Control Outlook Synchronization Settings for Dynamics CRM usersJukka Niiranen
Use the XrmToolBox Sync Filter Manager to configure Outlook synchronization filters for Microsoft Dynamics CRM users. This tutorial shows 3 common scenarios for how to modify the contact synchronization settings.
Developing Web-Based Project Management Application for Event Organizer ABCEditor IJCATR
ABC is an event organizer company based in Surabaya, Indonesia. Organizing events calls for project management.
Unfortunately, ABC still does most of their business activities manually, which is prone to errors and mistakes such as
miscalculations, loss of documents, and misinformation. To clear the vulnerability, ABC attempts to develop an application which
fulfills their project management needs. The result of this research is a web-based application which is able to take and receive
projects offers, assign staffs into groups, communicate with other staffs, create tasks, generate gantt tasks, create and realize project
budgets, and sharing project documents.
Effective User Life Cycle Management in Active DirectoryZoho Corporation
Universally, user management is one of the frequently-performed tasks in Active Directory. And the challenges involved in it are quite common throughout the globe too notwithstanding the tools that Microsoft provides us, such as, PowerShell. Obviously, there is a huge rift between what Microsoft's user management tools (like ADUC) do and what administrators expect out of them. In this commercial whitepaper, Derek Melber (Active Directory MVP), talks about this gap and also points out how ManageEngine tools address the challenges involved in Active Directory user life cycle management.
Control Outlook Synchronization Settings for Dynamics CRM usersJukka Niiranen
Use the XrmToolBox Sync Filter Manager to configure Outlook synchronization filters for Microsoft Dynamics CRM users. This tutorial shows 3 common scenarios for how to modify the contact synchronization settings.
Developing Web-Based Project Management Application for Event Organizer ABCEditor IJCATR
ABC is an event organizer company based in Surabaya, Indonesia. Organizing events calls for project management.
Unfortunately, ABC still does most of their business activities manually, which is prone to errors and mistakes such as
miscalculations, loss of documents, and misinformation. To clear the vulnerability, ABC attempts to develop an application which
fulfills their project management needs. The result of this research is a web-based application which is able to take and receive
projects offers, assign staffs into groups, communicate with other staffs, create tasks, generate gantt tasks, create and realize project
budgets, and sharing project documents.
Effective User Life Cycle Management in Active DirectoryZoho Corporation
Universally, user management is one of the frequently-performed tasks in Active Directory. And the challenges involved in it are quite common throughout the globe too notwithstanding the tools that Microsoft provides us, such as, PowerShell. Obviously, there is a huge rift between what Microsoft's user management tools (like ADUC) do and what administrators expect out of them. In this commercial whitepaper, Derek Melber (Active Directory MVP), talks about this gap and also points out how ManageEngine tools address the challenges involved in Active Directory user life cycle management.
This is our minor presentation on ONLINE REAL ESTATE BUSINESS SYSTEM.
we are done in 5 days this project..If anybody interested in this project then please give a feedback of this project.
If anybody want this type of presentation in any topic then contact us on facebook or mobile we will help you to make your presentation.
my facebook id -
www.facebook.com/narayank45
contect no-8602464665
This presentation is a part of G viral digital marketing Services for University. It is a Geomarketing strategy for University for online mobile and digital marketing.
Facebook based movie Quiz Gaming application for iPhone and iPad with features for multiple players, ability to import facebook contacts and authentication.
Free advertising platform for businesses with IOS & Android Apps developmentMike Taylor
Free advertising platform for businesses with IOS & Android Mobile Application development & features for web syncing. OR code scanning mobile app used for free advertising.
Free advertising platform for businesses with IOS & Android Apps developmentMike Taylor
Free advertising platform for businesses with IOS & Android Mobile Application development & features for web syncing. OR code scanning mobile app used for free advertising.
WatBot is a Voice-enabled Android Native ChatBot built using Watson Conversation, Speech-to-Text and Text-to-Speech Services on IBM Bluemix (open standards cloud platform for building, running, and managing apps and services).
This is our minor presentation on ONLINE REAL ESTATE BUSINESS SYSTEM.
we are done in 5 days this project..If anybody interested in this project then please give a feedback of this project.
If anybody want this type of presentation in any topic then contact us on facebook or mobile we will help you to make your presentation.
my facebook id -
www.facebook.com/narayank45
contect no-8602464665
This presentation is a part of G viral digital marketing Services for University. It is a Geomarketing strategy for University for online mobile and digital marketing.
Facebook based movie Quiz Gaming application for iPhone and iPad with features for multiple players, ability to import facebook contacts and authentication.
Free advertising platform for businesses with IOS & Android Apps developmentMike Taylor
Free advertising platform for businesses with IOS & Android Mobile Application development & features for web syncing. OR code scanning mobile app used for free advertising.
Free advertising platform for businesses with IOS & Android Apps developmentMike Taylor
Free advertising platform for businesses with IOS & Android Mobile Application development & features for web syncing. OR code scanning mobile app used for free advertising.
WatBot is a Voice-enabled Android Native ChatBot built using Watson Conversation, Speech-to-Text and Text-to-Speech Services on IBM Bluemix (open standards cloud platform for building, running, and managing apps and services).
SOFTWARE DESIGN 1
SOFTWARE DESIGN 5
SOFTWARE DESIGN
Charles Williams
CS457 Unit 4 IP
Juan Echeverria
6/12/2019
Table of Contents
Title Page 1
Table of Contents 2
Introduction 3
System Operation 4
Project Client 5
Software Design Specification 6
Case Diagram……………………………..……………………………………………………………………………………………………………7
Precondition………………………………………………………………………………………………………………………………………….12
Three Sequences……………………………………………………………………………………………………………………………………13
Incoming Message to the Sequence………………………………………………………………………………………………………14
Postcondition………………………………………………………………………………………………………………………………………..15
References……………………………………………………………………………………………………………………………………….……16
Introduction
The user interface is a very important aspect of any software. The user needs an interface that he/she can interact with much ease. As a result of this, the designer's major role should be the creation of a most pleasurable user interface that will allow the user to interact with the software without realizing the complications therein in the invoice. This proposal details the outline of the design implementation in relation to user interface designing.
Purpose of the system
The major purpose of designing user interface is to allow easy access, understanding and use of the major purpose of creating user interface are to create elements which anticipate what the user needs and allow the user to gain access, understanding, and application of the elements within the software. The elements within the interface allow interaction both visual and audio between the user and the system software (Chikurtev, Yovchev & Chikurtev, 2016). This software design is aimed to work with the sales software. A sales system allows the interaction of the customer with the system. Through the interface, the user can analyze sales, sales trends and other functions of the system with use as the interface is designed with elements and keys which allow zooming, inversion, and transformation of the images on the system using the user interface.
History of system development
The user interface came into the picture in the year 1981. It was discovered that graphics on the digital user’s interface in conjunction with the pointing device would allow great use of the system. This led to the creation of Xerox Star an integration of desktop computer in the year 1973 (Laaksoet al. 2016). 1.0 Macintosh operating system was the second to be designed with a complete graphical user's interface. The system had only a few of the current operating system which was window-based icons. The window allowed movement using the mouse (Pathak, et al. 2018). In early 2000, there was more advancement with Apple creating Optical devices which developed to magic mouse allowing the user to have more interaction using different fingers (Jones, Clothier, & Jiang, 2018).
System operation
The creation of user interfaces since their creation had not been app.
Every single day thousands of android devices are activated, the success of android owes to its simplicity and usability. This system aims at helping users with minimum or no programming background to build their own simple android application, which will in turn reduce the cost and makes the application friendlier. The principle behind the proposed system is simplicity and user friendliness for minimalistic applications. Development of mobile applications brings new challenges in possibilities for their adjustment to actual context of a user and a device. Our long-term goal is to design and implement a mobile client which can dynamically adapt to the surrounding conditions and requirements of the user.
a cross platform tablet application that could run on iPad as well as Android Tablets. The purpose of the application was – corporate meetings or e-learning systems.
The application was an innovative concept that automatically converted text to video. The application should also have the ability to capture audio. Along with this, the application also provides a digital white board.
While the user speaks and writes on the white board, the application records it and saves it in the form of a presentation which can be later on used for future reference or sharing on social networking sites or can be emailed to selected bunch of users. - See more at: http://www.greymatterindia.com/tablet-application-for-real-time-video-audio-and-ppt-conversion
Loyalty & Rewards Points Application on your mobile, iPhone, AndroidMike Taylor
Opensource Loyality and Rewards Points Management Web and Mobile Application with SAP, ERP, POS integration. This application works on iPhone and Android mobiles
E-commerce Application Development Company.pdfHornet Dynamics
Your business can reach new heights with our assistance as we design solutions that are specifically appropriate for your goals and vision. Our eCommerce application solutions can digitally coordinate all retail operations processes to meet the demands of the marketplace while maintaining business continuity.
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
In the ever-evolving landscape of technology, enterprise software development is undergoing a significant transformation. Traditional coding methods are being challenged by innovative no-code solutions, which promise to streamline and democratize the software development process.
This shift is particularly impactful for enterprises, which require robust, scalable, and efficient software to manage their operations. In this article, we will explore the various facets of enterprise software development with no-code solutions, examining their benefits, challenges, and the future potential they hold.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Understanding Nidhi Software Pricing: A Quick Guide 🌟
Choosing the right software is vital for Nidhi companies to streamline operations. Our latest presentation covers Nidhi software pricing, key factors, costs, and negotiation tips.
📊 What You’ll Learn:
Key factors influencing Nidhi software price
Understanding the true cost beyond the initial price
Tips for negotiating the best deal
Affordable and customizable pricing options with Vector Nidhi Software
🔗 Learn more at: www.vectornidhisoftware.com/software-for-nidhi-company/
#NidhiSoftwarePrice #NidhiSoftware #VectorNidhi
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Do you want Software for your Business? Visit Deuglo
Deuglo has top Software Developers in India. They are experts in software development and help design and create custom Software solutions.
Deuglo follows seven steps methods for delivering their services to their customers. They called it the Software development life cycle process (SDLC).
Requirement — Collecting the Requirements is the first Phase in the SSLC process.
Feasibility Study — after completing the requirement process they move to the design phase.
Design — in this phase, they start designing the software.
Coding — when designing is completed, the developers start coding for the software.
Testing — in this phase when the coding of the software is done the testing team will start testing.
Installation — after completion of testing, the application opens to the live server and launches!
Maintenance — after completing the software development, customers start using the software.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
A Sighting of filterA in Typelevel Rite of Passage
Web service interactions
1. IBM Maximo Asset Management 7.1
IBM Maximo Asset Management for IT 7.1
IBM Tivoli Change and Configuration Management Database 7.1.1
IBM Tivoli Service Request Manager 7.1
Web service interactions
3. Web Service Interactions
3
Contents
Web-service based interactions........................................................................................... 4
Overview......................................................................................................................... 4
Types of users ................................................................................................................. 5
Web service interactions user interface .......................................................................... 6
Applications supporting web service-based interactions................................................ 7
Create Interactions application ....................................................................................... 7
Create Interactions application flow........................................................................... 7
Step 1 Details – Web service, port and operation....................................................... 9
Step 2 Details – Configure request ............................................................................. 9
Step 3 Details – Configure response......................................................................... 10
Step 4 Details – Application selection...................................................................... 11
Step 5 Details – Configure request user interface fields........................................... 12
Step 6 Details – Configure response user interface fields ........................................ 12
Step 7 Details – Mapping application objects to request.......................................... 13
Step 8 Details – Mapping response to application objects ....................................... 15
Step 9 Details – Confirmation and creation of interaction ....................................... 17
User interface behavior of the Create Interaction application .................................. 18
Interactions application................................................................................................. 19
Additional Functions in the Interactions application................................................ 19
Logging configuration time and execution time activities ........................................... 21
Limitations.................................................................................................................... 22
Appendix A. Schema Types and equivalent Maximo Data Types ............................... 22
Notices .............................................................................................................................. 23
Trademarks ................................................................................................................... 25
4. Web Service Interactions
4
Web-service based interactions
A new capability has been added to the Integration Framework function in Fix Pack
7.1.1.6. This capability enables practitioners to assemble a web service-based integration
very rapidly without the need for authoring code. The capability is based on web services
that can be invoked from Maximo Base Services. Existing Integration Framework
functions are utilized to achieve this type of integration.
Overview
A web service interaction is a combination of configuration entities in the Maximo Base
Services environment that act in concert to achieve the following:
• prepare a request and pass request parameters to the web service
• invoke a web service from a chosen business application
• retrieve the results from the web service in the form of a response
• display the results in the context of the business application
• apply the result data into the application the web service was launched from
• report errors during web service invocation or response processing
Figure 1 illustrates this capability.
Figure 1 Web service interaction basic functionality
Product External
System
Application
Interaction Web service
Invoke service passing in
request
Process response from service
Pass values from
response to application
Pass parameters from
application to request
5. Web Service Interactions
5
Web service-based interactions must be designed by a practitioner with appropriate skills
in web services, XML schemas and Integration Framework technologies. Once the design
is complete, the interaction can be made available to end users for execution.
Types of users
Web service interactions target two types of users:
Practitioner,
Designer,
Consultant,
Developer,
Business Analyst
This is a resource that has knowledge and experience with web
services, XML schemas and Maximo Base Services configuration
capabilities. The resource may adopt an iterative approach to
creating and testing the appropriate web service interaction.
End users This is a user that executes web service interactions from a
business application for the purpose of performing business tasks.
The end user is not aware how the interaction was constructed or
what the architecture is supporting execution of such interactions.
Figure 2 illustrates the two types of users.
Figure 2 Users exploiting web service interactions
Create and manage interactions
Create Interaction app
Interaction app
Bind interaction to an application
Authorize end user access to
interaction
Configure ‘look and feel’ of
interaction
Discard interactions
Create/Manage Interaction Execute Interaction
Launch interaction from menu
or button or workflow
Set up request parameters, if
needed
Invoke web service
Review response data
Apply selected data into
application
Business analyst
Designer
Consultant
Developer
End users
6. Web Service Interactions
6
Web service interactions user interface
There are two types of user interfaces supporting web service interactions. One user
interface consists of the business applications that enable the creation and management of
web service interactions. These are configuration applications exploited by the
practitioner. Figure 3 shows the configuration application user interface to manage
existing web service interactions.
Figure 3 Interactions configuration application
The second user interface is generated during the configuration of the web service
interaction and resides as part of the business application from which the interaction will
be executed. The design of this latter user interface is part of the overall configuration of
the web service interaction. The generated user interface is in the form of a popup dialog
box. This dialog box can be launched from a Select Action menu item from the launching
business application or from a button that is displayed in the launching business
application.
7. Web Service Interactions
7
Figure 4 shows an example generated interaction user interface.
Figure 4 Generated interaction user interface launched from People application
Applications supporting web service-based interactions
Two applications support creation and management of web service-based interactions.
They are:
Create Interactions Application to design and save an interaction
Interactions Standard application to manage existing interactions
Create Interactions application
This application is accessible from the product’s Go To menu. The short cut to this
application can be found in the Integration menu under a sub-menu called Interactions.
Upon clicking the shortcut, the application is launched and displays the initial screen.
Create Interactions application flow
The application flow of screens is shown in the Figure 5.
Figure 5 Create Interactions application flow
8. Web Service Interactions
8
The initial and subsequent screens are described in the following table:
Screen Description
Step 1: Select a web
service, port and
operation for the
interaction
This screen is the first step in the initial configuration of the web
service interaction. A valid WSDL-based URL must be specified
in the WSDL URL field. The URL may represent a http or a file
location.
Step 2: Configure
the request that will
be sent from the
application
This step operates on the request elements of the chosen
operation. This is an optional step.
Step 3: Configure
the response that will
be sent back to the
application
This step operates on the response elements of the chosen
operation. This is an optional step.
Step 4: Select the
application
This step configures the application context for the interaction. It
determines the specific application from where the interaction
will be launched, how the interaction will be launched and which
security groups have authorization to launch the interaction from
the specified application.
Step 5: Select and
define the request
fields
This step configures the individual fields that will be displayed in
the request user interface generated for the interaction.
Step 6: Select and
define the response
fields
This step configures the individual fields that will be displayed in
the response user interface generated for the interaction.
Step 7: Map
information from the
application to the
web service
This step configures the mapping between application object and
the web service request such that data can be passed in from the
application to the web service.
Step 8: Map
information from the
application to the
web service
This step configures the mapping between the web service
response and the application such that data can be passed back to
the application from the web service.
Step 9: Confirm
creation of
interaction
This screen is the final step in the initial configuration of the web
service interaction. The user interface displays various entities
that will be constructed if the Create button is clicked.
9. Web Service Interactions
9
Step 1 Details – Web service, port and operation
Step 1 in the Create Interactions application is used to specify a web service, select a port
from within the web service and select an operation from within the port. Each web
service interaction is built on a single operation.
Both SOAP 1.1 and SOAP 1.2 envelopes are supported.
An interaction can be built to support a request-response message pattern. Alternatively,
if the web service invocation follows a one-way message pattern, an interaction can be
created to support such a web service invocation. If the Process Response check box is
checked, the web service does return a response and the interaction will process the
response. If the Process Response check box is unchecked, the web service does not
return a response or there is no need to process a response.
Step 2 Details – Configure request
Step 2 in the Create Interactions application is used to optionally configure the Request
hierarchy. The hierarchy displays the elements of the request and the practitioner can
choose to delete elements that are not required for the interaction that is being created.
The choice here is based on the integration requirements and the type of data that must be
displayed or populated in order to prepare the request. Elements that are marked required
in the XML cannot be deleted from the Request hierarchy.
If the Configure button in the Request hierarchy is clicked, the Request Object Structure,
Request Objects and Request Attributes sections are refreshed to display the object
structure, objects and attributes that will be created in support of the web service request.
It is not mandatory to click the Configure button. Clicking Next in Step 2 will also result
in the Request Object Structure, Request Objects and Request Attributes being defined
(but not created yet). The practitioner can return to Step 2 from Step 3 to review these
definitions.
The request object structure name is based on the interaction name specified in Step 1
followed by the letters ‘REQOS’ representing request Object Structure.
The object names are also based on the interaction name specified in Step 1 followed by a
number that makes the object name unique.
Each object in the Request Objects section has a detailed section. Each attribute in the
Request Attributes section has a detailed section. The Field Title of the attribute can be
edited if required.
The attributes of an object are associated with a data type that is equivalent to the original
XML schema data type. Appendix A enumerates the XML schema data type and
equivalent product data types.
10. Web Service Interactions
10
Step 3 Details – Configure response
Step 3 is shown only if Process Response was check box was checked in Step 1.
Otherwise, the initial configuration moves onto Step 4.
Step 3 in the Create Interactions application is used to optionally configure the Response
hierarchy. The hierarchy displays the elements of the response and the practitioner can
choose to delete elements that are not required for the interaction that is being created.
The choice here is based on the integration requirements and the type of data that must be
displayed or populated in order to prepare the request. Elements that are marked required
in the XML cannot be deleted from the Response hierarchy.
If the Configure button in the Response hierarchy is clicked, the Response Object
Structure, Response Objects and Response Attributes sections are refreshed to display the
object structure, objects and attributes that will be created in support of the web service
response.
It is not mandatory to click the Configure button. Clicking Next in Step 3 will also result
in the Response Object Structure, Response Objects and Response Attributes being
defined (but not created yet). The practitioner can return to Step 3 from Step 4 to review
these definitions.
The response object structure name is based on the interaction name specified in Step 1
followed by the letters ‘RESOS’ representing response Object Structure.
The object names are also based on the interaction name specified in Step 1 followed by a
number that makes the object name unique.
Each object in the Response Objects section has a detailed section. Each attribute in the
Response Attributes section has a detailed section. The Field Title of the attribute can be
edited if required.
11. Web Service Interactions
11
Step 4 Details – Application selection
Step 4 configures the application launch point for the interaction. This is also termed as
the application context. The following table describes the fields that must be populated:
Field Purpose
Application This field specifies the application from which the interaction will be launched.
Application
Main
Object
This field is automatically populated based on the choice of application. This
field is not editable.
Primary
Mapping
Object
This field defaults to the same value as Application Main Object. However, the
field is editable and a different object can be chosen. The Primary Mapping
Object is the object from which values can be passed to the web service
request.
Application
Signature
Option
This field is automatically populated based on the interaction name specified in
Step1. The signature option is required in order to configure the necessary
authorizations for end users to launch this interaction from the chosen
application. The description for the signature option is also used as the label
for the Select Action menu item that is added into the application if the
interaction can be launched from the Select Action menu.
Interaction
Mode
This field defaults to a value SHOWREQRESP implying the interaction will
display both request and response to end users. If Process Response was not
checked in Step 1, the Interaction Mode field will default to
SHOWREQONLY. There are four possible values for this field and they are
described below:
Interaction Mode Description
SHOWREQONLY This value will result in end users seeing only the web
service request before the web service is invoked. The
response from the web service is not displayed but
applied to the application.
SHOWRESPONLY This value will result in end users seeing only the web
service response after the web service is invoked. The
request to the web service is not displayed.
SHOWREQRESP This value will result in end users seeing both request
and response related to the web service.
SILENT This value will result in no user interface for end
users. The web service invocation and response are
processed behind-the-scenes.
Apply
Response?
This field is checked indicating that the response from the web service should
be applied back into the application. The data returned from the web service
can be potentially inserted or updated back into the application.
12. Web Service Interactions
12
In this step, the Security Groups authorized to execute the interaction are also chosen. By
default, the screen displays all of the security groups currently granted access to the
chosen application. If required, a subset of these groups can be chosen from the
Application Security Groups Authorized to Launch Interaction section.
Step 5 Details – Configure request user interface fields
Step 5 is shown only if the Interaction Mode is either SHOWREQ or SHOWREQRESP –
that is, the request is to be displayed to end user. Otherwise, the initial configuration
moves onto Step 6.
This step enables the practitioner to select characteristics of individual fields in the
request user interface. The request user interface is a tab in the interaction user interface
dialog box that enables end users to see the individual fields of the request. For each field,
the following can be set:
• Display/Hide the field
• Specify a title for the field
• Set the field read-only or editable
In this step, fields can be configured for each of the objects comprising the request. If
there are multiple objects supporting the request, each object must be chosen in order to
configure the fields belonging that that object. By default, all the fields belonging to an
object are set to display. All the fields are set to be editable in the interaction user
interface.
Step 6 Details – Configure response user interface fields
Step 6 is shown only if the Interaction Mode is either SHOWRESP or SHOWREQRESP
– that is, the response is to be displayed to end user. Otherwise, the initial configuration
moves onto Step 7.
This step enables the practitioner to select characteristics of individual fields in the
response user interface. The response user interface is a tab in the interaction user
interface dialog box that enables end users to see the individual fields of the response. For
each field, the following can be set:
• Display/Hide the field
• Specify a title for the field
• Set the field read-only or editable
In this step, fields can be configured for each of the objects comprising the response. If
there are multiple objects supporting the response, each object must be chosen in order to
configure the fields belonging that that object. By default, all the fields belonging to an
object are set to display. All the fields are set to be editable in the interaction user
interface.
13. Web Service Interactions
13
Step 7 Details – Mapping application objects to request
This step enables the practitioner to map objects and attributes of the business application
to the objects and attributes that represent the web service request. This mapping is
driven by the Primary Mapping Object that was chosen in Step 4. The primary mapping
object serves as the root for the mapping.
The two key sections in this step are the Request Objects section and the Request
Attribute Mapping section. For mapping, a request object is chosen from the Request
Objects section. In order to set up a mapping at the object level, the mapping user
interface should be interpreted as follows: “The Request Object <x> should be mapped or
set from the Application Object <y>”.
Figure 6 shows the Request Objects and Request Attribute Mapping sections for an
example web service interaction configuration:
Figure 6 Request Objects and Request Attribute Mapping
If the application object is the same as the Primary Mapping Object specified earlier, then
the Use Application Parent Object check box can be checked.
Figure 7 shows the Request Objects section once Use Application Parent Object has
been checked:
Figure 7 Request Objects specified
If the application object is different from the Primary Mapping Object specified earlier or
any parent object, then the relationship linking the parent object and application object
should be specified in the Application Relation field. A lookup is provided in order to
facilitate selecting the right relationship.
14. Web Service Interactions
14
In order to map attributes, first select the appropriate request object from the Request
Objects section. Click the New Row or Select Request Attribute buttons in order to select
an attribute. The mapping user interface for attributes should be interpreted as “The
Request Attribute <xx> should be mapped or set from the Application Attribute <yy>”.
When the New Row button is clicked, a new row is displayed in the Request Attribute
Mapping section and the Request Attribute and Application Attribute/Value fields are
editable. The associated lookups can be utilized to select the appropriate attribute of the
request and the application object. In addition, the Application Attribute/Value field can
hold a literal value enclosed in single quotes. The standard dot (‘.’) notation may also be
used to map an attribute from a related object.
Figure 8 shows the Request Attributes Mapping section when a new row has been
inserted:
Figure 8 Request Attribute Mappings
Figure 9 shows the Request Attribute Mapping section after the new row has been
populated:
Figure 9 Request Attribute Mappings populated
The attribute mapping example shown should be interpreted as “The Web Service
Request Attribute SITEID is mapped from the Application object SR and its attribute
siteid.”
Attribute Mappings can be deleted by clicking the Mark Row for Delete icon to the right
of each row in the Request Attribute Mapping section.
It is not mandatory to map every web service request element from the application.
Mappings are set up where appropriate. Mappings make it easier for end users to use the
web service interaction because specified application field values are automatically
brought into the web service request when the interaction is executed.
15. Web Service Interactions
15
A Java class can be authored if the mapping constructs in Step 7 are insufficient to
perform the type of mapping desired. The class should be authored using appropriate
Java-development tools and the class file built into the product Enterprise Archive (EAR).
Standard deployment procedures should be followed to deploy this EAR file such that the
class file is available for the Integration Framework to execute. The fully qualified name
of the Java class should be specified in the Mapping Custom Class field.
Mapping can be implemented using a combination of Java class and configured mappings.
Mappings can be added or modified using the Interactions application even after the
interaction has been created.
Step 8 Details – Mapping response to application objects
This step enables the practitioner to map objects and attributes of the web service
response to the objects and attributes of the business application. This mapping is driven
by the Primary Mapping Object that was chosen in Step 4. The primary mapping object
serves as the root for the mapping.
The two key sections in this step are the Response Objects section and the Response
Attribute Mapping section. For mapping, a response object is chosen from the Response
Objects section. In order to set up a mapping at the object level, the mapping user
interface should be interpreted as follows: “The Application Object <a> should be
mapped or set from the Response Object <b>”.
Figure 10 shows the Response Objects and Response Attribute Mapping sections for an
example web service interaction configuration:
Figure 10 Response Objects and Response Attribute Mapping
If the application object is the same as the Primary Mapping Object specified earlier, then
the Use Application Parent Object check box can be checked.
16. Web Service Interactions
16
Figure 11 shows the Request Objects section once Use Application Parent Object has
been checked:
Figure 11 Response Objects specified
If the application object is different from the Primary Mapping Object specified earlier or
any parent object, then the relationship linking the parent object and application object
should be specified in the Application Relation field. A lookup is provided in order to
facilitate selecting the right relationship.
In order to map attributes, first select the appropriate response object from the Response
Objects section. Click the New Row or Select Request Attribute buttons in order to select
an attribute. The mapping user interface for attributes should be interpreted as “The
Application Attribute <aa> should be mapped or set from the Response Attribute <bb>”.
When the New Row button is clicked, a new row is displayed in the Response Attribute
Mapping section and the Application Attribute and Response Attribute/Value fields are
editable. The associated lookups can be utilized to select the appropriate attribute of the
request and the application object. In addition, the Response Attribute/Value field can
hold a literal value enclosed in single quotes.
Figure 12 shows the Response Attributes Mapping section when a new row has been
inserted:
Figure 12 Response Attributes Mapping
Figure 13 shows the Response Attribute Mapping section after the new row has been
populated:
Figure 13 Response Attributes Mapping populated
17. Web Service Interactions
17
The attribute mapping example shown should be interpreted as “The Application
Attribute EXTASSET is mapped from the Response Object EXTASSET11 and its
attribute assetnum.”
Attribute Mappings can be deleted by clicking the Mark Row for Delete icon to the right
of each row in the Response Attribute Mapping section.
Step 9 Details – Confirmation and creation of interaction
This is the final review step in the creation of the interaction. All fields displayed in this
step are for review purposes only. With this step, the practitioner can either cancel the
creation by clicking the Cancel button or proceed by clicking the Create button.
Clicking Create button will construct various artifacts that serve as the building blocks of
the interaction. These artifacts include:
Generated
Artifact
Purpose
End Point Integration artifact that will perform the actual web service invocation. The
name of the end point is the same as the name of the interaction followed by
the letters ‘EP’ standing for end point.
Invocation
Channel
Integration artifact that will perform the request and response processing in
the context of the web service invocation. The name of the invocation channel
is the same as the name of the interaction followed by the word ‘Channel’.
Request Object
Structure
Integration artifact that will prepare the request for the web service. The name
of the request object structure is the same as the name of the interaction
followed by the letters ‘REQOS’ standing for request object structure.
Response
Object Structure
Integration artifact that will receive the response for the web service. The
name of the response object structure is the same as the name of the
interaction followed by the letters ‘RESOS’ standing for request object
structure.
Request Objects Non-persistent business objects that will hold the request information in the
context of web service invocation. Mappings from the application objects will
bring application values into the request objects. The names of the request
objects are the same as the name of the interaction followed by a numeric
suffix.
Response
Objects
Non-persistent business objects that will hold the response information in the
context of web service invocation. Mappings to the application objects will
bring response values into the application objects. The names of the response
objects are the same as the name of the interaction followed by a numeric
suffix.
18. Web Service Interactions
18
Generated
Artifact
Purpose
Relationships Request and response objects will utilize relationships to determine parent
and child. Such relationships will be generated. The names of the
relationships will be the same as the child object in the relationship.
Domains If the XML schema contains enumerations for an element that is part of the
web service request, an ALN or numeric domain will be generated to hold the
values in the enumeration depending upon the data type of the attribute it is
associated with. The name of the domain will include the name of the
attribute it is associated with. The generated domains are not displayed on
Step 9.
Application
Signature
Option
Security artifact that can be configured to grant security groups authorization
to execute the interaction. This signature option can also be configured to
associate user interface such as a button if the interaction is to be launched
from a button in the application. The name of the signature option is the same
as the name of the interaction.
Menu Option Menu entry that will be used to launch the interaction from the Select Action
menu of the business application. The name of the menu option is the same as
the name of the interaction.
Request/Respon
se Dialog
The user interface that end users will interact with when performing the web
service invocation. The dialog resides as part of the presentation for the
application from where the interaction is launched. The dialog can be viewed
and/or modified from the Application Designer. The name of the dialog is the
same as the name of the interaction.
User interface behavior of the Create Interaction application
At any time during the initial configuration of the interaction, a practitioner may click
Cancel to exit the application. All configuration done up until that point will be lost.
When the Cancel button is clicked, the practitioner is returned to the Start Center.
Once the interaction has been successfully created, the application displays a
confirmation message “Interaction <ccc> has been created. You can return to the Start
Center or you can go to the Interactions application to make changes to this interaction.”
The message box offers practitioners the choice of returning to Start Center or launching
the Interactions application.
19. Web Service Interactions
19
Interactions application
The Interactions application provides access to and management of existing interactions.
There are four tabs in this application as listed below:
Tab Purpose
List Enumerates the interactions that have been already created; specifies if the
interaction is active or inactive
Interaction Provides the details of the web service this interaction will invoke; also
enumerates all of the artifacts that were generate in support of this
interaction
Request
Mapping
Enables the management request mappings – mappings can be created,
modified or deleted. The user interface is very similar to Step 7 of the
Create Interactions application.
Response
Mapping
Enables the management response mappings – mappings can be created,
modified or deleted. The user interface is very similar to Step 8 of the
Create Interactions application.
Additional Functions in the Interactions application
Interaction main tab
Most of the fields displayed on the main tab are read-only. However two fields can be
configured:
Interaction tab
field
Purpose
Commit
Response?
Checking this field implies that any data applied into the
application based on the web service response will be committed as
soon as they are applied. If this field is unchecked, data applied into
the application must be manually saved by the end user who
launched the interaction. By default, this field is unchecked.
Show Single
Response?
Checking this field implies that a single result record returned by
the web service will be displayed in the interaction user interface. If
this field is unchecked, single result record returned by the web
service will be automatically applied into the application where the
interaction was launched from. By default, this field is checked.
Global Schema Policies
An XML-based schema is inherent to a web service. The schema describes data types,
elements and other characteristics of various components of the web service. A powerful
schema language enables the creation of complex schemas.
20. Web Service Interactions
20
Durable web service interactions depend upon the proper resolution and interpretation of
various schema constructs. A fixed set of schema policies are available in order to ensure
proper resolution and interpretation. They are accessible from the Global Schema Policies
Select Action menu item in Interactions application. A popup dialog box enumerates the
policies that are required when creating an interaction. Each schema policy is associated
with one or more policy parameters. Policy parameters have default values that can be
changed, if required. The following table lists each policy and its purpose:
Policy Purpose Policy Parameter Default
Value
Any
Element
Policy
Processing of ‘any’ elements in
the XML schema underlying a
web service; the default value of 1
implies that ‘any’ elements in the
schema will be skipped for the
purpose of creating an interaction
EXCLUDE_ANY_ELEMENT 1
Attribute
Exclusion
Policy
Determines if attributes of
elements should be excluded from
schema processing; the default
value of 1 implies attributes of
elements will not be processed
EXCLUDE_ATTRIBUTES 1
Default
Attribute
Length
Determines the length of an
attribute that is created as part of
an object to support the interaction
DEFAULT_LENGTH 256
Object
Recurrence
Policy
If set to 1 the recurring type
definition will be ignored and only
the first occurrence of the type
will be utilized for configuring the
interaction If set to 0 will report an
error and stop processing the
schema if a recursive type
definition is detected
SKIP_RECURRENCE 1
Simple
Type Policy
If set to 1 simple list type will be
processed as simple atomic type.
This means there can be only one
value entered for that list type
element. The type of the element
is retained. If set to 0 the simple
list type is treated as a String type
TREAT_SIMPLE_LIST_TYPE
_AS_ATOMIC
0
If any of the out of the box default values were modified, the original defaults can be
applied by selecting the appropriate policy and clicking the Restore Defaults button.
21. Web Service Interactions
21
Activate/Deactivate Interaction
This action can be used to determine whether an interaction is available for execution by
end users. If an interaction has been deactivated, end users attempting to launch the
interaction from the parent application will receive an error message indicating the
interaction has been deactivated. This function can be exploited when there is a need to
create, modify or delete mappings after the interaction was created. The changes to
mappings can be performed with the interaction deactivated. This prevents a web service
invocation from occurring during modifications that may result in invocation or
processing errors.
Validate Interaction
This action can be used to verify the integrity of the interaction. The validate function
iterates through all the generated artifacts that are required for the interaction to execute
correctly and verifies they exist. The function lists all the artifacts that are required for the
interaction including those that were found and those that were not found. The interaction
cannot be activated if the validation fails.
Delete Interaction
This action can be used to delete an existing interaction. All generated artifacts are
deleted with the exception of domains.
Logging configuration time and execution time activities
The initial configuration of an interaction can be complex depending upon the complexity
of the web service to be invoked. It is useful to log the configuration activity and
maintain a log file of what was configured. A dedicated interaction logger is available for
this purpose. The name of the logger is ‘interaction’ and the Logging application can be
configured to set the ‘interaction’ logger to DEBUG level in order to generate the
detailed log of configuration.
Once an interaction has been created, the execution of the interaction can be also be
logged using existing Integration Framework loggers. The Logging application can be
configured to set the ‘integration’ logger to INFO or DEBUG level in order to generate
run-time logs covering execution of the interaction.
22. Web Service Interactions
22
Limitations
The following are known limitations of web service-based interactions:
1. Only WSDL 1.0 standard is supported.
2. If the currently logged in user has been granted authorization to execute the
interaction, then the current user must log out and log back in for his/her
authorization to take effect.
3. The interactions and generated artifacts are all based on the base language of the
product environment. Users who log in to the product with non-base language
will see the base language user interface of the interaction. The user interface for
the interaction should be localized if required using IBM-provided localization
tools.
4. Interactions can be created only in the base language of the product environment.
A user logged in to the product with a different language than base language will
not be able to create an interaction. An error message will be displayed in the
Create Interactions application.
5. There are several XML schema limitations:
a. Schema ‘any’ element should be resolved prior to creating the interaction
b. Recursive schema elements are not supported
c. Substitution groups are not supported
d. Sequencing is not supported
6. If any of the generated artifacts are deleted from the product using the
corresponding configuration application (for example, the interaction dialog is
deleted from the Application Designer application), then the interaction will not
function as it is missing a required component.
Appendix A. Schema Types and equivalent Maximo Data Types
Schema Types Maximo Data Type
Boolean YORN
Byte, Base64Bytes, HexBytes BLOB
Datetime DATETIME
Date DATE
Time TIME
Double, Float FLOAT
Short, Long, Integer INTEGER
BigInteger
If no length specified ALN
If length specified INTEGER
BigDecimal
If no length specified ALN
If length specified DECIMAL
String and other data types ALN
23. Web Service Interactions
23
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other
countries. Consult your local IBM representative for information on the products and
services currently available in your area. Any reference to an IBM product, program, or
service is not intended to state or imply that only that IBM product, program, or service
may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or
service.
IBM may have patents or pending patent applications covering subject matter described
in this document. The furnishing of this document does not grant you any license to these
patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
IBM World Trade Asia Corporation
Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106-0032, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes
are periodically made to the information herein; these changes will be incorporated in
new editions of the publication. IBM may make improvements and/or changes in the
product(s) and/or the program(s) described in this publication at any time without notice.
24. Web Service Interactions
24
Any references in this information to non-IBM Web sites are provided for convenience
only and do not in any manner serve as an endorsement of those Web sites. The materials
at those Web sites are not part of the materials for this IBM product and use of those Web
sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes
appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of
enabling: (i) the exchange of information between independently created programs and
other programs (including this one) and (ii) the mutual use of the information which has
been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
Such information may be available, subject to appropriate terms and conditions,
including in some cases, payment of a fee.
The licensed program described in this document and all licensed material available for it
are provided by IBM under terms of the IBM Customer Agreement, IBM International
Program License Agreement or any equivalent agreement between us.
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM has not
tested those products and cannot confirm the accuracy of performance, compatibility or
any other claims related to non-IBM products. Questions on the capabilities of non-IBM
products should be addressed to the suppliers of those products.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business operations.
To illustrate them as completely as possible, the examples include the names of
individuals, companies, brands, and products. All of these names are fictitious and any
similarity to the names and addresses used by an actual business enterprise is entirely
coincidental.
If you are viewing this information softcopy, the photographs and color illustrations may
not appear.
25. Web Service Interactions
25
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide. Other
product and service names might be trademarks of IBM or other companies. A current
list of IBM trademarks is available on the Web at “Copyright and trademark information”
at www.ibm.com/legal/copytrade.shtml.
Windows is a trademark of Microsoft Corporation in the United States, other countries,
or both.
Java and all Java-based trademarks and logos are trademarks of Sun Microsystems, Inc.
in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.