add additional features. An example story map is provided showing how stories could address technical risks first, then create an end-to-end scenario with minimum functionality, and later add more features and functionality. The goal is to validate solutions and problems early while managing technical debt and time to market in a sustainable way.
Business Process Management - From Market Consolidation to Process InnovationMichael zur Muehlen
This document summarizes a talk on business process management (BPM) given by Michael zur Muehlen. It provides background on zur Muehlen and Stevens Institute of Technology. It then outlines different types of BPM projects and challenges, including trying to model everything versus starting with a pilot process. It also discusses how BPM has evolved from a focus on workflow automation to using business rules engines and standards. The document concludes by discussing process modeling standards like BPMN and the Business Process Definition Metamodel.
ModelDR: how to industrialise business reportingGreg Soulsby
Learn how to:
A) Design business reports in a structured, repeatable and robust way
B) Map your business domain data to the business report
C) Enable auto generation of your report specifications and code
This most important when:
- You have a lot of business reports to design, build and maintain.
- You must implement a complex business reports, such as a regulatory report, and it has to be done right and on time.
This is the representation I gave at the NoMagic UML Conference 2013.
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Wil van der Aalst
Process mining can help analyze multi-tenant processes in the cloud in three key ways:
1) It allows for cross-organizational process mining by analyzing event logs from different organizations using cloud-based systems.
2) It supports the use of configurable process models to deal with process variability across organizations and account for different configurations in the cloud.
3) Process mining techniques like discovery, conformance checking, and extension can provide insights into processes and configurations in the cloud to detect deviations, bottlenecks, and suggest improvements.
Business Partner Datastream Arabia, INFOR EAMjcvd12
Solutions of Datastream Arabia LLC is looking for business partners to sell and implement their Infor Enterprise Asset Management (EAM) software in GCC countries. As an EAM solution provider, they help organizations improve asset performance, labor productivity, inventory levels, and other operational metrics. Becoming a business partner offers opportunities to increase sales percentages, access marketing funds, and receive product training and support. Their EAM software has over 10,000 customers worldwide and has proven benefits for industries including manufacturing, healthcare, and public sectors.
Similar to Taming Orchestration Design Using ADORE (20)
A commutative model composition operator to support software adaptationSébastien Mosser
The document proposes a commutative operator for composing software adaptation models. It introduces a set-based representation of adaptations as added and deleted model elements. This allows modeling adaptation composition as set operations, ensuring properties like commutativity and consistency checking. An implementation of the approach in a domain-specific language is described, along with validation using a car crash crisis management system case study.
Towards CloudML, a Model-Based Approach to Provision Resources in the CloudsSébastien Mosser
The Cloud-computing paradigm advocates the use of re- sources available “in the clouds”. In front of the multiplicity of cloud providers, it becomes cumbersome to manually tackle this heterogene- ity. In this paper, we propose to define an abstraction layer used to model resources available in the clouds. This cloud modelling language (CloudML) allows cloud users to focus on their needs, i.e., the modelling the resources they expect to retrieve in the clouds. An automated provi- sioning engine is then used to automatically analyse these requirements and actually provision resources in clouds. The approach is implemented, and was experimented on prototypical examples to provision resources in major public clouds (e.g., Amazon EC2 and Rackspace).
The document discusses tools for software engineering through the example of implementing Peano's axioms of natural numbers as a "Machine of Peano". It covers:
1. Specifying tests for the machine using a testing framework to ensure initial failure.
2. Implementing the machine's code to pass the tests.
3. Using version control systems like Git and code repositories to collaborate.
4. Packaging the machine as a reusable library using a build tool like Maven for dependencies, testing, and adding license headers.
5. Delivering continuous integration using Jenkins to automate building and publishing snapshots.
Cette présentation fait suite à l'atelier des doctorants LMO'08.
Elle à pour objectif de compiler le feed-back obtenu auprès des mentors de l'atelier, et d'amener à se poser les "bonnes questions" avant et pendant la thèse.
http://hal.inria.fr/hal-00669772
The document discusses the evolution of cloud computing from hype to reality. It describes how migrating applications to the cloud is just the beginning, and software must continue to evolve once in the cloud. The REMICS project aims to support this evolution by extracting code from legacy systems to UML models, but existing standards do not address the needs of distributed systems or software evolution in the cloud. The PIM4Cloud language is being developed to fill this gap and support migrating, deploying, and evolving cloud-based applications across multiple cloud providers. Future work includes developing a working prototype and obtaining feedback from users.
Introducing Security Access Control Policies into Legacy Business ProcessesSébastien Mosser
Applying separation of concerns approaches into business process context generally results in several initiatives oriented to automatic generation of aspect code, generation of specific code according to the kind of concern (code for mapping roles and permissions derived from RBAC model for example), or proposition of new mechanisms as dedicated aspectual languages. Most of these initiatives only consider functional behaviours of business process, omitting special behaviours derived from quality attributes such as security, which can be modelled as concerns that must be supported in the business process. In this paper we propose the integration of cross-cuttings standardized control access policies (based on RBAC model and Oasis XACML) into legacy business processes, using a separation of concerns approach.
Undoing Event-driven Adaptation of Business ProcessesSébastien Mosser
This document discusses undoing event-driven adaptations of business processes. It proposes automated unadaptation by identifying the triggering event, correlated adaptations, and yielding the system as if the adaptation never occurred. A demonstration shows events triggering adaptations, then automated unadaptation identifying the trigger, pruning correlated changes, and replaying the process. The approach aims to avoid corrupted processes from naive unadaptation and supports platform-independent unadaptation of running process instances over time.
This document describes the Adore framework for taming complexity in orchestration design. Adore uses a model-driven approach to automatically integrate incomplete process fragments into a complete process while preserving properties like execution order. It includes a domain-specific language for designers to model processes and services. Algorithms then weave and merge the fragments, applying rules to handle issues like equivalent activities and incomplete models. The demonstration shows Adore in action on a car crash crisis management case study.
Présentation du framework jSeduite pour les JM2L.
L’équipe MODALIS du laboratoire CNRS / I3S s’interesse à la définition de modèles pour les architectures largement distribuées. Dans le cadre de nos recherches sur les Architectures Orientées Services (SOA), nous avons mis en place (en partenariat avec l’Institut d’Education Sensoriel Clément Ader, établissement scolaire niçois accueillant de jeunes handicapés) une architecture orientée services permettant de diffuser des informations en milieu scolaire : menu de la cantine, Horaire de bus, Albums Photos, Vidéos, ... Le framework ainsi créé (jSeduite, publié sous licence LGPL) est déployé sur le site de l’EPU Polytech’Nice - Sophia Antipolis ainsi qu’à l’IES.
Nous nous proposons d’illustrer le fonctionnement d’une SOA sur cet exemple. Comment le Web 2.0, de par sa nature participative, nous permet de mettre en place un système de diffusion d’information libre relié aux principaux acteurs du marché (Google, Yahoo, Twitter, ...) ? Comment intégrer la multitude d’information existantes sur la toile dans le système ? Comment techniquement déployer une architecture orientée service sans être débordé ? Quelles solutions ’libres’ peuvent supporter une telle infrastructure ? Comment manipuler les informations récupérées pour les diffuser efficacement aux utilisateurs ? C’est à ces questions que nous tenterons de répondre en décrivant l’architecture ainsi que la mise en oeuvre du framework jSeduite.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Taming Orchestration Design Using ADORE
1. TAMING ORCHESTRATION
DESIGN COMPLEXITY
USING `
Sébastien Mosser* Mireille Blay-Fornarino*& Robert France
, **
(*) University of Nice - Sophia Antipolis
CNRS / I3S / Modalis Team, France
(**) Colorado State University, CS Department
Software Assurance Lab, Fort Collins, CO, USA
AOM Workshop, Bellairs (Barbados)
April, 12th 2010
3. ONCE UPON A TIME ...
« Service Oriented Architecture
( S OA ) i s a b u s i n e s s - c e n t ri c I T
architectural approach that supports
integrating your business as linked,
repeatable business tasks, or
services.» (IBM)
a Commercial
an Architect
4. ONCE UPON A TIME ...
« Service Oriented Architecture
( S OA ) i s a b u s i n e s s - c e n t ri c I T
architectural approach that supports
integrating your business as linked,
repeatable business tasks, or
services.» (IBM)
a Commercial
« Ok, so we will build atomic services and
then implement business processes to
orchestrate them all. It sounds exciting!
Let’s go! »
an Architect
5. AND THEY ALL LIVED
HAPPILY EVER AFTER ... SURE?
the (same)
Architect
the
(same)Comm
12. CASE STUDY: «CAR CRASH
CRISIS MANAGEMENT SYSTEM»
• TAOSD Special Issue on Aspect Oriented Modeling
• Rationale: A common case study to compare AOM approaches
• Context: Crisis Management System (CMS)
• How to handle a «car crash» crisis?
representation
of
9
13. OUR APPROACH
Given requirements (pdf)
Textual Use Cases System Actors
as as
Business Processes Atomic Services
10
16. n ts
8 27 e
m
Scenarios Business Extensions i re
q u
Re
Car Crash Crisis
Management System
3
NF Properties
e ss
c
P ro
e ss
s in
B u
17. n ts
8 27 e
m
Scenarios Business Extensions i re
q u
Re
Car Crash Crisis
Management System
12
«designing» δ Processes
3
NF Properties
e ss 12
c Partners
P ro
e ss
s in
B u
18. n ts
8 27 e
m
Scenarios Business Extensions i re
q u
Re
Car Crash Crisis ~ 13 000
Management System Actions
12
«designing» δ Processes
3 «realizing» ρ
NF Properties
1216
e ss 12 Activities 895
c Partners Relations
P ro
e ss ρ
in 76
us Operations
B
19. n ts
8 27 e
m
Scenarios Business Extensions i re
q u
Re
Car Crash Crisis ~ 13 000
Management System Actions
12
«designing» δ Processes
3 «realizing» ρ
NF Properties
1216
e ss 12 Activities 895
c Partners Relations
P ro
e ss ρ
in 76 Intrinsic
us Operations
B Parallelism
51. APPROACH: LOGICAL RULES
• Business Process properties defined as logical rules:
• e.g., «No Concurrent Ending», «No Equivalent Calls»
• Rule set is evaluated at different modeling «phase»:
• Fragments (P1), Compositions (P2), Merged (P3), Result (P4)
• Reaction to a violation can be different
• Can be «just» a Bad-Smell (~) or a definitive Error (X)
32
52. EXISTING RULES
Rule P1 & P3 P2 P4
Concurrent Ending X
Separation of ~
Equivalent Calls ~ Concerns ~
Lack of Response ~ Model X
Design Weaknesses Incompleteness
~ ~
Reflexive Composition X
Pointcuts
Recursive Composition X
Interactions
Missing Weave ~
Uninitialized Variable ~
Fragments X
Interactions
Invocation Cycle ~ ~
33
53. EXISTING RULES
Rule P1 & P3 P2 P4
Concurrent Ending X ~
Equivalent Calls ~ ~
Lack of Response ~ X
Design Weaknesses ~ ~
Reflexive Composition X
Recursive Composition X
Missing Weave ~
Uninitialized Variable ~ X
Invocation Cycle ~ ~
33
62. TODAY,
I SHOWED YOU ...
• The ADORE framework in action
• e.g., DSL, Algorithms, Model Transformations
• How it tames orchestration design complexity
• Using the CCCMS, a common case study
• How to ensure quality in composed models
• Using a set of logical rules, inference & backtracking
40
63. AND I COULD
HAVE SHOWN *...
• How to build the complete CCCMS
• Running the associated set of composition
• How to generate composition directives
• Using logical meta-predicates
• How to use MONDRIAN to visualize compositions**
• Providing (*) demo on
a holistic point of view on a given system demand
41 (**) SC‘2010
64. PERSPECTIVES
• Structural impact of behav. compositions
• Linking ADORE to model composition tools
• Conflict rule expressiveness
• Defining a DSL to express rules
• Write my PhD thesis!
• Defend it, and find a postdoc ^_^
42