SlideShare ist ein Scribd-Unternehmen logo
1 von 65
ASSESSING THE
TECHNOLOGY
LANDSCAPE
LEGACY SYSTEMS
▪ Considering with lagacy system
▪ Current enterprise landscape
▪ Specific high priority problem/specific productivity
improvement
▪ Paths to connect systems
▪ Fragmentation of system
▪ New system, latest technology
LEGACY SYSTEMS
▪ As time goes on, system become out of date
1.Changes in technology
2.Changes in business operation.
▪ In large corporation, local units develop business
solutions.
▪ Business data(different form, names and ways).
▪ Client server system.
▪ Information system.
▪ Internet and electronic commerce.
DATA WAREHOUSE
▪ Why datawarehouse?
▪ Consistent information is more difficult to access
▪ Seldom retain the data for longer periods of time
▪ Tools to provide analysis on ad hoc basis
▪ ODS
▪ Data cleansing and transformation
▪ Reconciliation of data
▪ Accumulate data for years(historical)
▪ Storage requirements extremely large
DATA WAREHOUSE
▪ Addition and retrieval, no updates
▪ Datamart (specific data, specific purpose)
▪ ODS will phased out
▪ Batch processing
▪ Key challenge
INTRODUCTION
▪ EAI was an approach to integration of applications first developed in the
late 1990s.
▪ Pre-dated widespread use of JEE, XML and Web Services.
▪ EAI currently has become subsumed into Service Oriented Architecture
software stacks
▪ However, the need for the underlying capabilities have not changed.
MIDDLEWARE
▪ Interaction between applications across
heterogeneous platforms
▪ Solution to integrating set of servers and
applications under a common service interface
▪ Basic infrastucture behind distributed information
system
ENTERPRISE APPLICATION
INTEGRATION
▪ Extends middleware capabilities to cope with
application integration
▪ Uses application logic layers of different middleware
systems as building blocks
InterBank
Networks
Clearing
House
Central
Bank
Information
Provider
Card
Processor
Bank
Network
Consumer
Commercial
Corporate
Other
Bank
Multi-Channel
Customer
Relationship
Management
PaymentSystems
Accounts
Deposits
Loans
Mortgages
Payments
Customer
.... Call
Centre
Self
Service
Branch
Mobile
Salesforce
Direct Banking
Internet
External
Systems
Core
Systems
Information
Warehouse
Delivery
Systems
Customers
Internet
DIVERSE SYSTEMS AND CHANNELS
Example of a banking environment
Purchased Application
Package(s) – ERP etc.
New Web-based
application(s)
Legacy
Application
System(s)
Program
Program
Program
Program
Program
Program
Program
Program
Program
IT REALITY – ISLANDS OF COMPUTING
 Enterprise IT reflects the structure and history of each enterprise not
the business processes required today
 Departments have their own IT systems
 Legacy systems are left in place and new systems built
separately.
TACTICAL APPROACH TO INTEGRATING THE
BUSINESS
 Each requirement is addressed with a point to point solution
 Typically consisting of a data transfer mechanism and a format
converter.
 Increasing levels of supplier/client integration points further
complicates the situation.
Enterprise integration requirement
 Unrestricted sharing of data and business processes throughout
the networked applications or data sources in an organization
 Extend to customers, suppliers and regulators
 The Linking of Data, Business Processes, Applications to
automate business processes
 While ensuring that there are consistent qualities of
service (security, reliability etc)
 Reduce the on-going cost of maintenance and reduce the
cost of rolling out new systems.
Enterprise integration requirement
 Unrestricted sharing of data and business processes throughout
the networked applications or data sources in an organization
 Extend to customers, suppliers and regulators
 The Linking of Data, Business Processes, Applications to
automate business processes
 While ensuring that there are consistent qualities of
service (security, reliability etc)
 Reduce the on-going cost of maintenance and reduce the
cost of rolling out new systems.
DIFFICULTIES
▪ Different operating system
▪ Support for different interfaces and functionality
▪ Different data format
▪ Different security requirements
▪ Different infrastructure and interaction protocols
ELECTRONIC COMMERCE
▪ Direct communication with end costomers
▪ Data exchange with business partners
▪ New business relations
▪ New marketplace, global
ELECTRONIC COMMERCE
▪ Promote product and services
▪ B2C
▪ Promotes sales and customer loyalty
▪ B2C, web server and supporting applications
▪ Direct communication makes the business more
responsive
▪ B2B
▪ EDI
▪ Auction and Bid
WEB ENABLED APPLICATIONS
▪ Web Access to applications
▪ Web browsers
▪ Access anywhere in the world
▪ PC(not a practical user device)
WEB ENABLED APPLICATIONS
EXTENSIBLE MARKUP
LANGUAGE
▪ free-form expression of data structures in a
universal character set
▪ refinement of the basic syntax of HTML
▪ Preferred medium for the exchange of data
▪ tagged data format
▪ elements(a descriptive tag and an associated value)
▪ described by a DTD or XML Schema document
EXTENSIBLE MARKUP
LANGUAGE
key strengths of XML
1.It carries with it descriptive tags that provide
meaning to the content
2.It facilitates transformation
3.XML is replacing Electronic Document
Interchange (EDI).
EXTENSIBLE MARKUP
LANGUAGE
▪ XML parser
▪ XML Stylesheet Language (XSL)
▪ Document Object Model (DOM)
▪ Compatible with HTTP
▪ preferred syntax in EAI environment
▪ Open Application Group (OAG), Documents
standards
▪ preferred syntax for B2B exchanges
▪ incorporated in the Simple Object Access Protocol
(SOAP)
WORKFLOW MANAGEMENT
▪ Workflow management systems/business process
management systems
WORKFLOW MANAGEMENT
▪ Manages the execution of activities
▪ Activities
1.perform operations directly
2.invoke applications
3.delegate tasks to humans
▪ From batch processing to eventbased processing
▪ Formalize processes
▪ Enforce compliance
WORKFLOW MANAGEMENT
▪ Monitor performance
▪ Process improvements
▪ Coordinate distributed and concurrent activities.
▪ Interoperation of different workflow systems
▪ Object Management Group (OMG)
▪ Convergence of Workflow management and EAI
technologies
▪ Affects the design and scope of applications
DISTRIBUTED OBJECTS
▪ Development of systems with distributed components
▪ Objects: shared services or objects of a business application.
DISTRIBUTED OBJECTS
▪ Primary distributed object technologies:
• (CORBA) from the OMG
• (COM+) from Microsoft
• (EJB) from Sun Microsystems
DISTRIBUTED OBJECTS
CORBA offers three particular benefits:
1. It enables a robust, scalable solution.
2. It supports messaging between objects
implemented in different languages.
3. It is the product of an industry consortium and
enables interoperability between products from
different vendors.
DISTRIBUTED OBJECTS
▪ COM+:
1.Its products and operating systems
2.de facto reference
▪ EJB:
1.Specifications aligned to CORBA
2.Multiple vendors
COMPONENTS
▪ Object technology; reusable components.
▪ Reuse: individual applications or development teams
▪ A Short Historical Perspective
▪ Component Interface and Connections
▪ Performing Services Transparently
A SHORT HISTORICAL
PERSPECTIVE
▪ Programming languages, can be seen from either
▪ The run-time point of view or,
▪ The design and reuse perspective
COMPONENT INTERFACE
AND CONNECTIONS
▪ ADLs primarily address the issues related to the early
phases of software engineering:
▪ Design
▪ Analysis
▪ They identify a number of concepts, such as:
▪ Architecture, configurations, connectors, bindings,
properties, hierarchical models, style, static analysis and
behavior.
COMPONENT
INTERACTIONS
Iteractions with
traditional software entities
Interactions
with
other
components
Interactions with
other
components
Interactions with
component infrastructure
Components
Traditional
software entities
Component
Infrastructure
MAJORS STEPS IN CBD
LIFECYCLEAspect Phase Actor
Interface Definition Designer
Assembly Assembly Architect
Implementation Implementation Developer
Lifecycle Packaging,
Deployment
Administrator
Framework,
run-time support
Execution End User
ARCHITECTURAL DESCRIPTION
LANGUAGE
▪ Components and Ports
▪ Connectors and Roles
▪ Systems and Attachments
▪ Representations and Bindings
▪ Properties, Constraints, Types and Styles
COMPONENTS AND
PORTS
▪ Components
▪ Represent the computational elements and data stores of a
system.
▪ Ports
▪ Are the points of interaction between a component and its
environment.
Component
Port
CONNECTORS AND
ROLES
▪ Connectors
▪ Represent interactions between components such as
method calls or an SQL connection between a client and a
database server.
▪ The interface of a connector is defined as a set of
roles
Connector
Role
SYSTEMS AND
ATTACHMENTS
▪ The structure of a system is specified by a set of
components, a set of connectors, and a set of
attachments.
▪ Attachment
▪ Links a component port to a connector role.
Attachement
REPRESENTATIONS AND
BINDINGS
Connector
Component
Port
Role
Attachement
Binding
JAVA BEAN
COMPONENT MODEL
▪ Key Features
▪ Interface of a Component
▪ Implementation of a Component
▪ Components Assembly
▪ Packaging and Deployment
KEY FEATURES
▪ Bean Box
▪ "A Java Bean is a reusable software component that
can be manipulated visually in a builder tool”.
▪ The Java Bean was designed for the construction of
graphical user interface (GUI).
▪ Explicitly tailored to interact in two different contexts:
▪ At composition time, within the builder tool.
▪ At execution time, with the runtime environment.
INTERFACE OF A
COMPONENT
▪ This model defines four types of port:
▪ methods,
▪ properties,
▪ event sources and
▪ event sinks called listeners.
Read-only property
Write-only property
Property
Method
Event source
Event sink (listener)
Bounded property
v Vetoable property
ro
wo
1 Unicast event source
Ports
IMPLEMENTATION OF A
COMPONENT
▪ Most bean components are implemented by a simple
Java object, the object being encapsulated in the
component, but there are more sophisticated
implementations possible.
▪ Wrapping a legacy object.
▪ Multiple-objects implementation.
▪ Dependency on traditional entities.
IMPLEMENTATIONS OF
BEAN COMPONENTS
Object
Method
Method call
Binding
A simple implementation A more complex implementation
COMPONENTS
ASSEMBLY
▪ Assembly is one of the key features of Java Bean
though no not specific solution is provided.
▪ Different ways of assembling components are supplied.
Component-based assembly Heterogeneous assembly
PACKAGING AND
DEPLOYMENT
▪ Java Beans define a model for packaging
components into archives.
▪ Includes the definition of dependency relationships between
the package items.
▪ The customization code can be more complex than
the component itself!
▪ Each package item can be marked "Design Only", so
that they can be removed in a final application.
JAVA
▪ Portability via JVM
▪ Complemented the JVM with the JDK
▪ encapsulate platform differences
▪ Java applets
▪ Memory management
▪ Remote Message Invocation
▪ Java Transaction API
▪ Java Messaging Service
▪ Java Naming and Directory Interface
▪ Java Database Connectivity
▪ Java 2 Enterprise Edition
▪ Which technology provides adequate tools for
analysis on ad hoc basis
▪ Which type of computing and technology will be
required for B2C
▪ How XML is replacing EDI
▪ Which technology enforce compliance and
improvements in business process
▪ What are 3 genuine technologies for creating
distributed objects and compare contrast those 3
UNIFIED MODELING
LANGUAGE
▪ Unified Modeling Language (UML) by OMG.
▪ Based on a specification developed by Rational
Software
▪ OMG specification experts represent efforts of 21
tool vendors and industry experts
▪ Wide acceptance in the industry
▪ Efforts to expand its scope.
▪ Visualizations and diagramming techniques
▪ commonly is the class diagram
▪ Common Warehouse Metamodel (CWM)
▪ Enterprise Distributed Object Computing (EDOC), EAI,
and action semantics(under development)
▪ Workflow process(anticipated)
▪ Complemented by XML Model Interchange (XMI)
▪ Generating skeleton, class code from specifications
▪ Complete large-scale applications from UML sre
expected
▪ Reducing the effort of programming applications with
interoperability
MODEL DRIVEN
ARCHITECTURE (MDA)
▪ using UML to define
technology-
independent models to
map them for specific
technologies.
▪ standard specifications
for services,
applications, and
components with
operability
PUBLIC KEY
INFRASTRUCTURE (PKI)
▪ Used with digital certificates
▪ Digital certificates are issued by a trusted
certification authority
▪ encrypted with the authority's private key
▪ The systems and services for issuing and using
certificates are called the PKI.
▪ Mechanism to obtain certified identification from a
trusted authority
▪ Without previously being identified
▪ Used by Secure Sockets Layer (SSL)
▪ Sender and receiver can authenticate each other
with their digital certificates
▪ authenticate a message received from a specified
source
▪ the export of public key encryption technology from
the United States was restricted as a threat to
national security
DIGITAL SIGNATURES
▪ Employ public key technology
▪ Signature authenticates the document
▪ Prevents the signer from repudiating the document
▪ To attach a digital signature
1.the document is first processed by a digest function
2.The digest value is then encrypted with the signer's
private key and attached to the digital document
3.The recipient can execute the same digest function
decrypt the signature with the originator's public key
DIGITAL SIGNATURES
▪ If the two digest values are equal, the signature
verifies
▪ Federal legislation was adopted recently giving
digital signatures the same legal effect as signatures
on paper documents
▪ This opens the door to widespread replacement of
paper legal documents
▪ The consequence is that the scope of business
transactions conducted over the Internet will be
expanded greatly.
WIRELESS INTERFACE
DEVICES
▪ Cellular phones have become commonplace
▪ Enables new forms of Internet purchases
▪ Frees employees to conduct business anywhere and
at any time
▪ The Web pages accessed by these devices cannot be
formatted the same as Web pages for conventional
Web browser displays
▪ Web sites accessed by these devices must recognize
device limitations
KNOWLEDGE MANAGEMENT
capture, cataloging, retrieval, and application of
enterprise knowledge,
KNOWLEDGE MANAGEMENT
▪ Technical support for knowledge management is still
in the early stages
▪ Knowledge management is a second-order business
function
▪ It is difficult to implement and sustain such systems
when mainstream systems involve inconsistent data,
diverse technologies, and constant change.
▪ As enterprises implement consistent architectures,
we can expect to see a growth in knowledge
management facilities linked to business processes
and applications.
AGENT TECHNOLOGY
▪ A software agent is an autonomous program that
senses and reacts to its environment
▪ Its environment may include information about the
actions of other agents.
▪ Agent itself will determine if, when, and how it will
perform its function.
▪ A simple agent:to monitor some activity, raise an
alarm
▪ More sophisticated agents:to direct the flow of work
AGENT TECHNOLOGY
▪ Agents also might be employed for knowledge
management
▪ Agent technology is still in its infancy
▪ Consistent enterprise architecture will be a key
enabler for such technology.
INTERACTIVE VOICE
▪ Few applications make use of voice input or output
▪ Voice input and output require additional
functionality and increase the risk of errors
▪ Voice input and output also enable hands- and eyes-
free operation in activities and environments that
are not conducive to conventional terminal
interaction.
▪ Interactive voice communication will require yet
another form of message formatting. Enterprise
applications will need to anticipate these
requirements when they prepare and accept
message content.
MODEL DRIVEN
ARCHITECTURE
▪ The Model Driven Architecture strategy of the OMG
provides the ability to specify applications and
standards as Platform Independent Models (PIM)
that can be mapped to evolving technical platforms.
▪ Tools provide the ability to transform a PIM
specification to executable code
▪ Standard mappings will enable independently
developed applications and components to be
interoperable
▪ The UML Profile for Enterprise Distributed Object
Computing(EDOC ) provides the modeling elements
for the platform-independent specification of
component-based, large-scale systems
▪ The technology to implement MDA exists, the
standards and tools for composing large-scale
applications are under development.

Weitere ähnliche Inhalte

Was ist angesagt?

Software architecture & design patterns for MS CRM Developers
Software architecture & design patterns for MS CRM  Developers Software architecture & design patterns for MS CRM  Developers
Software architecture & design patterns for MS CRM Developers sebedatalabs
 
BizTalk: Server, Services and Apps
BizTalk: Server, Services and AppsBizTalk: Server, Services and Apps
BizTalk: Server, Services and AppsSandro Pereira
 
Introduction to BizTalk Server 2009
Introduction to BizTalk Server 2009Introduction to BizTalk Server 2009
Introduction to BizTalk Server 2009Aequor Technologies
 
Guide on BizTalk Server 2013 Features
Guide on BizTalk Server 2013 FeaturesGuide on BizTalk Server 2013 Features
Guide on BizTalk Server 2013 FeaturesResolWeb
 
Adopting a Canonical Data Model - how to apply to an existing environment wit...
Adopting a Canonical Data Model - how to apply to an existing environment wit...Adopting a Canonical Data Model - how to apply to an existing environment wit...
Adopting a Canonical Data Model - how to apply to an existing environment wit...Phil Wilkins
 
Introduction to BizTalk for Beginners
Introduction to BizTalk for BeginnersIntroduction to BizTalk for Beginners
Introduction to BizTalk for BeginnersAboorvaRaja Ramar
 
01 power center 8.6 basics
01 power center 8.6 basics01 power center 8.6 basics
01 power center 8.6 basicsuthayan87
 
Front-Ending the Web with Microsoft Office
Front-Ending the Web with Microsoft OfficeFront-Ending the Web with Microsoft Office
Front-Ending the Web with Microsoft Officegoodfriday
 
Sakthi Shenbagam - Data warehousing Consultant
Sakthi Shenbagam - Data warehousing ConsultantSakthi Shenbagam - Data warehousing Consultant
Sakthi Shenbagam - Data warehousing ConsultantSakthi Shenbagam
 
Enterprise Data Integration for Microsoft Dynamics CRM
Enterprise Data Integration for Microsoft Dynamics CRMEnterprise Data Integration for Microsoft Dynamics CRM
Enterprise Data Integration for Microsoft Dynamics CRMDaniel Cai
 
john-rowan-resume2
john-rowan-resume2john-rowan-resume2
john-rowan-resume2J.C. Rowan
 
Data Quality meets SOA
Data Quality meets SOAData Quality meets SOA
Data Quality meets SOAUniserv
 
DB2 Performance Tuning Z/OS - email me please for more details
DB2 Performance Tuning Z/OS - email me please for more detailsDB2 Performance Tuning Z/OS - email me please for more details
DB2 Performance Tuning Z/OS - email me please for more detailsManikandan Suresh
 
Accessing sap and_mainframe_data_and_applications_via_share_point
Accessing sap and_mainframe_data_and_applications_via_share_pointAccessing sap and_mainframe_data_and_applications_via_share_point
Accessing sap and_mainframe_data_and_applications_via_share_pointYuval Birenboum
 
Oracle product mdm pim data hub
Oracle product mdm   pim data hubOracle product mdm   pim data hub
Oracle product mdm pim data hubMBist
 
SharePoint 2010
SharePoint 2010SharePoint 2010
SharePoint 2010nplowman
 
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)Daniel Cai
 

Was ist angesagt? (20)

Biztalk
BiztalkBiztalk
Biztalk
 
Software architecture & design patterns for MS CRM Developers
Software architecture & design patterns for MS CRM  Developers Software architecture & design patterns for MS CRM  Developers
Software architecture & design patterns for MS CRM Developers
 
BizTalk: Server, Services and Apps
BizTalk: Server, Services and AppsBizTalk: Server, Services and Apps
BizTalk: Server, Services and Apps
 
Documentum Overview
Documentum OverviewDocumentum Overview
Documentum Overview
 
Introduction to BizTalk Server 2009
Introduction to BizTalk Server 2009Introduction to BizTalk Server 2009
Introduction to BizTalk Server 2009
 
Molnar DEV307 OBA
Molnar DEV307 OBAMolnar DEV307 OBA
Molnar DEV307 OBA
 
Guide on BizTalk Server 2013 Features
Guide on BizTalk Server 2013 FeaturesGuide on BizTalk Server 2013 Features
Guide on BizTalk Server 2013 Features
 
Adopting a Canonical Data Model - how to apply to an existing environment wit...
Adopting a Canonical Data Model - how to apply to an existing environment wit...Adopting a Canonical Data Model - how to apply to an existing environment wit...
Adopting a Canonical Data Model - how to apply to an existing environment wit...
 
Introduction to BizTalk for Beginners
Introduction to BizTalk for BeginnersIntroduction to BizTalk for Beginners
Introduction to BizTalk for Beginners
 
01 power center 8.6 basics
01 power center 8.6 basics01 power center 8.6 basics
01 power center 8.6 basics
 
Front-Ending the Web with Microsoft Office
Front-Ending the Web with Microsoft OfficeFront-Ending the Web with Microsoft Office
Front-Ending the Web with Microsoft Office
 
Sakthi Shenbagam - Data warehousing Consultant
Sakthi Shenbagam - Data warehousing ConsultantSakthi Shenbagam - Data warehousing Consultant
Sakthi Shenbagam - Data warehousing Consultant
 
Enterprise Data Integration for Microsoft Dynamics CRM
Enterprise Data Integration for Microsoft Dynamics CRMEnterprise Data Integration for Microsoft Dynamics CRM
Enterprise Data Integration for Microsoft Dynamics CRM
 
john-rowan-resume2
john-rowan-resume2john-rowan-resume2
john-rowan-resume2
 
Data Quality meets SOA
Data Quality meets SOAData Quality meets SOA
Data Quality meets SOA
 
DB2 Performance Tuning Z/OS - email me please for more details
DB2 Performance Tuning Z/OS - email me please for more detailsDB2 Performance Tuning Z/OS - email me please for more details
DB2 Performance Tuning Z/OS - email me please for more details
 
Accessing sap and_mainframe_data_and_applications_via_share_point
Accessing sap and_mainframe_data_and_applications_via_share_pointAccessing sap and_mainframe_data_and_applications_via_share_point
Accessing sap and_mainframe_data_and_applications_via_share_point
 
Oracle product mdm pim data hub
Oracle product mdm   pim data hubOracle product mdm   pim data hub
Oracle product mdm pim data hub
 
SharePoint 2010
SharePoint 2010SharePoint 2010
SharePoint 2010
 
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)
CRM magic with data migration & integration (Presentation at CRMUG Summit 2013)
 

Ähnlich wie Assessing technology landscape

6. real time integration with odi 11g & golden gate 11g & dq 11g 20101103 -...
6. real time integration with odi 11g & golden gate 11g & dq 11g   20101103 -...6. real time integration with odi 11g & golden gate 11g & dq 11g   20101103 -...
6. real time integration with odi 11g & golden gate 11g & dq 11g 20101103 -...Doina Draganescu
 
Logical Data Fabric and Data Mesh – Driving Business Outcomes
Logical Data Fabric and Data Mesh – Driving Business OutcomesLogical Data Fabric and Data Mesh – Driving Business Outcomes
Logical Data Fabric and Data Mesh – Driving Business OutcomesDenodo
 
1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.ppt1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.pptKalsoomTahir2
 
--Enterprise-Application-Integration.ppt
--Enterprise-Application-Integration.ppt--Enterprise-Application-Integration.ppt
--Enterprise-Application-Integration.ppteddielyndacanay0
 
Oracle Forms Modernization Roadmap
Oracle Forms Modernization RoadmapOracle Forms Modernization Roadmap
Oracle Forms Modernization RoadmapKai-Uwe Möller
 
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...marksimpsongw
 
Lessons from Building Large-Scale, Multi-Cloud, SaaS Software at Databricks
Lessons from Building Large-Scale, Multi-Cloud, SaaS Software at DatabricksLessons from Building Large-Scale, Multi-Cloud, SaaS Software at Databricks
Lessons from Building Large-Scale, Multi-Cloud, SaaS Software at DatabricksDatabricks
 
Subhoshree_ETLDeveloper
Subhoshree_ETLDeveloperSubhoshree_ETLDeveloper
Subhoshree_ETLDeveloperSubhoshree Deo
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingVijaya Raghava Vuligundam
 
adopt_soa.94145841
adopt_soa.94145841adopt_soa.94145841
adopt_soa.94145841ypai
 
Guidelines for moving from Oracle Forms to Oracle ADF and SOA
Guidelines for moving from Oracle Forms to Oracle ADF and SOAGuidelines for moving from Oracle Forms to Oracle ADF and SOA
Guidelines for moving from Oracle Forms to Oracle ADF and SOASteven Davelaar
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013Mike Brannon
 
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Denodo
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationDenodo
 
Deliver Dynamic and Interactive Web Content in J2EE Applications
Deliver Dynamic and Interactive Web Content in J2EE ApplicationsDeliver Dynamic and Interactive Web Content in J2EE Applications
Deliver Dynamic and Interactive Web Content in J2EE Applicationsinfopapers
 
Key Methodologies for Migrating from Oracle to Postgres
Key Methodologies for Migrating from Oracle to PostgresKey Methodologies for Migrating from Oracle to Postgres
Key Methodologies for Migrating from Oracle to PostgresEDB
 

Ähnlich wie Assessing technology landscape (20)

6. real time integration with odi 11g & golden gate 11g & dq 11g 20101103 -...
6. real time integration with odi 11g & golden gate 11g & dq 11g   20101103 -...6. real time integration with odi 11g & golden gate 11g & dq 11g   20101103 -...
6. real time integration with odi 11g & golden gate 11g & dq 11g 20101103 -...
 
Logical Data Fabric and Data Mesh – Driving Business Outcomes
Logical Data Fabric and Data Mesh – Driving Business OutcomesLogical Data Fabric and Data Mesh – Driving Business Outcomes
Logical Data Fabric and Data Mesh – Driving Business Outcomes
 
1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.ppt1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.ppt
 
--Enterprise-Application-Integration.ppt
--Enterprise-Application-Integration.ppt--Enterprise-Application-Integration.ppt
--Enterprise-Application-Integration.ppt
 
Oracle Forms Modernization Roadmap
Oracle Forms Modernization RoadmapOracle Forms Modernization Roadmap
Oracle Forms Modernization Roadmap
 
Resume_Parthiban_Ranganathan
Resume_Parthiban_RanganathanResume_Parthiban_Ranganathan
Resume_Parthiban_Ranganathan
 
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
 
Lessons from Building Large-Scale, Multi-Cloud, SaaS Software at Databricks
Lessons from Building Large-Scale, Multi-Cloud, SaaS Software at DatabricksLessons from Building Large-Scale, Multi-Cloud, SaaS Software at Databricks
Lessons from Building Large-Scale, Multi-Cloud, SaaS Software at Databricks
 
Subhoshree_ETLDeveloper
Subhoshree_ETLDeveloperSubhoshree_ETLDeveloper
Subhoshree_ETLDeveloper
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development Training
 
adopt_soa.94145841
adopt_soa.94145841adopt_soa.94145841
adopt_soa.94145841
 
AhmedWasfi2015
AhmedWasfi2015AhmedWasfi2015
AhmedWasfi2015
 
Info sphere overview
Info sphere overviewInfo sphere overview
Info sphere overview
 
Subhoshree resume
Subhoshree resumeSubhoshree resume
Subhoshree resume
 
Guidelines for moving from Oracle Forms to Oracle ADF and SOA
Guidelines for moving from Oracle Forms to Oracle ADF and SOAGuidelines for moving from Oracle Forms to Oracle ADF and SOA
Guidelines for moving from Oracle Forms to Oracle ADF and SOA
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013
 
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
 
Deliver Dynamic and Interactive Web Content in J2EE Applications
Deliver Dynamic and Interactive Web Content in J2EE ApplicationsDeliver Dynamic and Interactive Web Content in J2EE Applications
Deliver Dynamic and Interactive Web Content in J2EE Applications
 
Key Methodologies for Migrating from Oracle to Postgres
Key Methodologies for Migrating from Oracle to PostgresKey Methodologies for Migrating from Oracle to Postgres
Key Methodologies for Migrating from Oracle to Postgres
 

Mehr von Dom Mike

Mm10lifecycle
Mm10lifecycleMm10lifecycle
Mm10lifecycleDom Mike
 
Lecture ethics
Lecture ethicsLecture ethics
Lecture ethicsDom Mike
 
Lecture 1 prof practices
Lecture 1 prof practicesLecture 1 prof practices
Lecture 1 prof practicesDom Mike
 
Lec51 52 pre and post production
Lec51 52 pre and post productionLec51 52 pre and post production
Lec51 52 pre and post productionDom Mike
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights managementDom Mike
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencingDom Mike
 
Lec28 29 30 animation
Lec28 29 30 animationLec28 29 30 animation
Lec28 29 30 animationDom Mike
 
Lec14 15 16 text
Lec14 15 16 textLec14 15 16 text
Lec14 15 16 textDom Mike
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesDom Mike
 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compressionDom Mike
 
Lec5 interactive multimedia tools
Lec5 interactive multimedia toolsLec5 interactive multimedia tools
Lec5 interactive multimedia toolsDom Mike
 
Lec3 4 mm applications and use
Lec3 4 mm applications and useLec3 4 mm applications and use
Lec3 4 mm applications and useDom Mike
 
Lec1 2 introduction
Lec1 2 introductionLec1 2 introduction
Lec1 2 introductionDom Mike
 
Introduction
IntroductionIntroduction
IntroductionDom Mike
 
Lecture 2 19-2
Lecture 2 19-2Lecture 2 19-2
Lecture 2 19-2Dom Mike
 

Mehr von Dom Mike (20)

Mm10lifecycle
Mm10lifecycleMm10lifecycle
Mm10lifecycle
 
Lecture ethics
Lecture ethicsLecture ethics
Lecture ethics
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1 prof practices
Lecture 1 prof practicesLecture 1 prof practices
Lecture 1 prof practices
 
Lec51 52 pre and post production
Lec51 52 pre and post productionLec51 52 pre and post production
Lec51 52 pre and post production
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights management
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencing
 
Lec28 29 30 animation
Lec28 29 30 animationLec28 29 30 animation
Lec28 29 30 animation
 
Lec14 15 16 text
Lec14 15 16 textLec14 15 16 text
Lec14 15 16 text
 
Lec11
Lec11Lec11
Lec11
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compression
 
Lec5 interactive multimedia tools
Lec5 interactive multimedia toolsLec5 interactive multimedia tools
Lec5 interactive multimedia tools
 
Lec3 4 mm applications and use
Lec3 4 mm applications and useLec3 4 mm applications and use
Lec3 4 mm applications and use
 
Lec1 2 introduction
Lec1 2 introductionLec1 2 introduction
Lec1 2 introduction
 
Introduction
IntroductionIntroduction
Introduction
 
Ch7
Ch7Ch7
Ch7
 
Ch6
Ch6Ch6
Ch6
 
Lecture 2 19-2
Lecture 2 19-2Lecture 2 19-2
Lecture 2 19-2
 
Uzair ppt
Uzair pptUzair ppt
Uzair ppt
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Assessing technology landscape

  • 2. LEGACY SYSTEMS ▪ Considering with lagacy system ▪ Current enterprise landscape ▪ Specific high priority problem/specific productivity improvement ▪ Paths to connect systems ▪ Fragmentation of system ▪ New system, latest technology
  • 3. LEGACY SYSTEMS ▪ As time goes on, system become out of date 1.Changes in technology 2.Changes in business operation. ▪ In large corporation, local units develop business solutions. ▪ Business data(different form, names and ways). ▪ Client server system. ▪ Information system. ▪ Internet and electronic commerce.
  • 4. DATA WAREHOUSE ▪ Why datawarehouse? ▪ Consistent information is more difficult to access ▪ Seldom retain the data for longer periods of time ▪ Tools to provide analysis on ad hoc basis ▪ ODS ▪ Data cleansing and transformation ▪ Reconciliation of data ▪ Accumulate data for years(historical) ▪ Storage requirements extremely large
  • 5. DATA WAREHOUSE ▪ Addition and retrieval, no updates ▪ Datamart (specific data, specific purpose) ▪ ODS will phased out ▪ Batch processing ▪ Key challenge
  • 6. INTRODUCTION ▪ EAI was an approach to integration of applications first developed in the late 1990s. ▪ Pre-dated widespread use of JEE, XML and Web Services. ▪ EAI currently has become subsumed into Service Oriented Architecture software stacks ▪ However, the need for the underlying capabilities have not changed.
  • 7. MIDDLEWARE ▪ Interaction between applications across heterogeneous platforms ▪ Solution to integrating set of servers and applications under a common service interface ▪ Basic infrastucture behind distributed information system
  • 8. ENTERPRISE APPLICATION INTEGRATION ▪ Extends middleware capabilities to cope with application integration ▪ Uses application logic layers of different middleware systems as building blocks
  • 10. Purchased Application Package(s) – ERP etc. New Web-based application(s) Legacy Application System(s) Program Program Program Program Program Program Program Program Program IT REALITY – ISLANDS OF COMPUTING  Enterprise IT reflects the structure and history of each enterprise not the business processes required today  Departments have their own IT systems  Legacy systems are left in place and new systems built separately.
  • 11. TACTICAL APPROACH TO INTEGRATING THE BUSINESS  Each requirement is addressed with a point to point solution  Typically consisting of a data transfer mechanism and a format converter.  Increasing levels of supplier/client integration points further complicates the situation.
  • 12. Enterprise integration requirement  Unrestricted sharing of data and business processes throughout the networked applications or data sources in an organization  Extend to customers, suppliers and regulators  The Linking of Data, Business Processes, Applications to automate business processes  While ensuring that there are consistent qualities of service (security, reliability etc)  Reduce the on-going cost of maintenance and reduce the cost of rolling out new systems.
  • 13. Enterprise integration requirement  Unrestricted sharing of data and business processes throughout the networked applications or data sources in an organization  Extend to customers, suppliers and regulators  The Linking of Data, Business Processes, Applications to automate business processes  While ensuring that there are consistent qualities of service (security, reliability etc)  Reduce the on-going cost of maintenance and reduce the cost of rolling out new systems.
  • 14. DIFFICULTIES ▪ Different operating system ▪ Support for different interfaces and functionality ▪ Different data format ▪ Different security requirements ▪ Different infrastructure and interaction protocols
  • 15. ELECTRONIC COMMERCE ▪ Direct communication with end costomers ▪ Data exchange with business partners ▪ New business relations ▪ New marketplace, global
  • 16. ELECTRONIC COMMERCE ▪ Promote product and services ▪ B2C ▪ Promotes sales and customer loyalty ▪ B2C, web server and supporting applications ▪ Direct communication makes the business more responsive ▪ B2B ▪ EDI ▪ Auction and Bid
  • 17. WEB ENABLED APPLICATIONS ▪ Web Access to applications ▪ Web browsers ▪ Access anywhere in the world ▪ PC(not a practical user device)
  • 19. EXTENSIBLE MARKUP LANGUAGE ▪ free-form expression of data structures in a universal character set ▪ refinement of the basic syntax of HTML ▪ Preferred medium for the exchange of data ▪ tagged data format ▪ elements(a descriptive tag and an associated value) ▪ described by a DTD or XML Schema document
  • 20. EXTENSIBLE MARKUP LANGUAGE key strengths of XML 1.It carries with it descriptive tags that provide meaning to the content 2.It facilitates transformation 3.XML is replacing Electronic Document Interchange (EDI).
  • 21. EXTENSIBLE MARKUP LANGUAGE ▪ XML parser ▪ XML Stylesheet Language (XSL) ▪ Document Object Model (DOM) ▪ Compatible with HTTP ▪ preferred syntax in EAI environment ▪ Open Application Group (OAG), Documents standards ▪ preferred syntax for B2B exchanges ▪ incorporated in the Simple Object Access Protocol (SOAP)
  • 22. WORKFLOW MANAGEMENT ▪ Workflow management systems/business process management systems
  • 23. WORKFLOW MANAGEMENT ▪ Manages the execution of activities ▪ Activities 1.perform operations directly 2.invoke applications 3.delegate tasks to humans ▪ From batch processing to eventbased processing ▪ Formalize processes ▪ Enforce compliance
  • 24. WORKFLOW MANAGEMENT ▪ Monitor performance ▪ Process improvements ▪ Coordinate distributed and concurrent activities. ▪ Interoperation of different workflow systems ▪ Object Management Group (OMG) ▪ Convergence of Workflow management and EAI technologies ▪ Affects the design and scope of applications
  • 25. DISTRIBUTED OBJECTS ▪ Development of systems with distributed components ▪ Objects: shared services or objects of a business application.
  • 26. DISTRIBUTED OBJECTS ▪ Primary distributed object technologies: • (CORBA) from the OMG • (COM+) from Microsoft • (EJB) from Sun Microsystems
  • 27. DISTRIBUTED OBJECTS CORBA offers three particular benefits: 1. It enables a robust, scalable solution. 2. It supports messaging between objects implemented in different languages. 3. It is the product of an industry consortium and enables interoperability between products from different vendors.
  • 28. DISTRIBUTED OBJECTS ▪ COM+: 1.Its products and operating systems 2.de facto reference ▪ EJB: 1.Specifications aligned to CORBA 2.Multiple vendors
  • 29. COMPONENTS ▪ Object technology; reusable components. ▪ Reuse: individual applications or development teams ▪ A Short Historical Perspective ▪ Component Interface and Connections ▪ Performing Services Transparently
  • 30. A SHORT HISTORICAL PERSPECTIVE ▪ Programming languages, can be seen from either ▪ The run-time point of view or, ▪ The design and reuse perspective
  • 31. COMPONENT INTERFACE AND CONNECTIONS ▪ ADLs primarily address the issues related to the early phases of software engineering: ▪ Design ▪ Analysis ▪ They identify a number of concepts, such as: ▪ Architecture, configurations, connectors, bindings, properties, hierarchical models, style, static analysis and behavior.
  • 32. COMPONENT INTERACTIONS Iteractions with traditional software entities Interactions with other components Interactions with other components Interactions with component infrastructure Components Traditional software entities Component Infrastructure
  • 33. MAJORS STEPS IN CBD LIFECYCLEAspect Phase Actor Interface Definition Designer Assembly Assembly Architect Implementation Implementation Developer Lifecycle Packaging, Deployment Administrator Framework, run-time support Execution End User
  • 34. ARCHITECTURAL DESCRIPTION LANGUAGE ▪ Components and Ports ▪ Connectors and Roles ▪ Systems and Attachments ▪ Representations and Bindings ▪ Properties, Constraints, Types and Styles
  • 35. COMPONENTS AND PORTS ▪ Components ▪ Represent the computational elements and data stores of a system. ▪ Ports ▪ Are the points of interaction between a component and its environment. Component Port
  • 36. CONNECTORS AND ROLES ▪ Connectors ▪ Represent interactions between components such as method calls or an SQL connection between a client and a database server. ▪ The interface of a connector is defined as a set of roles Connector Role
  • 37. SYSTEMS AND ATTACHMENTS ▪ The structure of a system is specified by a set of components, a set of connectors, and a set of attachments. ▪ Attachment ▪ Links a component port to a connector role. Attachement
  • 39. JAVA BEAN COMPONENT MODEL ▪ Key Features ▪ Interface of a Component ▪ Implementation of a Component ▪ Components Assembly ▪ Packaging and Deployment
  • 40. KEY FEATURES ▪ Bean Box ▪ "A Java Bean is a reusable software component that can be manipulated visually in a builder tool”. ▪ The Java Bean was designed for the construction of graphical user interface (GUI). ▪ Explicitly tailored to interact in two different contexts: ▪ At composition time, within the builder tool. ▪ At execution time, with the runtime environment.
  • 41. INTERFACE OF A COMPONENT ▪ This model defines four types of port: ▪ methods, ▪ properties, ▪ event sources and ▪ event sinks called listeners. Read-only property Write-only property Property Method Event source Event sink (listener) Bounded property v Vetoable property ro wo 1 Unicast event source Ports
  • 42. IMPLEMENTATION OF A COMPONENT ▪ Most bean components are implemented by a simple Java object, the object being encapsulated in the component, but there are more sophisticated implementations possible. ▪ Wrapping a legacy object. ▪ Multiple-objects implementation. ▪ Dependency on traditional entities.
  • 43. IMPLEMENTATIONS OF BEAN COMPONENTS Object Method Method call Binding A simple implementation A more complex implementation
  • 44. COMPONENTS ASSEMBLY ▪ Assembly is one of the key features of Java Bean though no not specific solution is provided. ▪ Different ways of assembling components are supplied. Component-based assembly Heterogeneous assembly
  • 45. PACKAGING AND DEPLOYMENT ▪ Java Beans define a model for packaging components into archives. ▪ Includes the definition of dependency relationships between the package items. ▪ The customization code can be more complex than the component itself! ▪ Each package item can be marked "Design Only", so that they can be removed in a final application.
  • 46. JAVA ▪ Portability via JVM ▪ Complemented the JVM with the JDK ▪ encapsulate platform differences ▪ Java applets ▪ Memory management ▪ Remote Message Invocation ▪ Java Transaction API
  • 47. ▪ Java Messaging Service ▪ Java Naming and Directory Interface ▪ Java Database Connectivity ▪ Java 2 Enterprise Edition
  • 48. ▪ Which technology provides adequate tools for analysis on ad hoc basis ▪ Which type of computing and technology will be required for B2C ▪ How XML is replacing EDI ▪ Which technology enforce compliance and improvements in business process ▪ What are 3 genuine technologies for creating distributed objects and compare contrast those 3
  • 49. UNIFIED MODELING LANGUAGE ▪ Unified Modeling Language (UML) by OMG. ▪ Based on a specification developed by Rational Software ▪ OMG specification experts represent efforts of 21 tool vendors and industry experts ▪ Wide acceptance in the industry ▪ Efforts to expand its scope. ▪ Visualizations and diagramming techniques ▪ commonly is the class diagram
  • 50.
  • 51. ▪ Common Warehouse Metamodel (CWM) ▪ Enterprise Distributed Object Computing (EDOC), EAI, and action semantics(under development) ▪ Workflow process(anticipated) ▪ Complemented by XML Model Interchange (XMI) ▪ Generating skeleton, class code from specifications ▪ Complete large-scale applications from UML sre expected ▪ Reducing the effort of programming applications with interoperability
  • 52. MODEL DRIVEN ARCHITECTURE (MDA) ▪ using UML to define technology- independent models to map them for specific technologies. ▪ standard specifications for services, applications, and components with operability
  • 54. ▪ Used with digital certificates ▪ Digital certificates are issued by a trusted certification authority ▪ encrypted with the authority's private key ▪ The systems and services for issuing and using certificates are called the PKI. ▪ Mechanism to obtain certified identification from a trusted authority ▪ Without previously being identified
  • 55. ▪ Used by Secure Sockets Layer (SSL) ▪ Sender and receiver can authenticate each other with their digital certificates ▪ authenticate a message received from a specified source ▪ the export of public key encryption technology from the United States was restricted as a threat to national security
  • 56. DIGITAL SIGNATURES ▪ Employ public key technology ▪ Signature authenticates the document ▪ Prevents the signer from repudiating the document ▪ To attach a digital signature 1.the document is first processed by a digest function 2.The digest value is then encrypted with the signer's private key and attached to the digital document 3.The recipient can execute the same digest function decrypt the signature with the originator's public key
  • 57. DIGITAL SIGNATURES ▪ If the two digest values are equal, the signature verifies ▪ Federal legislation was adopted recently giving digital signatures the same legal effect as signatures on paper documents ▪ This opens the door to widespread replacement of paper legal documents ▪ The consequence is that the scope of business transactions conducted over the Internet will be expanded greatly.
  • 58. WIRELESS INTERFACE DEVICES ▪ Cellular phones have become commonplace ▪ Enables new forms of Internet purchases ▪ Frees employees to conduct business anywhere and at any time ▪ The Web pages accessed by these devices cannot be formatted the same as Web pages for conventional Web browser displays ▪ Web sites accessed by these devices must recognize device limitations
  • 59. KNOWLEDGE MANAGEMENT capture, cataloging, retrieval, and application of enterprise knowledge,
  • 60. KNOWLEDGE MANAGEMENT ▪ Technical support for knowledge management is still in the early stages ▪ Knowledge management is a second-order business function ▪ It is difficult to implement and sustain such systems when mainstream systems involve inconsistent data, diverse technologies, and constant change. ▪ As enterprises implement consistent architectures, we can expect to see a growth in knowledge management facilities linked to business processes and applications.
  • 61. AGENT TECHNOLOGY ▪ A software agent is an autonomous program that senses and reacts to its environment ▪ Its environment may include information about the actions of other agents. ▪ Agent itself will determine if, when, and how it will perform its function. ▪ A simple agent:to monitor some activity, raise an alarm ▪ More sophisticated agents:to direct the flow of work
  • 62. AGENT TECHNOLOGY ▪ Agents also might be employed for knowledge management ▪ Agent technology is still in its infancy ▪ Consistent enterprise architecture will be a key enabler for such technology.
  • 63. INTERACTIVE VOICE ▪ Few applications make use of voice input or output ▪ Voice input and output require additional functionality and increase the risk of errors ▪ Voice input and output also enable hands- and eyes- free operation in activities and environments that are not conducive to conventional terminal interaction. ▪ Interactive voice communication will require yet another form of message formatting. Enterprise applications will need to anticipate these requirements when they prepare and accept message content.
  • 64. MODEL DRIVEN ARCHITECTURE ▪ The Model Driven Architecture strategy of the OMG provides the ability to specify applications and standards as Platform Independent Models (PIM) that can be mapped to evolving technical platforms. ▪ Tools provide the ability to transform a PIM specification to executable code ▪ Standard mappings will enable independently developed applications and components to be interoperable ▪ The UML Profile for Enterprise Distributed Object Computing(EDOC ) provides the modeling elements for the platform-independent specification of component-based, large-scale systems
  • 65. ▪ The technology to implement MDA exists, the standards and tools for composing large-scale applications are under development.