A Study on Information Connection Model using Rulebased Connection Platform

Size: px
Start display at page:

Download "A Study on Information Connection Model using Rulebased Connection Platform"

Transcription

1 A Study on Information Connection Model using Rulebased Connection Platform Heeseok Choi, Jaesoo Kim NTIS Center, Korea Institute of Science and Technology Information, Daejeon, Korea Abstract - National Science & Technology Information Service (NTIS) collects national R&D information through the connection system in real time with specialized institutions under government ministries for R&D information service. However, because the information connection between the research management systems in each ministry (institution) and the NTIS is different, it is not easy to operate the connection system, and immediate data collection is thus not ensured. This study aims to propose an information connection model to be applied on the NTIS-like systems. To do this, we examine methods or styles of information connection and compare strength and weakness of connection methods. In this paper we also understand issues or characteristics of the methods through analyzing current information connection methods applied on the NTIS. Therefore, we design a rule-based information connection platform to minimize the information connection issues. Based on the platform, we also propose an information connection model. Keywords: Information Connection, Information Sharing, Rule-based Connection, NTIS 1 Introduction National Science & Technology Information Service (NTIS) was developed for improving efficient research and development throughout the cycle from planning R&D to using the outcome thereof [1]. For this purpose, each representative institution under the government ministries and agencies comprehensively manages its R&D information for connection with the NTIS for the purpose of real-time collection of national R&D information (periodical update when collecting and changing the information at the time of project agreement). The NTIS has currently built a real-time connection system with representative institutions under government ministries and agencies [2]. However, since the connection criteria of each institution with external systems are different, the NTIS is connected with the research management system of each institution in various manners, to collect R&D information. Accordingly, immediate data collection is not ensured, and various manners of connection contribute to inefficient operation/maintenance. This study aims to propose an information connection model to be applied on the NTIS-like systems. To do this, we examine methods or styles of information connection and compare strength and weakness of connection methods. In this paper we also understand issues or characteristics of the methods through analyzing current information connection methods applied on the NTIS. Therefore, we design a rulebased information connection platform to minimize the information connection issues. Based on the platform, we also propose an information connection model to be applied on the NTIS-like systems. 2 Related works 2.1 Technologies of information connection For information connection between systems, P2P, EAI, ESB or combinations thereof are currently applied [3]. Features and characteristics of each method are described below. 1 P2P: 1:1 connection between individual systems, and cannot be extended or reused. However, because connection between individual systems is simple, a connection system is easily built in conformity with features of each system. 2 EAI: Individual applications are connected to the central hub by means of an adapter, and are connected to other applications through the central hub. This significantly improves typical complex connections. However, this method uses vender-dependent technology and adapter costs should be paid for each connected application. 3 ESB: This method was developed to avoid weakness of non-standard EAI (Hub & Spoke) and SPOF (Single Point Of Failure). However, because the current ESB solution market is controlled by the EAI solution providers, the tendency is that the previous EAI solutions are supplemented and developed. In general, this method is used for service connection. Table 1 describes the strength and weakness of each technology in terms of complexity, extensibility, flexibility, and integration cost, etc.

2 P2P EAI ESB Table 1. Comparison of connection technologies Strength -Easy application to simple interworking between systems in a non-complex environment. -Easy extension in introducing new applications. -Increased productivity and convenience for development and maintenance. -Reduced integration cost because standard technology is used and service units can be reused. -Loose connection in a bus type contributes to high extension capability and flexibility. Weakness -As the number of systems to be connected increases, the cost for maintenance may sharply increase. -Low extension capability and flexibility. -High cost of establishment and maintenance. -Central hub failure affects the entire system. (Single Point of Failure) -High cost of initial establishment. 2.2 Styles of data provision (collection) When systems of other organizations are connected, independency of system operation and system/data security of the organizations can be also an important issue. Therefore, the subject of data provision (collection) can be considered as an important factor in building and operatiing a connection system. Connection depending on the subject of data provision (collection) is divided into the push method and the polling method [4]. 1 Push method: an information source (information provider) who owns and manages original information pushes data into information targets (information consumers) in a given cycle according to the information provision policy. Therefore, information connection in this method is by a subject of information provision who leads information connection. This method is in favor of operation and security of data and institution systems for information providers, but does not ensure immediate information collection for information providers. 2 Polling method: this is to access information providers (systems for information sources) when an information collector requires the information to bring required information. Therefore, this is a method of connection in which the subject of information collection leads information connection. This method ensures immediate information collection, but is not preferred by information providers in terms of operation independency and security of internal systems because information sources are directly accessed from external systems. Table 2 describes the strength and weakness of provision styles in terms of security, maintenance, performance, and dependency, etc. Push Polling Table 2. Comparison of data provision styles Strength -High security in system connection between systems of institutions. -Independent connection with external systems in system operation. -Information providers lead connection. -Because information collectors lead information management is easily implemented according to information collection policies. -Immediate data collection is ensured. Weakness -Because information providers lead information management of systems to be connected is not easy. -Information connection varies with institution by institution, maintenance is not easy. -Security is vulnerable in system connection. -Because performance may be affected by connection with external systems in system operation, information providers do not like this method. 3 Analysis of the NTIS connection system We analyzed the case of NTIS. The NTIS established an information connection system with research management systems of representative institutions under government ministries and agencies in order to connect and collect national R&D information. In this case, the push method is applied as a connection method to enable each representative institution to have the right of providing data appropriate for the connection policy and system environment thereof with external systems, and to have the ownership of the data owned by each representative institution. That is, data are provided by means of connection according to a given cycle for data items defined in the national R&D information standard. However, the principle of providing data on a daily basis if data are created is not ensured by adding an approval procedure for data provision to the automatic connection process in actually operating the connection system. Also, although data are provided in the push method, the link method and the unidirectional EAI method are applied to each institution depending on each institution environment. More details are shown in Table 3 to show implemented connection systems in various types. The reason of application is because the method of data provision is determined and implemented in various types according to the preference of each institution (for tasks or system environment) when the push method is applied. This results in no assurance of immediate data provision, and also makes monitoring and operation of the connection system difficult.

3 Table 3. Information connection styles in the NTIS Method Type Description Link EAI View Snapshot Trigger Trigger+ JC Script Procedures Program Direct connection to a in a connection server of an institution. The procedure Inquiry/Send is used. The copy of institution table refreshes the connection server in a given cycle. Trigger is established to reflect relevant changes on the connection server in updating the institution. Trigger is established to reflect relevant changes on the connection server in updating the institution (based on Java, etc.). Uses script to send data from an institution to the connection server in a given cycle. Transmits data from an institution to the connection server table by means of the procedure. Transmits data by means of the EAI program of each ministry (institution) (unidirectional). information is first transferred to the connection from the institution s system. This section is defined as a variation area. Subsequent data processing in the connection and data transmission to the integration is defined as a major function of a common area which can be standardized. Figure 1. Basic steps of information connection Therefore, it is necessary to build the connection platform as a function to overcome variability of each institution in the variation areas and to process the functions in the common area. To this end, the connection platform includes functions of connection rule processing, mapping, connection error processing, and creation of update information and monitoring information. Fig.2 shows system architecture of a connection platform which includes the aforementioned functions. 4 Design of an information connection model using rule-based connection platform The current NTIS information connection system has been established in the P2P style through the link or the unidirectional EAI method as described in the chapter 3. However, it is necessary to improve the connection system in a standardized method for immediate provision, integrity, efficient connection system monitoring and operation of data connection. It is also important to design the method based on easily managable rules. In this study, parts which can be functionally standardized in information connection between the NTIS and specialized institutions under ministries and agencies are identified to design them as a major functional module of the connection platform. We design a rule-based information connection platform to be applied on the NTISlike information connection systems. Based on the platform, we also propose an information connection model. 4.1 Rule-based connection platform Rule-based connection platform should be basically designed on standardization for information connection among heterogeneous systems. The sections from which data are first acquired in connection with each institution are divided into variation areas for the purpose of information connection based on standardization, and the next phases are identified as standard functional areas. That is, as shown in Fig.1, the R&D Figure 2. Rule-based connection platform Fig. 2 shows the connection platform which is composed of rule processing (preactors), connection processing (Workers), and parallel task processing control (Controllers), and which performs connection of the common areas according to the rule predefined in the Rule File. 1 Schema mapping (Mapper): this is carried out between an institution schema and the NTIS standard collection schema according to the schema mapping rule defined in the Rule File for the data transferred from the institution. Code mapping is also carried out from the code value in the institution to the code value in the NTIS integration according to the code mapping rule defined in the Rule File.

4 2 Comparison of data (Comparer, I/U/D Handler): this is to compare the data transferred from an institution with the data transferred in the previous cycle to decide whether to update the data. On the basis of comparison result, the system in the connection institution system displays I(Insert), U(Update), or D(Delete) to indicate that the relevant data is new, updated or deleted data. 3 Connection error processing (Error Checker, Error Handler): this is to check errors in connection, for example, key errors, errors in essential connection items, code conversion errors, data conversion errors, data format errors, data length errors, etc. Details of the checked connection errors are created to be an error. Normal data are then stored as an Org to be transmitted to the NTIS integration. 4 Connection monitoring information creation (Monitor): information is created about whether connection normally operates, for example, the number of connection data, details of updated data, execution of the connection module according to the schedule, or how much new data has been provided. 5 Rule Parser: this enhances data mapping through rule based processing. The Rule Parser interprets the Rule File which specifies schema mapping, code mapping and rules that should be observed when data are provided from an institution to the NTIS. 6 Scheduler: information connection is performed periodically or in real time depending on information type. Therefore, the function to control the information connection execution cycle is provided. Three types of execution scheduling is provided, including manual execution (immediate execution) by an operator, periodical execution and execution after standby for a given period of time in consideration of the features of NTIS connection. 7 Data Cacher: information frequently used, for example, schema information and code mapping tables, is internally cached to improve connection capability. Data are deleted after a given period of time. 8 Operation environment (Controllers): this controls listing tasks to be processed for optimized resource management and function processing by means of multi threads, and to carry out the tasks according to the processing sequence. Controllers also provide access to storages to store the connection result in the or a file. The connection platform designed as such can improve data processing speed through internal data caching. It can enhance data mapping through rule-based data processing, and can operate and maintain the connection system by producing/changing rules. It sorts data sources from targets to manage data history, and systematically checks data errors. It can address difficulty in connection monitoring due to different connection methods between institutions, and processes data update information. 4.2 Information connection model using rulebased connection platform On the basis of the rule-based connection platform designed in 4.1, information connections in the push method, and in the EAI method or the polling method by agents can be implemented. Therefore, two types of information connection models were designed and the two types of connection models were compared with respect to the important issues considered in information connection by the NTIS with the representative specialized institutions. 1 P2P & Push method using the connection platform For standardized information connection, the connection platform was defined, which processes the information connection rule, performs encryption, and creates connection error and monitoring information. The connection standard platform contributes to addressing limitations by different information connection methods of each institution. That is, although each institution provides data in a different method (entire relevant data or some of changed data), it is possible to identify details of data change, and to create consistent error and monitoring information. Consistent connection also contributes to easy management of information connection. This connection method, however, can provide data to a connection system at times desired by an institution. Fig.3 shows this method as described above. Figure 3. Connection in P2P & Push method 2 Agent & Polling method using the connection platform This is a method of connection to apply the Polling method which uses an agent to bring institution data while information connection is based on standardization. This method enhances the efficiency of using connection server resources, and ensures the initiative of data collection to ensure immediate data collection. Integrated connection system management can be also implemented. The system for jointly using administrative information employs this method. Fig.4 shows this method as described above.

5 the common area. We also examined methods In this paper we also understand issues or characteristics of the methods through analyzing current information connection methods applied on the NTIS. Therefore, we designed a rule-based information connection platform to be applied on the NTISlike information connection systems. Based on the platform, we also proposed an information connection model. Figure 4 Connection in Agent & Polling method Finally, Table 4 shows the strength and weakness of two connection methods in information connection. Of course, most external connection institutions prefer connection by the P2P & Push methods because security is a key factor to determine their connection method. However, in consideration of the strength described in Table 4, it is necessary to employ a connection method which implements the aforementioned strength. Therefore, in this study, the method of Agent & Polling using rule-based connection platform is suggested for future NTIS information connection. To this end, it is necessary to establish schemes for strengthening security, and to establish access supported by policies and strategies. Table 4. Comparison of the connection methods It is necessary to expand rule-based connection platform to establish a flexible and extensible connection system. In addition, it is necessary to develop a connection guideline for standardizing information connection. 6 References [1] NTIS, National Science and Technology Information Service, [2] Choi, H., etc, "Study on Real-time Integration System Extension of National R&D Information", Korea Computer Congress, [3] Nah, Y., ESB-based Data Service Connection" [4] Choi, H. etc, Technology Trends on Information Connection, Technical Reports, KISTI, Connection speed Storage capacity Management efficiency Immediate connection Security P2P & Push Same Great *Because each institution uses its own data provision method, data pre-processing is thus required. Because information providers are the subject of information management is not easy. Not ensured. Relatively high (in terms of institution systems) Agent & Polling Same Not great Because information collectors are the subject of information connection, integrated management is easy. Ensured Relatively low (in terms of institution systems) 5 Conclusions and future works This study examined methods or styles of information connection and compare strength and weakness of connection methods. We also analyzed the current NTIS information connection system established with representative specialized institutions under government ministries and agencies. On the basis of this, the variation area and the common area were identified to design a connection platform for the functions of

EUROPASS DIPLOMA SUPPLEMENT TO HIGHER TECHNICAL VOCATIONAL TRAINING

EUROPASS DIPLOMA SUPPLEMENT TO HIGHER TECHNICAL VOCATIONAL TRAINING EUROPASS DIPLOMA SUPPLEMENT TO HIGHER TECHNICAL VOCATIONAL TRAINING TITLE OF THE DIPLOMA (ES) Técnico Superior en Desarrollo de Aplicaciones Web TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician

More information

A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3

A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 Choong Seon Hong and Joon Heo School of Electronics and Information, Kyung Hee University 1 Seocheon,

More information

Signavio Process Manager. Collaborative process design for the entire organization

Signavio Process Manager. Collaborative process design for the entire organization Signavio Process Manager Collaborative process design for the entire organization www.signavio.com Signavio Content 01 02 03 04 05 06 07 08 09 10 QuickModel BPMN 2.0 Team Collaboration Modeling Conventions

More information

Annex G ITL Administrator Application

Annex G ITL Administrator Application Annex G ITL Administrator Application Table of contents Table of contents... 1 1. System Overview... 5 1.1 Technical Architecture... 5 1.2 Security... 5 1.3 ITL Menu... 6 2. Core Functionality... 7 2.1

More information

iii) Activity Definitions

iii) Activity Definitions iii) Activity Definitions A0, Preserve Electronic Records Under the control of Archival and Institutional Requirements, and limited by the possibilities available within the State of the Art of Information

More information

A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments

A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments Hyung-Jun Yim and Kyu-Chul Lee * Dept. of Computer Engineering, Chungnam National University 220 Gung-Dong, Yuseong-Gu,

More information

Comodo Offline Updater Utility Software Version

Comodo Offline Updater Utility Software Version Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to

More information

Administrator Guide. Regions itreasury. Administrator Guide

Administrator Guide. Regions itreasury. Administrator Guide Administrator Guide Regions itreasury Administrator Guide Revised 082011 itreasury Administrator Guide Welcome to Regions itreasury. This Guide contains information about all administrative duties associated

More information

Entergy Arkansas, Inc. Transition Plan Technical Conference #1

Entergy Arkansas, Inc. Transition Plan Technical Conference #1 Entergy Arkansas, Inc. Transition Plan Technical Conference #1 May 5, 2010 1 Why Technical Conferences? Complex subject matter Venue for stakeholders to develop an awareness and understanding of the issues

More information

Building UAE s cyber security resilience through effective use of technology, processes and the local people.

Building UAE s cyber security resilience through effective use of technology, processes and the local people. WHITEPAPER Security Requirement WE HAVE THE IN-HOUSE DEPTH AND BREATH OF INFORMATION AND CYBER SECURIT About Us CyberGate Defense (CGD) is a solution provider for the full spectrum of Cyber Security Defenses

More information

IBM 00M passed

IBM 00M passed IBM 00M-646 - passed Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ IBM 00M-646 IBM WebSphere Sales Mastery Test v5 Version: 4.0 QUESTION NO: 1 Per

More information

Framework of a Conceptual Simulation Model Design Tool

Framework of a Conceptual Simulation Model Design Tool Indian Journal of Science and Technology, Vol 8(S7), 435 442, April 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS7/70470 Framework of a Conceptual Simulation Model

More information

Configuring Job Monitoring in SAP Solution Manager 7.2

Configuring Job Monitoring in SAP Solution Manager 7.2 How-To Guide SAP Solution Manager Document Version: 1.0 2017-05-31 Configuring Job Monitoring in SAP Solution Manager 7.2 Typographic Conventions Type Style Example Example EXAMPLE Example Example

More information

Activities toward Wireless LAN Operation Service

Activities toward Wireless LAN Operation Service OKANOUE Kazuhiro, EBATA Koichi Abstract Wireless LAN is suitable for an access network to Unified Communications in the intranet. In enterprise environments, however, their usual events can degrade the

More information

Essential Features of an Integration Solution

Essential Features of an Integration Solution Essential Features of an Integration Solution September 2017 WHITE PAPER Essential Features of an Integration Solution When an enterprise uses multiple applications, it needs to connect them for a variety

More information

A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System

A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System , pp.197-202 http://dx.doi.org/10.14257/astl.2014.51.45 A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System Young-Kwan Choi 1,1, In-Soo Kim 1, Sung-Taek

More information

Cycle accurate transaction-driven simulation with multiple processor simulators

Cycle accurate transaction-driven simulation with multiple processor simulators Cycle accurate transaction-driven simulation with multiple processor simulators Dohyung Kim 1a) and Rajesh Gupta 2 1 Engineering Center, Google Korea Ltd. 737 Yeoksam-dong, Gangnam-gu, Seoul 135 984, Korea

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

Oracle Exam 1z0-478 Oracle SOA Suite 11g Certified Implementation Specialist Version: 7.4 [ Total Questions: 75 ]

Oracle Exam 1z0-478 Oracle SOA Suite 11g Certified Implementation Specialist Version: 7.4 [ Total Questions: 75 ] s@lm@n Oracle Exam 1z0-478 Oracle SOA Suite 11g Certified Implementation Specialist Version: 7.4 [ Total Questions: 75 ] Question No : 1 Identify the statement that describes an ESB. A. An ESB provides

More information

Evaluation of Long-Held HTTP Polling for PHP/MySQL Architecture

Evaluation of Long-Held HTTP Polling for PHP/MySQL Architecture Evaluation of Long-Held HTTP Polling for PHP/MySQL Architecture David Cutting University of East Anglia Purplepixie Systems David.Cutting@uea.ac.uk dcutting@purplepixie.org Abstract. When a web client

More information

Data Policy. Actionable Data, Part I. Feature Guide

Data Policy. Actionable Data, Part I. Feature Guide Feature Guide Data Policy Actionable Data, Part I Data Policy... 2 How it Works... 2 Activation Triggers... 2 Calendar-Based Activation... 2 Action-Based Activation... 3 Activation Sequence... 3 Actions...

More information

A study on accessibility to mobile websites - Centering on public institution mobile websites in Korea -

A study on accessibility to mobile websites - Centering on public institution mobile websites in Korea - , pp.140-144 http://dx.doi.org/10.14257/astl.2013 A study on accessibility to mobile websites - Centering on public institution mobile websites in Korea - Eunju Park 1-1, Yangwon Lim 1, Hankyu Lim 1 1

More information

Joram configuration from clustering to WAN distribution

Joram configuration from clustering to WAN distribution Joram configuration from clustering to WAN distribution Serge Lacourte ScalAgent Distributed Technologies Serge.Lacourte@scalagent.com www.scalagent.com 2 Outline MOMs & Joram UC1: car certificates UC2:

More information

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust Wise Athena Security Team Contents Abstract... 3 Security, privacy and trust... 3 Artificial Intelligence in the cloud and

More information

IMT Standards. Standard number A Server Blade. GoA IMT Standards

IMT Standards. Standard number A Server Blade. GoA IMT Standards IMT Standards IMT Standards Oversight Committee Effective Date: 2014-01-17 Scheduled Review: 2015-01-17 Last Reviewed: 2014-01-06 Type: Technical Standard number A000006 Server Blade Category: Hardware

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing

More information

Glossary Construction of Scientific and Technical Term by using Wikipedia

Glossary Construction of Scientific and Technical Term by using Wikipedia Indian Journal of Science and Technology, Vol 8(27), DOI:10.17485/ijst/2015/v8i27/81057, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Glossary Construction of Scientific and Technical

More information

Secure Development Lifecycle

Secure Development Lifecycle Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.

More information

SAS Clinical Data Integration Server 2.1

SAS Clinical Data Integration Server 2.1 SAS Clinical Data Integration Server 2.1 User s Guide Preproduction Documentation THIS DOCUMENT IS A PREPRODUCTION DRAFT AND IS PROVIDED BY SAS INSTITUTE INC. ON AN AS IS BASIS WITHOUT WARRANTY OF ANY

More information

COURSE OUTCOMES OF M.Sc(IT)

COURSE OUTCOMES OF M.Sc(IT) COURSE OUTCOMES OF M.Sc(IT) Sr. No Subject Code Subject Name Sem-I CO Status Course Outcomes 1. A304101 PROGRAMMING USING C 2. A304102 FUNDAMENTALS OF COMPUTER & INFORMATION TECHNOLOGIES CO1 CO2 Understands

More information

Integration Framework. Architecture

Integration Framework. Architecture Integration Framework 2 Architecture Anyone involved in the implementation or day-to-day administration of the integration framework applications must be familiarized with the integration framework architecture.

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

Research and Application of Unstructured Data Acquisition and Retrieval Technology

Research and Application of Unstructured Data Acquisition and Retrieval Technology 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Research and Application of Unstructured Data Acquisition and Retrieval Technology Zhenjiang Lei1,*, Lin Qiao2, Lina

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

MARKET PROCESS DESIGN. MPD 05 - Market Process for New NQH Metered Connection

MARKET PROCESS DESIGN. MPD 05 - Market Process for New NQH Metered Connection MARKET PROCESS DESIGN MPD 05 - Market Process for New NQH Metered Connection TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1 SCOPE... 3 1.2 HISTORY OF CHANGES... 3 2. PROCESS MAP... 5 2.1 PROCESS DESCRIPTION...

More information

ITM DEVELOPMENT (ITMD)

ITM DEVELOPMENT (ITMD) ITM Development (ITMD) 1 ITM DEVELOPMENT (ITMD) ITMD 361 Fundamentals of Web Development This course will cover the creation of Web pages and sites using HTML, CSS, Javascript, jquery, and graphical applications

More information

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 3rd International Conference on Management, Education Technology and Sports Science (METSS 2016) Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 1 Basic Teaching

More information

Visual Web Next Design Concepts. Winston Prakash Feb 12, 2008

Visual Web Next Design Concepts. Winston Prakash Feb 12, 2008 Visual Web Next Design Concepts Winston Prakash Feb 12, 2008 Some Notations Used Page - A web page being designed such as HTML, JSP, JSF, PHP etc. Page definition Language (PDL) - Language that used to

More information

Wireless Internet Tutoring System Design Document. Nadya Belov, Dmitriy Bespalov, Ilya Braude, Immanuel Comer, Daniel Lapadat, Andrew Ragone

Wireless Internet Tutoring System Design Document. Nadya Belov, Dmitriy Bespalov, Ilya Braude, Immanuel Comer, Daniel Lapadat, Andrew Ragone Wireless Internet Tutoring System Design Document Nadya Belov, Dmitriy Bespalov, Ilya Braude, Immanuel Comer, Daniel Lapadat, Andrew Ragone Contents Introduction 4. Goals and Guidelines........................................

More information

Total cost of ownership for application replatform by open-source SW

Total cost of ownership for application replatform by open-source SW Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 91 (2016 ) 677 682 Information Technology and Quantitative Management (ITQM 2016) Total cost of ownership for application

More information

Chapter 18: Parallel Databases Chapter 19: Distributed Databases ETC.

Chapter 18: Parallel Databases Chapter 19: Distributed Databases ETC. Chapter 18: Parallel Databases Chapter 19: Distributed Databases ETC. Introduction Parallel machines are becoming quite common and affordable Prices of microprocessors, memory and disks have dropped sharply

More information

High Availability Distributed (Micro-)services. Clemens Vasters Microsoft

High Availability Distributed (Micro-)services. Clemens Vasters Microsoft High Availability Distributed (Micro-)services Clemens Vasters Microsoft Azure @clemensv ice Microsoft Azure services I work(-ed) on. Notification Hubs Service Bus Event Hubs Event Grid IoT Hub Relay Mobile

More information

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7

More information

Developing with VMware vcenter Orchestrator

Developing with VMware vcenter Orchestrator Developing with VMware vcenter Orchestrator vcenter Orchestrator 4.2.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide

Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide This IBM Redbooks Solution Guide describes the existing and new aspects of IBM CICS Transaction Server that allow

More information

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012 Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article

More information

Database Server. 2. Allow client request to the database server (using SQL requests) over the network.

Database Server. 2. Allow client request to the database server (using SQL requests) over the network. Database Server Introduction: Client/Server Systems is networked computing model Processes distributed between clients and servers. Client Workstation (usually a PC) that requests and uses a service Server

More information

A Communication Middleware with Unified Data Transmission Interface

A Communication Middleware with Unified Data Transmission Interface Communications and Network, 2013, 5, 34-38 doi:10.4236/cn.2013.51b009 Published Online February 2013 (http://www.scirp.org/journal/cn) A Communication Middleware with Unified Data Transmission Interface

More information

A Virtual-Synchronized-File Based Privacy Protection System

A Virtual-Synchronized-File Based Privacy Protection System Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System

More information

Improvement of Basic Functions for Visualizing Schedule and 3D Object in 4D CAD System

Improvement of Basic Functions for Visualizing Schedule and 3D Object in 4D CAD System CIB World Building Congress 2007 3009 CIB2007-373 Improvement of Basic Functions for Visualizing Schedule and 3D Object in 4D CAD System Leen-Seok Kang, Seo-Young Park, Hyoun-Seok Moon, Chang-Hak Kim (Corresponding

More information

IBM z/os Management Facility V2R1 Solution Guide IBM Redbooks Solution Guide

IBM z/os Management Facility V2R1 Solution Guide IBM Redbooks Solution Guide IBM z/os Management Facility V2R1 Solution Guide IBM Redbooks Solution Guide z/osmf is a product for IBM z/os that simplifies, optimizes, and modernizes the z/os system programmer experience. z/osmf delivers

More information

A Study of Developing Virtual Prototyping by using JavaBean interface Tool and SystemC Engine 1

A Study of Developing Virtual Prototyping by using JavaBean interface Tool and SystemC Engine 1 A Study of Developing Virtual Prototyping by using JavaBean interface Tool and SystemC Engine 1 Husni Teja Sukmana, Jeong B. Lee, Jong Il Kim, Young J. Jung, B.Kwon, Kee W. Rim, Young R. Lee Jin 1 Sun

More information

Co-Ordinated Retail Market Message Guide

Co-Ordinated Retail Market Message Guide Co-Ordinated Retail Market Message Guide ROI Implementation Market Gateway Activity Document Information Business Area: Status: Author/s: ESB Networks Final ESBN Version Number: 3.1 Reason for Change Co-Ordinated

More information

Community Edition. Web User Interface 3.X. User Guide

Community Edition. Web User Interface 3.X. User Guide Community Edition Talend MDM Web User Interface 3.X User Guide Version 3.2_a Adapted for Talend MDM Web User Interface 3.2 Web Interface User Guide release. Copyright This documentation is provided under

More information

Acronis Data Cloud plugin for ConnectWise Automate

Acronis Data Cloud plugin for ConnectWise Automate Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING

AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING StorageCentral: Architecture Overview AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING For Windows Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS

More information

Ontology-based Integration and Refinement of Evaluation-Committee Data from Heterogeneous Data Sources

Ontology-based Integration and Refinement of Evaluation-Committee Data from Heterogeneous Data Sources Indian Journal of Science and Technology, Vol 8(23), DOI: 10.17485/ijst/2015/v8i23/79342 September 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Ontology-based Integration and Refinement of Evaluation-Committee

More information

REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM

REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM Ghassan Z. Qadah American University of Sharjah United Arab Emerites ABSTRACT The rapid advancement in database, web and wireless technologies

More information

Leakage Pattern Monitoring Method of CEP based Water Supply Block System

Leakage Pattern Monitoring Method of CEP based Water Supply Block System Indian Journal of Science and Technology, Vol 8(27), DOI:10.17485/ijst/2015/v8i27/81054, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Leakage Pattern Monitoring Method of CEP based Water

More information

Windows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft

Windows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Windows 10 Management Technologies: What s New Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Business needs are evolving. Windows 10 offers to meet those needs. MANAGEMENT CHOICES

More information

MIS5206-Section Protecting Information Assets-Exam 1

MIS5206-Section Protecting Information Assets-Exam 1 Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines

More information

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Preliminary Research on Distributed Cluster Monitoring of G/S Model Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring

More information

Forensic Information Data Exchange (FIDEX) Implementation Guide

Forensic Information Data Exchange (FIDEX) Implementation Guide Forensic Information Data Exchange () Implementation Guide 2008 IJ CX K405 May 5, 2010 The NFSTC is pleased to submit this Implementation Guide to the United States Department of Justice, Office of Justice

More information

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3

More information

FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details

FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details 2 FPM IT 420B: FAC P/PM IT Planning & Acquiring Operations of IT Systems FPM-IT-420B: FAC-P/PM-IT PLANNING & ACQUIRING

More information

Metadata Management System (MMS)

Metadata Management System (MMS) Metadata Management System (MMS) Norhaizan Mat Talha MIMOS Berhad, Technology Park, Kuala Lumpur, Malaysia Mail:zan@mimos.my Abstract: Much have been said about metadata which is data about data used for

More information

About Wipro: As, you can understand it is such a great organization. The recruitment procedure is standard. Thus one needs to prepare well.

About Wipro: As, you can understand it is such a great organization. The recruitment procedure is standard. Thus one needs to prepare well. About Wipro: Wipro is a multinational IT services company providing, IT services, infrastructure, networks company. The Wipro initiative was initiated on 29th December 1945. At the time the company was

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Section 508 Assessment and Voluntary Product Accessibility Template (VPAT ) Development for VMware. VMware View 4.0 Report

Section 508 Assessment and Voluntary Product Accessibility Template (VPAT ) Development for VMware. VMware View 4.0 Report Section 508 Assessment and Voluntary Product Accessibility Template (VPAT ) Development for VMware VMware View 4.0 Report December 18, 2009 SUBMITTED BY: Rockville Commerce Center Building A, Unit 1 2410

More information

SAS Clinical Data Integration 2.6

SAS Clinical Data Integration 2.6 SAS Clinical Data Integration 2.6 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS Clinical Data Integration 2.6: User's Guide.

More information

Using the Internet and the World Wide Web

Using the Internet and the World Wide Web Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify

More information

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

General Data Protection Regulation (GDPR) and the Implications for IT Service Management General Data Protection Regulation (GDPR) and the Implications for IT Service Management August 2018 WHITE PAPER GDPR: What is it? The EU General Data Protection Regulation (GDPR) replaces the Data Protection

More information

Network Intrusion Prevention System Protection Profile V1.1 Certification Report

Network Intrusion Prevention System Protection Profile V1.1 Certification Report KECS-CR-2005-04 Network Intrusion Prevention System Protection Profile V1.1 Certification Report Certification No. : CC-20-2005.12 12, 2005 National Intelligence Service This document is the certification

More information

A Graphical Data Management System for HDL-Based ASIC Design Projects

A Graphical Data Management System for HDL-Based ASIC Design Projects A Graphical Data Management System for HDL-Based ASIC Design Projects Claus Mayer, Hans Sahm, Jörg Pleickhardt Lucent Technologies Bell Labs Innovations Thurn-und-Taxis-Str.10, D-90411 Nürnberg, Germany

More information

SUSTAINABLE ELECTRIFICATION OF HEALTH FACILITIES: UGANDA

SUSTAINABLE ELECTRIFICATION OF HEALTH FACILITIES: UGANDA Project Information Sheet SUSTAINABLE ELECTRIFICATION OF HEALTH FACILITIES: UGANDA This project information sheet provides an overview of the activities planned under the Sustainable Electrification of

More information

Super-Peer Architectures for Distributed Computing

Super-Peer Architectures for Distributed Computing Whitepaper Super-Peer Architectures for Distributed Computing Fiorano Software, Inc. 718 University Avenue, Suite 212 Los Gatos, CA 95032 U.S.A. +1.408.354.3210 email info@fiorano.com www.fiorano.com Entire

More information

A national valuation database as a risk assessment tool

A national valuation database as a risk assessment tool A national valuation database as a risk assessment tool Let s talk Your guidelines Guidelines on the development and use of a national valuation database as a risk assessment tool Publisher World Customs

More information

IT Security Evaluation and Certification Scheme Document

IT Security Evaluation and Certification Scheme Document IT Security Evaluation and Certification Scheme Document June 2015 CCS-01 Information-technology Promotion Agency, Japan (IPA) IT Security Evaluation and Certification Scheme (CCS-01) i / ii Table of Contents

More information

fips185 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology

fips185 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 185 1994 February 9 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology ESCROWED ENCRYPTION STANDARD CATEGORY: TELECOMMUNICATIONS

More information

What s new in Transaction Perspective (TxP) 10 and KITE 4.0

What s new in Transaction Perspective (TxP) 10 and KITE 4.0 What s new in Transaction Perspective (TxP) 10 and KITE 4.0 What s new in TxP 10 and KITE 4.0 October 6, 2010 Page 1 of 17 Table of Contents What s new in Transaction Perspective (TxP) 10 and KITE 4.0...

More information

CAKEDC GIT WORKFLOW. CakeDC Git Workflow is a project development and release work flow which provides a

CAKEDC GIT WORKFLOW. CakeDC Git Workflow is a project development and release work flow which provides a CAKEDC GIT WORKFLOW CakeDC Git Workflow is a project development and release work flow which provides a development and release cycle based on key phases: Development: All active development is driven

More information

Release Date June 21, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA

Release Date June 21, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA Adeptia Suite 5.2 Getting Started Guide Release Date June 21, 2011 Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA Copyright Copyright 2000-2009 Adeptia, Inc. All rights reserved. Trademarks

More information

An Approach to Quality Achievement at the Architectural Level: AQUA

An Approach to Quality Achievement at the Architectural Level: AQUA An Approach to Quality Achievement at the Level: AQUA Heeseok Choi 1, Keunhyuk Yeom 2, Youhee Choi 3, and Mikyeong Moon 2 1 NTIS Organization, Korea Institute of Science and Technology Information Eoeun-dong

More information

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling

More information

DYNAMIC CONFIGURATION OF COLLABORATION IN NETWORKED ORGANISATIONS

DYNAMIC CONFIGURATION OF COLLABORATION IN NETWORKED ORGANISATIONS 22 DYNAMIC CONFIGURATION OF COLLABORATION IN NETWORKED ORGANISATIONS Brian Shields and Owen Molloy Department of Information Technology, National University of Ireland, Galway, IRELAND. brian.shields@geminga.it.nuigalway.ie,

More information

Reform: A Domain Specific Language

Reform: A Domain Specific Language Reform: A Domain Specific Language Dustin Graves October 5, 2007 Overview Scripting language Monitors and manages data streams Network, File, RS-232, etc Reformats and redirects data Contains keywords

More information

Design and Implementation of the Omni Media Content Production and Service Platform

Design and Implementation of the Omni Media Content Production and Service Platform Design and Implementation of the Omni Media Content Production and Service Platform Shi-Min Liu1,a, Ling-Jun Yang1 and San-Xing Cao2 1 Information Engineering school, Communication University of China,

More information

Operating- System Structures

Operating- System Structures Operating- System Structures 2 CHAPTER Practice Exercises 2.1 What is the purpose of system calls? Answer: System calls allow user-level processes to request services of the operating system. 2.2 What

More information

Study on XML-based Heterogeneous Agriculture Database Sharing Platform

Study on XML-based Heterogeneous Agriculture Database Sharing Platform Study on XML-based Heterogeneous Agriculture Database Sharing Platform Qiulan Wu, Yongxiang Sun, Xiaoxia Yang, Yong Liang,Xia Geng School of Information Science and Engineering, Shandong Agricultural University,

More information

IBM emessage Version 9 Release 1 February 13, User's Guide

IBM emessage Version 9 Release 1 February 13, User's Guide IBM emessage Version 9 Release 1 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 471. This edition applies to version

More information

IBM API Connect: Introduction to APIs, Microservices and IBM API Connect

IBM API Connect: Introduction to APIs, Microservices and IBM API Connect IBM API Connect: Introduction to APIs, Microservices and IBM API Connect Steve Lokam, Sr. Principal at OpenLogix @openlogix @stevelokam slokam@open-logix.com (248) 869-0083 What do these companies have

More information

Salesforce Classic Mobile User Guide for Android

Salesforce Classic Mobile User Guide for Android Salesforce Classic Mobile User Guide for Android Version 41.0, Winter 18 @salesforcedocs Last updated: November 21, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

OpenAPI-based Message Router for Mashup Service Development

OpenAPI-based Message Router for Mashup Service Development OpenAPI-based Message Router for Mashup Service Development Doyoung Lee, Seyeon Jeong, James Won-Ki Hong Department of Computer Science and Engineering, POSTECH, Korea {dylee90, jsy0906, jwkhong}@postech.ac.kr

More information

3.4 Data-Centric workflow

3.4 Data-Centric workflow 3.4 Data-Centric workflow One of the most important activities in a S-DWH environment is represented by data integration of different and heterogeneous sources. The process of extract, transform, and load

More information

Click to edit Master title style

Click to edit Master title style Federal Risk and Authorization Management Program Presenter Name: Peter Mell, Initial FedRAMP Program Manager FedRAMP Interagency Effort Started: October 2009 Created under the Federal Cloud Initiative

More information

Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment

Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1073-1089 (2011) Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment SEOK-KYOO KIM 1,

More information

Colburn Community Primary School ICT and Computing Policy

Colburn Community Primary School ICT and Computing Policy Colburn Community Primary School ICT and Computing Policy Introduction The use of information and communication technology is an integral part of the national curriculum and is a key skill for everyday

More information