...Arvind Krishnan Ramesh Saahil Khanna Shriram Jayaraman Sneha Bhandarkar Service Oriented Architecture New Models of Enterprise Architecture (Group 2) Service Oriented Architecture New Models of Enterprise Architecture (Group 2) Service Oriented Architecture Building an enterprise-scale software system is a complex undertaking. Despite decades of technological advances, the demands imposed by today’s information systems frequently stretch to breaking point a company’s ability to design, construct, and evolve its mission-critical software solutions. In particular, few new systems are designed from the ground up. Rather, a software architect’s task is commonly that of extending the life of an existing solution by describing new business logic that manipulates an existing repository of data, presenting existing data and transactions through new channels such as an Internet browser or handheld devices, integrating previously disconnected systems supporting overlapping business activities, and so on. Service Oriented Architecture (SOA) SOA is a way of designing a software system to provide services to either end-user applications or other services through published and discoverable interfaces. In many cases, services provide a better way to expose discrete business functions and therefore an excellent way to develop applications that support business processes. SOA architecture adheres to the Four Tenets of Service Orientation. Service Orientation (SO) is an architectural...
Words: 1541 - Pages: 7
...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a person...
Words: 2493 - Pages: 10
...The analysis team will need to speak with users under Yvonne such as the Employee Relations Manager, Compensation & Benefits Manager, Payroll Manager, Employee Relations Specialist, Compensation Analyst, Benefits Manager, Payroll/Tax Clerk, Recruiters, Training and Development team, Safety Manager and Safety Techs. These users are vital to understand how the HR system works for them day to day. Requirements from this list of users can be used to determine how the new integrated system will be used at every Riordan location. Information Gathering and Analysis Tools Information gathering is very important in defining the requirements. Knowing how the HR system currently works and how the system needs to work is the objective of the gathering phase. According to Valacich, George and Hoffe (2007), the analysts need to understand the following components of a business to build...
Words: 3672 - Pages: 15
...becoming part of virtually every activity in an organization. This paper explores the relationship between the organizations and managers of IS projects and the usefulness and need for IS project managers to become more knowledgeable to be able to effectively anticipate and deal with conflicts that arise as a consequence of information systems creation or modifications in organizations. The development of a system basically involves two major parts: System Analysis and System Design. System Analysis is defined as the study of a business problem domain or area to recommend improvements and specify the business requirements and priorities for the solution (Whitten & Bentley, 2007). System design is defined as the specification or construction of a technical, computer-based solution for the business requirements identified in a System Analysis (Whitten & Bentley, 2007). Information Technology Architecture The term “IT Architecture” is used a lot in the IT industry. There is a need to understand what...
Words: 4173 - Pages: 17
...different purposes. 6. Why is Data considered a vital resource? - Most organizations couldn’t survive or succeed without quality data about their internal operations and external environment. 7. What is a Data Warehouse? - It is an integrated decision support database whose content derives from the various operational and analytical databases. It is historical and centralized source of data that has been standardized and integrated, used by managers and other professional users. 8. What are the 3 Network topologies? -Star, Ring and bus topology 9. What is “The Web”? - It is a system with a universally accepted set of standards for storing, retrieving, formatting, and displaying data using a client/server architecture. The web combines text, audio, video and...
Words: 2284 - Pages: 10
...Engineering, Khalifa University of Science, Technology & Research, Abu Dhabi, UAE CDepartment of Computer Science, Kuwait University, Kuwait b Azzam Mourada, Hadi Otrok , Hamdi YahyaouiC and Lama Baajoura Abstract-We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML profile(s). Our proposed approach allows first to specify the XACML profiles, which are then translated using our intended compiler into XACML security policies. The main contributions of our approach are: (1) Describing dynamic security policies using an abstract and user friendly profile language on top of XACML, (2) generating automatically the the XACML policies and (3) separating the business and security concerns of composite web services, and hence developing them separately. Our solution address the problems related to the complexity and difficulty of specifying security policies in XACML and other standard languages. We tested the feasibility of our approach by developing the library system (LB) that is composed of several Web services and applying/realizing our approach to enforce security. Keywords. Web Services Security; XACML; Security Policies; RBAC. The Security Assertion Markup Language (SAML) [2], WS Security [3] and WS-XACML [4] are the most successful ones. The main problems with such language-based strategies...
Words: 2085 - Pages: 9
...Nantonia ICT Strategy & Planning Master : ICT in Business Location : University, Leiden Course : ICT Strategy & Planning Assignment : Paper Case study Nantonia Date : 3 June 2011 Name : Suraj Soerdjbali Studentnr : Teacher : ------------------------------------------------- Part 1 The business model: 1. Partners: Natepco is a subsidiary of Natonia Energy Holdings. Which on their turn have a joint venture with Prime Energy Group and Government of Natonia 2. Key activities: The key activities of Natepco are exploration and production 3. Key resources: The key resources of Natepco are sell crude oil to commodity markets and gas (LHG) to power/electricity producers 4. Value Proposition: crude oil and gas (LHG) 5. Relationship: Their Brand, retaining customers 6. Distribution and acquisition channel: Traders, electricity producers 7. Customers: willing market in local industry 8. Cost structure: Manufacturing, exploration, maintenance 9. Revenue streams: The IT systems being used within the business model: * Partners: Prime Energy Group is in consideration of implementing SAP * Key activities: VAX/Compaq systems are used for drilling applications, HP systems are used for running applications for maintenance en procurement. Offshore platforms uses email application and application access * Key resource: IBM systems for finance The business maxims that I found in the case are: * To be government’s...
Words: 3623 - Pages: 15
...Enterprise Architecture Vol. 11, No. 10 10 Key Skills Architects Must Have to Deliver Value by Michael Rosen, Director, Cutter Consortium Enterprise Architecture Practice As the complexity of IT grows, more and more organizations are realizing the need for architecture. But the definition of what architecture is, the titles that architects have, and the role of an architect vary widely from one organization to another. Business, IT, management, and even architects don’t necessarily know what a good architect does to add value in his or her organization. This Executive Report discusses the role of the architect and describes 10 activities that architects should perform to add value to projects. ABOUT CUTTER CONSORTIUM Access to the Experts Cutter Consortium is a unique IT advisory firm, comprising a group of more than 100 internationally recognized experts who have come together to offer content, consulting, and training to our clients. These experts are committed to delivering top-level, critical, and objective advice. They have done, and are doing, groundbreaking work in organizations worldwide, helping companies deal with issues in the core areas of software development and agile project management, enterprise architecture, business technology trends and strategies, innovation, enterprise risk management, metrics, and sourcing. Cutter offers a different value proposition than other IT research firms: We give you Access to the Experts....
Words: 11157 - Pages: 45
...the work environment. Databases play a significant role in an organization, so it is important to know how to capitalize on database functionality. You will also learn how businesses, consumers, and the government use collaboration tools in the work environment, and how these tools have transformed the business processes of today’s organizations. Additionally, you will explore electronic commerce, and discuss the challenges this technology presents to businesses and their consumers. Databases, Network Applications, and E-Business OBJECTIVE: Describe how databases are used in the work environment. Resources: Ch. 4 and Technology Guide 2 of Introduction to Information Systems and Ch. 1 for Access in Microsoft® Office 2010 Content • Ch. 4: Data and Knowledge Management of Introduction to Information Systems o Managing Data • The Difficulties of Managing Data • The Data Life Cycle o The Database Approach • The Data Hierarchy • Designing the Database o Database Management Systems • The Relational Database Model • Databases in Action o Data Warehousing • Describing the Data Warehouse • Data Marts o Data Governance o Knowledge Management • Concepts and Definitions • Knowledge Management Systems • The Knowledge Management System Cycle • Technology Guide 2: Computer Software of Introduction to Information Systems ...
Words: 610 - Pages: 3
...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...
Words: 3868 - Pages: 16
...data - known facts that can be recorded and that have implicit meaning. Database - represents some aspect of the real world (miniworld or universe of discource – UoD). Collection of related data (a random assortment of data is not a database). A DB is designed, built, and populated with data for a specific purpose. It has an intended group of users and a some preconceived applications in which the users are interested. DBMS - is a collection of programs that enables users to create and maintain a database. database system – it is a combination of database and DBMS software. program – data independence – The structure of data files is stored in the DBMS catalog separately from the access programs. user view - – includes a number of external schemas that describes the part of the database that a particular user group is interested in and hides the rest of the database from that user group. DBA – is an IT professional that is responsible for Installation, Configuration, Upgrade, Administration, Monitoring, Maintenance and Securing of databases in an organization. The chief administrator of the database. end user - are the people whose jobs require access to the database for querying, updating, and generating reports; the database primarily exists for their use. data model - a collection of concepts that can be used to describe the structure of a database-provides the necessary means to achieve this abstraction. database schema - of a database system is its structure described...
Words: 959 - Pages: 4
...ASSIGNMENT 1 --------------------------------------------------------------------------------------------------------------------- 1. What is an architecture? Why is it important to create an architecture for a software product? An Architecture: “Architecture is the principle organization of a system realize the components and relationships to each other, and to the environment, and the fundamental guiding its design and evolution.” An architecture is the process of defining a structured solution that meets all the technical and operational requirements. Optimizing common attributes such as performance, security and manageability. “Architecture is the art or practice of designing and constructing buildings”. Systems, subsystems,...
Words: 2707 - Pages: 11
...SPECIFICATION 17 CHAPTER FOUR 18 SYSTEM DESIGN 18 4.1 INPUT AND OUTPUT FORMS 18 4.1.1 DATA TABLES 18 4.1.2 DISPLAY FORMS 19 4.2 CONCLUSION 21 REFERENCES 22 ABSTRACT The adoption of integrated library systems (ILS) became prevalent in the 1980s and 1990s as libraries began or continued to automate their processes. These systems enabled library staff to work, in many cases, more efficiently than they had in the past. However, these systems were also restrictive—especially as the nature of the work began to change—largely in response to the growth of electronic and digital resources that they were not designed to manage. New library systems—the second (or next) generation—are needed to effectively manage the processes of acquiring, describing, and making available all library resources. This article examines the state of library systems today and describes the features needed in a...
Words: 4154 - Pages: 17
...Model Driven Development – Future or Failure of Software Development? Ruben Picek, Vjeran Strahonja University of Zagreb, Faculty of Organization and Informatics, Varaždin ruben.picek@foi.hr, vjeran.strahonja@foi.hr Abstract. This article discusses some issues of the software development paradigm called Model Driven Development (MDD). Its basic idea is to move software development to a higher level of abstraction by using models as primary artifacts, and to transform models into the source code, with the aid of tools. Currently, there are several approaches to the realization of MDD paradigm which should bring a lot of benefits. However there are still problems to be solved, which will be discussed here. The authors are also going to analyze developers pros and cons, and give their own opinion about today's open question: Will MDD become a failure in trying to deal with software crisis, like the idea of CASE tools in 80's or will it become the future of software development? Keywords. MDD, MDD approaches, Software Factories, Software Development 1. Model Driven Development Paradigm In the last few years, software development has been faced with many challenges. Requirements of new and/or existing systems are growing, systems are complex and it is hard to build them on time and on budget. As an answer to these challenges, a wide spectrum of new approaches occurred, varying from buzzwords to comprehensive methodologies. One of the most prominent paradigms is Model Driven Development...
Words: 5437 - Pages: 22
...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...
Words: 218699 - Pages: 875