A Study on Information Connection Model using Rulebased Connection Platform
|
|
- Liliana Edwards
- 5 years ago
- Views:
Transcription
1 A Study on Information Connection Model using Rulebased Connection Platform Heeseok Choi, Jaesoo Kim NTIS Center, Korea Institute of Science and Technology Information, Daejeon, Korea Abstract - National Science & Technology Information Service (NTIS) collects national R&D information through the connection system in real time with specialized institutions under government ministries for R&D information service. However, because the information connection between the research management systems in each ministry (institution) and the NTIS is different, it is not easy to operate the connection system, and immediate data collection is thus not ensured. This study aims to propose an information connection model to be applied on the NTIS-like systems. To do this, we examine methods or styles of information connection and compare strength and weakness of connection methods. In this paper we also understand issues or characteristics of the methods through analyzing current information connection methods applied on the NTIS. Therefore, we design a rule-based information connection platform to minimize the information connection issues. Based on the platform, we also propose an information connection model. Keywords: Information Connection, Information Sharing, Rule-based Connection, NTIS 1 Introduction National Science & Technology Information Service (NTIS) was developed for improving efficient research and development throughout the cycle from planning R&D to using the outcome thereof [1]. For this purpose, each representative institution under the government ministries and agencies comprehensively manages its R&D information for connection with the NTIS for the purpose of real-time collection of national R&D information (periodical update when collecting and changing the information at the time of project agreement). The NTIS has currently built a real-time connection system with representative institutions under government ministries and agencies [2]. However, since the connection criteria of each institution with external systems are different, the NTIS is connected with the research management system of each institution in various manners, to collect R&D information. Accordingly, immediate data collection is not ensured, and various manners of connection contribute to inefficient operation/maintenance. This study aims to propose an information connection model to be applied on the NTIS-like systems. To do this, we examine methods or styles of information connection and compare strength and weakness of connection methods. In this paper we also understand issues or characteristics of the methods through analyzing current information connection methods applied on the NTIS. Therefore, we design a rulebased information connection platform to minimize the information connection issues. Based on the platform, we also propose an information connection model to be applied on the NTIS-like systems. 2 Related works 2.1 Technologies of information connection For information connection between systems, P2P, EAI, ESB or combinations thereof are currently applied [3]. Features and characteristics of each method are described below. 1 P2P: 1:1 connection between individual systems, and cannot be extended or reused. However, because connection between individual systems is simple, a connection system is easily built in conformity with features of each system. 2 EAI: Individual applications are connected to the central hub by means of an adapter, and are connected to other applications through the central hub. This significantly improves typical complex connections. However, this method uses vender-dependent technology and adapter costs should be paid for each connected application. 3 ESB: This method was developed to avoid weakness of non-standard EAI (Hub & Spoke) and SPOF (Single Point Of Failure). However, because the current ESB solution market is controlled by the EAI solution providers, the tendency is that the previous EAI solutions are supplemented and developed. In general, this method is used for service connection. Table 1 describes the strength and weakness of each technology in terms of complexity, extensibility, flexibility, and integration cost, etc.
2 P2P EAI ESB Table 1. Comparison of connection technologies Strength -Easy application to simple interworking between systems in a non-complex environment. -Easy extension in introducing new applications. -Increased productivity and convenience for development and maintenance. -Reduced integration cost because standard technology is used and service units can be reused. -Loose connection in a bus type contributes to high extension capability and flexibility. Weakness -As the number of systems to be connected increases, the cost for maintenance may sharply increase. -Low extension capability and flexibility. -High cost of establishment and maintenance. -Central hub failure affects the entire system. (Single Point of Failure) -High cost of initial establishment. 2.2 Styles of data provision (collection) When systems of other organizations are connected, independency of system operation and system/data security of the organizations can be also an important issue. Therefore, the subject of data provision (collection) can be considered as an important factor in building and operatiing a connection system. Connection depending on the subject of data provision (collection) is divided into the push method and the polling method [4]. 1 Push method: an information source (information provider) who owns and manages original information pushes data into information targets (information consumers) in a given cycle according to the information provision policy. Therefore, information connection in this method is by a subject of information provision who leads information connection. This method is in favor of operation and security of data and institution systems for information providers, but does not ensure immediate information collection for information providers. 2 Polling method: this is to access information providers (systems for information sources) when an information collector requires the information to bring required information. Therefore, this is a method of connection in which the subject of information collection leads information connection. This method ensures immediate information collection, but is not preferred by information providers in terms of operation independency and security of internal systems because information sources are directly accessed from external systems. Table 2 describes the strength and weakness of provision styles in terms of security, maintenance, performance, and dependency, etc. Push Polling Table 2. Comparison of data provision styles Strength -High security in system connection between systems of institutions. -Independent connection with external systems in system operation. -Information providers lead connection. -Because information collectors lead information management is easily implemented according to information collection policies. -Immediate data collection is ensured. Weakness -Because information providers lead information management of systems to be connected is not easy. -Information connection varies with institution by institution, maintenance is not easy. -Security is vulnerable in system connection. -Because performance may be affected by connection with external systems in system operation, information providers do not like this method. 3 Analysis of the NTIS connection system We analyzed the case of NTIS. The NTIS established an information connection system with research management systems of representative institutions under government ministries and agencies in order to connect and collect national R&D information. In this case, the push method is applied as a connection method to enable each representative institution to have the right of providing data appropriate for the connection policy and system environment thereof with external systems, and to have the ownership of the data owned by each representative institution. That is, data are provided by means of connection according to a given cycle for data items defined in the national R&D information standard. However, the principle of providing data on a daily basis if data are created is not ensured by adding an approval procedure for data provision to the automatic connection process in actually operating the connection system. Also, although data are provided in the push method, the link method and the unidirectional EAI method are applied to each institution depending on each institution environment. More details are shown in Table 3 to show implemented connection systems in various types. The reason of application is because the method of data provision is determined and implemented in various types according to the preference of each institution (for tasks or system environment) when the push method is applied. This results in no assurance of immediate data provision, and also makes monitoring and operation of the connection system difficult.
3 Table 3. Information connection styles in the NTIS Method Type Description Link EAI View Snapshot Trigger Trigger+ JC Script Procedures Program Direct connection to a in a connection server of an institution. The procedure Inquiry/Send is used. The copy of institution table refreshes the connection server in a given cycle. Trigger is established to reflect relevant changes on the connection server in updating the institution. Trigger is established to reflect relevant changes on the connection server in updating the institution (based on Java, etc.). Uses script to send data from an institution to the connection server in a given cycle. Transmits data from an institution to the connection server table by means of the procedure. Transmits data by means of the EAI program of each ministry (institution) (unidirectional). information is first transferred to the connection from the institution s system. This section is defined as a variation area. Subsequent data processing in the connection and data transmission to the integration is defined as a major function of a common area which can be standardized. Figure 1. Basic steps of information connection Therefore, it is necessary to build the connection platform as a function to overcome variability of each institution in the variation areas and to process the functions in the common area. To this end, the connection platform includes functions of connection rule processing, mapping, connection error processing, and creation of update information and monitoring information. Fig.2 shows system architecture of a connection platform which includes the aforementioned functions. 4 Design of an information connection model using rule-based connection platform The current NTIS information connection system has been established in the P2P style through the link or the unidirectional EAI method as described in the chapter 3. However, it is necessary to improve the connection system in a standardized method for immediate provision, integrity, efficient connection system monitoring and operation of data connection. It is also important to design the method based on easily managable rules. In this study, parts which can be functionally standardized in information connection between the NTIS and specialized institutions under ministries and agencies are identified to design them as a major functional module of the connection platform. We design a rule-based information connection platform to be applied on the NTISlike information connection systems. Based on the platform, we also propose an information connection model. 4.1 Rule-based connection platform Rule-based connection platform should be basically designed on standardization for information connection among heterogeneous systems. The sections from which data are first acquired in connection with each institution are divided into variation areas for the purpose of information connection based on standardization, and the next phases are identified as standard functional areas. That is, as shown in Fig.1, the R&D Figure 2. Rule-based connection platform Fig. 2 shows the connection platform which is composed of rule processing (preactors), connection processing (Workers), and parallel task processing control (Controllers), and which performs connection of the common areas according to the rule predefined in the Rule File. 1 Schema mapping (Mapper): this is carried out between an institution schema and the NTIS standard collection schema according to the schema mapping rule defined in the Rule File for the data transferred from the institution. Code mapping is also carried out from the code value in the institution to the code value in the NTIS integration according to the code mapping rule defined in the Rule File.
4 2 Comparison of data (Comparer, I/U/D Handler): this is to compare the data transferred from an institution with the data transferred in the previous cycle to decide whether to update the data. On the basis of comparison result, the system in the connection institution system displays I(Insert), U(Update), or D(Delete) to indicate that the relevant data is new, updated or deleted data. 3 Connection error processing (Error Checker, Error Handler): this is to check errors in connection, for example, key errors, errors in essential connection items, code conversion errors, data conversion errors, data format errors, data length errors, etc. Details of the checked connection errors are created to be an error. Normal data are then stored as an Org to be transmitted to the NTIS integration. 4 Connection monitoring information creation (Monitor): information is created about whether connection normally operates, for example, the number of connection data, details of updated data, execution of the connection module according to the schedule, or how much new data has been provided. 5 Rule Parser: this enhances data mapping through rule based processing. The Rule Parser interprets the Rule File which specifies schema mapping, code mapping and rules that should be observed when data are provided from an institution to the NTIS. 6 Scheduler: information connection is performed periodically or in real time depending on information type. Therefore, the function to control the information connection execution cycle is provided. Three types of execution scheduling is provided, including manual execution (immediate execution) by an operator, periodical execution and execution after standby for a given period of time in consideration of the features of NTIS connection. 7 Data Cacher: information frequently used, for example, schema information and code mapping tables, is internally cached to improve connection capability. Data are deleted after a given period of time. 8 Operation environment (Controllers): this controls listing tasks to be processed for optimized resource management and function processing by means of multi threads, and to carry out the tasks according to the processing sequence. Controllers also provide access to storages to store the connection result in the or a file. The connection platform designed as such can improve data processing speed through internal data caching. It can enhance data mapping through rule-based data processing, and can operate and maintain the connection system by producing/changing rules. It sorts data sources from targets to manage data history, and systematically checks data errors. It can address difficulty in connection monitoring due to different connection methods between institutions, and processes data update information. 4.2 Information connection model using rulebased connection platform On the basis of the rule-based connection platform designed in 4.1, information connections in the push method, and in the EAI method or the polling method by agents can be implemented. Therefore, two types of information connection models were designed and the two types of connection models were compared with respect to the important issues considered in information connection by the NTIS with the representative specialized institutions. 1 P2P & Push method using the connection platform For standardized information connection, the connection platform was defined, which processes the information connection rule, performs encryption, and creates connection error and monitoring information. The connection standard platform contributes to addressing limitations by different information connection methods of each institution. That is, although each institution provides data in a different method (entire relevant data or some of changed data), it is possible to identify details of data change, and to create consistent error and monitoring information. Consistent connection also contributes to easy management of information connection. This connection method, however, can provide data to a connection system at times desired by an institution. Fig.3 shows this method as described above. Figure 3. Connection in P2P & Push method 2 Agent & Polling method using the connection platform This is a method of connection to apply the Polling method which uses an agent to bring institution data while information connection is based on standardization. This method enhances the efficiency of using connection server resources, and ensures the initiative of data collection to ensure immediate data collection. Integrated connection system management can be also implemented. The system for jointly using administrative information employs this method. Fig.4 shows this method as described above.
5 the common area. We also examined methods In this paper we also understand issues or characteristics of the methods through analyzing current information connection methods applied on the NTIS. Therefore, we designed a rule-based information connection platform to be applied on the NTISlike information connection systems. Based on the platform, we also proposed an information connection model. Figure 4 Connection in Agent & Polling method Finally, Table 4 shows the strength and weakness of two connection methods in information connection. Of course, most external connection institutions prefer connection by the P2P & Push methods because security is a key factor to determine their connection method. However, in consideration of the strength described in Table 4, it is necessary to employ a connection method which implements the aforementioned strength. Therefore, in this study, the method of Agent & Polling using rule-based connection platform is suggested for future NTIS information connection. To this end, it is necessary to establish schemes for strengthening security, and to establish access supported by policies and strategies. Table 4. Comparison of the connection methods It is necessary to expand rule-based connection platform to establish a flexible and extensible connection system. In addition, it is necessary to develop a connection guideline for standardizing information connection. 6 References [1] NTIS, National Science and Technology Information Service, [2] Choi, H., etc, "Study on Real-time Integration System Extension of National R&D Information", Korea Computer Congress, [3] Nah, Y., ESB-based Data Service Connection" [4] Choi, H. etc, Technology Trends on Information Connection, Technical Reports, KISTI, Connection speed Storage capacity Management efficiency Immediate connection Security P2P & Push Same Great *Because each institution uses its own data provision method, data pre-processing is thus required. Because information providers are the subject of information management is not easy. Not ensured. Relatively high (in terms of institution systems) Agent & Polling Same Not great Because information collectors are the subject of information connection, integrated management is easy. Ensured Relatively low (in terms of institution systems) 5 Conclusions and future works This study examined methods or styles of information connection and compare strength and weakness of connection methods. We also analyzed the current NTIS information connection system established with representative specialized institutions under government ministries and agencies. On the basis of this, the variation area and the common area were identified to design a connection platform for the functions of
EUROPASS DIPLOMA SUPPLEMENT TO HIGHER TECHNICAL VOCATIONAL TRAINING
EUROPASS DIPLOMA SUPPLEMENT TO HIGHER TECHNICAL VOCATIONAL TRAINING TITLE OF THE DIPLOMA (ES) Técnico Superior en Desarrollo de Aplicaciones Web TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician
More informationA Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3
A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 Choong Seon Hong and Joon Heo School of Electronics and Information, Kyung Hee University 1 Seocheon,
More informationSignavio Process Manager. Collaborative process design for the entire organization
Signavio Process Manager Collaborative process design for the entire organization www.signavio.com Signavio Content 01 02 03 04 05 06 07 08 09 10 QuickModel BPMN 2.0 Team Collaboration Modeling Conventions
More informationAnnex G ITL Administrator Application
Annex G ITL Administrator Application Table of contents Table of contents... 1 1. System Overview... 5 1.1 Technical Architecture... 5 1.2 Security... 5 1.3 ITL Menu... 6 2. Core Functionality... 7 2.1
More informationiii) Activity Definitions
iii) Activity Definitions A0, Preserve Electronic Records Under the control of Archival and Institutional Requirements, and limited by the possibilities available within the State of the Art of Information
More informationA Ubiquitous Web Services Framework for Interoperability in Pervasive Environments
A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments Hyung-Jun Yim and Kyu-Chul Lee * Dept. of Computer Engineering, Chungnam National University 220 Gung-Dong, Yuseong-Gu,
More informationComodo Offline Updater Utility Software Version
Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to
More informationAdministrator Guide. Regions itreasury. Administrator Guide
Administrator Guide Regions itreasury Administrator Guide Revised 082011 itreasury Administrator Guide Welcome to Regions itreasury. This Guide contains information about all administrative duties associated
More informationEntergy Arkansas, Inc. Transition Plan Technical Conference #1
Entergy Arkansas, Inc. Transition Plan Technical Conference #1 May 5, 2010 1 Why Technical Conferences? Complex subject matter Venue for stakeholders to develop an awareness and understanding of the issues
More informationBuilding UAE s cyber security resilience through effective use of technology, processes and the local people.
WHITEPAPER Security Requirement WE HAVE THE IN-HOUSE DEPTH AND BREATH OF INFORMATION AND CYBER SECURIT About Us CyberGate Defense (CGD) is a solution provider for the full spectrum of Cyber Security Defenses
More informationIBM 00M passed
IBM 00M-646 - passed Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ IBM 00M-646 IBM WebSphere Sales Mastery Test v5 Version: 4.0 QUESTION NO: 1 Per
More informationFramework of a Conceptual Simulation Model Design Tool
Indian Journal of Science and Technology, Vol 8(S7), 435 442, April 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS7/70470 Framework of a Conceptual Simulation Model
More informationConfiguring Job Monitoring in SAP Solution Manager 7.2
How-To Guide SAP Solution Manager Document Version: 1.0 2017-05-31 Configuring Job Monitoring in SAP Solution Manager 7.2 Typographic Conventions Type Style Example Example EXAMPLE Example Example
More informationActivities toward Wireless LAN Operation Service
OKANOUE Kazuhiro, EBATA Koichi Abstract Wireless LAN is suitable for an access network to Unified Communications in the intranet. In enterprise environments, however, their usual events can degrade the
More informationEssential Features of an Integration Solution
Essential Features of an Integration Solution September 2017 WHITE PAPER Essential Features of an Integration Solution When an enterprise uses multiple applications, it needs to connect them for a variety
More informationA Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System
, pp.197-202 http://dx.doi.org/10.14257/astl.2014.51.45 A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System Young-Kwan Choi 1,1, In-Soo Kim 1, Sung-Taek
More informationCycle accurate transaction-driven simulation with multiple processor simulators
Cycle accurate transaction-driven simulation with multiple processor simulators Dohyung Kim 1a) and Rajesh Gupta 2 1 Engineering Center, Google Korea Ltd. 737 Yeoksam-dong, Gangnam-gu, Seoul 135 984, Korea
More informationCollaboration System using Agent based on MRA in Cloud
Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal
More informationOracle Exam 1z0-478 Oracle SOA Suite 11g Certified Implementation Specialist Version: 7.4 [ Total Questions: 75 ]
s@lm@n Oracle Exam 1z0-478 Oracle SOA Suite 11g Certified Implementation Specialist Version: 7.4 [ Total Questions: 75 ] Question No : 1 Identify the statement that describes an ESB. A. An ESB provides
More informationEvaluation of Long-Held HTTP Polling for PHP/MySQL Architecture
Evaluation of Long-Held HTTP Polling for PHP/MySQL Architecture David Cutting University of East Anglia Purplepixie Systems David.Cutting@uea.ac.uk dcutting@purplepixie.org Abstract. When a web client
More informationData Policy. Actionable Data, Part I. Feature Guide
Feature Guide Data Policy Actionable Data, Part I Data Policy... 2 How it Works... 2 Activation Triggers... 2 Calendar-Based Activation... 2 Action-Based Activation... 3 Activation Sequence... 3 Actions...
More informationA study on accessibility to mobile websites - Centering on public institution mobile websites in Korea -
, pp.140-144 http://dx.doi.org/10.14257/astl.2013 A study on accessibility to mobile websites - Centering on public institution mobile websites in Korea - Eunju Park 1-1, Yangwon Lim 1, Hankyu Lim 1 1
More informationJoram configuration from clustering to WAN distribution
Joram configuration from clustering to WAN distribution Serge Lacourte ScalAgent Distributed Technologies Serge.Lacourte@scalagent.com www.scalagent.com 2 Outline MOMs & Joram UC1: car certificates UC2:
More informationYour Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team
Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust Wise Athena Security Team Contents Abstract... 3 Security, privacy and trust... 3 Artificial Intelligence in the cloud and
More informationIMT Standards. Standard number A Server Blade. GoA IMT Standards
IMT Standards IMT Standards Oversight Committee Effective Date: 2014-01-17 Scheduled Review: 2015-01-17 Last Reviewed: 2014-01-06 Type: Technical Standard number A000006 Server Blade Category: Hardware
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing
More informationGlossary Construction of Scientific and Technical Term by using Wikipedia
Indian Journal of Science and Technology, Vol 8(27), DOI:10.17485/ijst/2015/v8i27/81057, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Glossary Construction of Scientific and Technical
More informationSecure Development Lifecycle
Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.
More informationSAS Clinical Data Integration Server 2.1
SAS Clinical Data Integration Server 2.1 User s Guide Preproduction Documentation THIS DOCUMENT IS A PREPRODUCTION DRAFT AND IS PROVIDED BY SAS INSTITUTE INC. ON AN AS IS BASIS WITHOUT WARRANTY OF ANY
More informationCOURSE OUTCOMES OF M.Sc(IT)
COURSE OUTCOMES OF M.Sc(IT) Sr. No Subject Code Subject Name Sem-I CO Status Course Outcomes 1. A304101 PROGRAMMING USING C 2. A304102 FUNDAMENTALS OF COMPUTER & INFORMATION TECHNOLOGIES CO1 CO2 Understands
More informationIntegration Framework. Architecture
Integration Framework 2 Architecture Anyone involved in the implementation or day-to-day administration of the integration framework applications must be familiarized with the integration framework architecture.
More informationClientNet Admin Guide. Boundary Defense for
ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationResearch and Application of Unstructured Data Acquisition and Retrieval Technology
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Research and Application of Unstructured Data Acquisition and Retrieval Technology Zhenjiang Lei1,*, Lin Qiao2, Lina
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationMARKET PROCESS DESIGN. MPD 05 - Market Process for New NQH Metered Connection
MARKET PROCESS DESIGN MPD 05 - Market Process for New NQH Metered Connection TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1 SCOPE... 3 1.2 HISTORY OF CHANGES... 3 2. PROCESS MAP... 5 2.1 PROCESS DESCRIPTION...
More informationITM DEVELOPMENT (ITMD)
ITM Development (ITMD) 1 ITM DEVELOPMENT (ITMD) ITMD 361 Fundamentals of Web Development This course will cover the creation of Web pages and sites using HTML, CSS, Javascript, jquery, and graphical applications
More informationDesign on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b
3rd International Conference on Management, Education Technology and Sports Science (METSS 2016) Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 1 Basic Teaching
More informationVisual Web Next Design Concepts. Winston Prakash Feb 12, 2008
Visual Web Next Design Concepts Winston Prakash Feb 12, 2008 Some Notations Used Page - A web page being designed such as HTML, JSP, JSF, PHP etc. Page definition Language (PDL) - Language that used to
More informationWireless Internet Tutoring System Design Document. Nadya Belov, Dmitriy Bespalov, Ilya Braude, Immanuel Comer, Daniel Lapadat, Andrew Ragone
Wireless Internet Tutoring System Design Document Nadya Belov, Dmitriy Bespalov, Ilya Braude, Immanuel Comer, Daniel Lapadat, Andrew Ragone Contents Introduction 4. Goals and Guidelines........................................
More informationTotal cost of ownership for application replatform by open-source SW
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 91 (2016 ) 677 682 Information Technology and Quantitative Management (ITQM 2016) Total cost of ownership for application
More informationChapter 18: Parallel Databases Chapter 19: Distributed Databases ETC.
Chapter 18: Parallel Databases Chapter 19: Distributed Databases ETC. Introduction Parallel machines are becoming quite common and affordable Prices of microprocessors, memory and disks have dropped sharply
More informationHigh Availability Distributed (Micro-)services. Clemens Vasters Microsoft
High Availability Distributed (Micro-)services Clemens Vasters Microsoft Azure @clemensv ice Microsoft Azure services I work(-ed) on. Notification Hubs Service Bus Event Hubs Event Grid IoT Hub Relay Mobile
More informationRISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS
CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7
More informationDeveloping with VMware vcenter Orchestrator
Developing with VMware vcenter Orchestrator vcenter Orchestrator 4.2.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationImplementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide
Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide This IBM Redbooks Solution Guide describes the existing and new aspects of IBM CICS Transaction Server that allow
More informationProtocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012
Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article
More informationDatabase Server. 2. Allow client request to the database server (using SQL requests) over the network.
Database Server Introduction: Client/Server Systems is networked computing model Processes distributed between clients and servers. Client Workstation (usually a PC) that requests and uses a service Server
More informationA Communication Middleware with Unified Data Transmission Interface
Communications and Network, 2013, 5, 34-38 doi:10.4236/cn.2013.51b009 Published Online February 2013 (http://www.scirp.org/journal/cn) A Communication Middleware with Unified Data Transmission Interface
More informationA Virtual-Synchronized-File Based Privacy Protection System
Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System
More informationImprovement of Basic Functions for Visualizing Schedule and 3D Object in 4D CAD System
CIB World Building Congress 2007 3009 CIB2007-373 Improvement of Basic Functions for Visualizing Schedule and 3D Object in 4D CAD System Leen-Seok Kang, Seo-Young Park, Hyoun-Seok Moon, Chang-Hak Kim (Corresponding
More informationIBM z/os Management Facility V2R1 Solution Guide IBM Redbooks Solution Guide
IBM z/os Management Facility V2R1 Solution Guide IBM Redbooks Solution Guide z/osmf is a product for IBM z/os that simplifies, optimizes, and modernizes the z/os system programmer experience. z/osmf delivers
More informationA Study of Developing Virtual Prototyping by using JavaBean interface Tool and SystemC Engine 1
A Study of Developing Virtual Prototyping by using JavaBean interface Tool and SystemC Engine 1 Husni Teja Sukmana, Jeong B. Lee, Jong Il Kim, Young J. Jung, B.Kwon, Kee W. Rim, Young R. Lee Jin 1 Sun
More informationCo-Ordinated Retail Market Message Guide
Co-Ordinated Retail Market Message Guide ROI Implementation Market Gateway Activity Document Information Business Area: Status: Author/s: ESB Networks Final ESBN Version Number: 3.1 Reason for Change Co-Ordinated
More informationCommunity Edition. Web User Interface 3.X. User Guide
Community Edition Talend MDM Web User Interface 3.X User Guide Version 3.2_a Adapted for Talend MDM Web User Interface 3.2 Web Interface User Guide release. Copyright This documentation is provided under
More informationAcronis Data Cloud plugin for ConnectWise Automate
Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update
More informationNext-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
More informationAUTOMATED QUOTA MANAGEMENT AND FILE SCREENING
StorageCentral: Architecture Overview AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING For Windows Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS
More informationOntology-based Integration and Refinement of Evaluation-Committee Data from Heterogeneous Data Sources
Indian Journal of Science and Technology, Vol 8(23), DOI: 10.17485/ijst/2015/v8i23/79342 September 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Ontology-based Integration and Refinement of Evaluation-Committee
More informationREQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM
REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM Ghassan Z. Qadah American University of Sharjah United Arab Emerites ABSTRACT The rapid advancement in database, web and wireless technologies
More informationLeakage Pattern Monitoring Method of CEP based Water Supply Block System
Indian Journal of Science and Technology, Vol 8(27), DOI:10.17485/ijst/2015/v8i27/81054, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Leakage Pattern Monitoring Method of CEP based Water
More informationWindows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft
Windows 10 Management Technologies: What s New Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Business needs are evolving. Windows 10 offers to meet those needs. MANAGEMENT CHOICES
More informationMIS5206-Section Protecting Information Assets-Exam 1
Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines
More informationPreliminary Research on Distributed Cluster Monitoring of G/S Model
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring
More informationForensic Information Data Exchange (FIDEX) Implementation Guide
Forensic Information Data Exchange () Implementation Guide 2008 IJ CX K405 May 5, 2010 The NFSTC is pleased to submit this Implementation Guide to the United States Department of Justice, Office of Justice
More informationTUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS
TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3
More informationFPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details
FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details 2 FPM IT 420B: FAC P/PM IT Planning & Acquiring Operations of IT Systems FPM-IT-420B: FAC-P/PM-IT PLANNING & ACQUIRING
More informationMetadata Management System (MMS)
Metadata Management System (MMS) Norhaizan Mat Talha MIMOS Berhad, Technology Park, Kuala Lumpur, Malaysia Mail:zan@mimos.my Abstract: Much have been said about metadata which is data about data used for
More informationAbout Wipro: As, you can understand it is such a great organization. The recruitment procedure is standard. Thus one needs to prepare well.
About Wipro: Wipro is a multinational IT services company providing, IT services, infrastructure, networks company. The Wipro initiative was initiated on 29th December 1945. At the time the company was
More informationIntelligent Risk Identification and Analysis in IT Network Systems
Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au
More informationSection 508 Assessment and Voluntary Product Accessibility Template (VPAT ) Development for VMware. VMware View 4.0 Report
Section 508 Assessment and Voluntary Product Accessibility Template (VPAT ) Development for VMware VMware View 4.0 Report December 18, 2009 SUBMITTED BY: Rockville Commerce Center Building A, Unit 1 2410
More informationSAS Clinical Data Integration 2.6
SAS Clinical Data Integration 2.6 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS Clinical Data Integration 2.6: User's Guide.
More informationUsing the Internet and the World Wide Web
Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify
More informationGeneral Data Protection Regulation (GDPR) and the Implications for IT Service Management
General Data Protection Regulation (GDPR) and the Implications for IT Service Management August 2018 WHITE PAPER GDPR: What is it? The EU General Data Protection Regulation (GDPR) replaces the Data Protection
More informationNetwork Intrusion Prevention System Protection Profile V1.1 Certification Report
KECS-CR-2005-04 Network Intrusion Prevention System Protection Profile V1.1 Certification Report Certification No. : CC-20-2005.12 12, 2005 National Intelligence Service This document is the certification
More informationA Graphical Data Management System for HDL-Based ASIC Design Projects
A Graphical Data Management System for HDL-Based ASIC Design Projects Claus Mayer, Hans Sahm, Jörg Pleickhardt Lucent Technologies Bell Labs Innovations Thurn-und-Taxis-Str.10, D-90411 Nürnberg, Germany
More informationSUSTAINABLE ELECTRIFICATION OF HEALTH FACILITIES: UGANDA
Project Information Sheet SUSTAINABLE ELECTRIFICATION OF HEALTH FACILITIES: UGANDA This project information sheet provides an overview of the activities planned under the Sustainable Electrification of
More informationSuper-Peer Architectures for Distributed Computing
Whitepaper Super-Peer Architectures for Distributed Computing Fiorano Software, Inc. 718 University Avenue, Suite 212 Los Gatos, CA 95032 U.S.A. +1.408.354.3210 email info@fiorano.com www.fiorano.com Entire
More informationA national valuation database as a risk assessment tool
A national valuation database as a risk assessment tool Let s talk Your guidelines Guidelines on the development and use of a national valuation database as a risk assessment tool Publisher World Customs
More informationIT Security Evaluation and Certification Scheme Document
IT Security Evaluation and Certification Scheme Document June 2015 CCS-01 Information-technology Promotion Agency, Japan (IPA) IT Security Evaluation and Certification Scheme (CCS-01) i / ii Table of Contents
More informationfips185 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 185 1994 February 9 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology ESCROWED ENCRYPTION STANDARD CATEGORY: TELECOMMUNICATIONS
More informationWhat s new in Transaction Perspective (TxP) 10 and KITE 4.0
What s new in Transaction Perspective (TxP) 10 and KITE 4.0 What s new in TxP 10 and KITE 4.0 October 6, 2010 Page 1 of 17 Table of Contents What s new in Transaction Perspective (TxP) 10 and KITE 4.0...
More informationCAKEDC GIT WORKFLOW. CakeDC Git Workflow is a project development and release work flow which provides a
CAKEDC GIT WORKFLOW CakeDC Git Workflow is a project development and release work flow which provides a development and release cycle based on key phases: Development: All active development is driven
More informationRelease Date June 21, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA
Adeptia Suite 5.2 Getting Started Guide Release Date June 21, 2011 Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA Copyright Copyright 2000-2009 Adeptia, Inc. All rights reserved. Trademarks
More informationAn Approach to Quality Achievement at the Architectural Level: AQUA
An Approach to Quality Achievement at the Level: AQUA Heeseok Choi 1, Keunhyuk Yeom 2, Youhee Choi 3, and Mikyeong Moon 2 1 NTIS Organization, Korea Institute of Science and Technology Information Eoeun-dong
More informationImplementing a Ground Service- Oriented Architecture (SOA) March 28, 2006
Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling
More informationDYNAMIC CONFIGURATION OF COLLABORATION IN NETWORKED ORGANISATIONS
22 DYNAMIC CONFIGURATION OF COLLABORATION IN NETWORKED ORGANISATIONS Brian Shields and Owen Molloy Department of Information Technology, National University of Ireland, Galway, IRELAND. brian.shields@geminga.it.nuigalway.ie,
More informationReform: A Domain Specific Language
Reform: A Domain Specific Language Dustin Graves October 5, 2007 Overview Scripting language Monitors and manages data streams Network, File, RS-232, etc Reformats and redirects data Contains keywords
More informationDesign and Implementation of the Omni Media Content Production and Service Platform
Design and Implementation of the Omni Media Content Production and Service Platform Shi-Min Liu1,a, Ling-Jun Yang1 and San-Xing Cao2 1 Information Engineering school, Communication University of China,
More informationOperating- System Structures
Operating- System Structures 2 CHAPTER Practice Exercises 2.1 What is the purpose of system calls? Answer: System calls allow user-level processes to request services of the operating system. 2.2 What
More informationStudy on XML-based Heterogeneous Agriculture Database Sharing Platform
Study on XML-based Heterogeneous Agriculture Database Sharing Platform Qiulan Wu, Yongxiang Sun, Xiaoxia Yang, Yong Liang,Xia Geng School of Information Science and Engineering, Shandong Agricultural University,
More informationIBM emessage Version 9 Release 1 February 13, User's Guide
IBM emessage Version 9 Release 1 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 471. This edition applies to version
More informationIBM API Connect: Introduction to APIs, Microservices and IBM API Connect
IBM API Connect: Introduction to APIs, Microservices and IBM API Connect Steve Lokam, Sr. Principal at OpenLogix @openlogix @stevelokam slokam@open-logix.com (248) 869-0083 What do these companies have
More informationSalesforce Classic Mobile User Guide for Android
Salesforce Classic Mobile User Guide for Android Version 41.0, Winter 18 @salesforcedocs Last updated: November 21, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationOpenAPI-based Message Router for Mashup Service Development
OpenAPI-based Message Router for Mashup Service Development Doyoung Lee, Seyeon Jeong, James Won-Ki Hong Department of Computer Science and Engineering, POSTECH, Korea {dylee90, jsy0906, jwkhong}@postech.ac.kr
More information3.4 Data-Centric workflow
3.4 Data-Centric workflow One of the most important activities in a S-DWH environment is represented by data integration of different and heterogeneous sources. The process of extract, transform, and load
More informationClick to edit Master title style
Federal Risk and Authorization Management Program Presenter Name: Peter Mell, Initial FedRAMP Program Manager FedRAMP Interagency Effort Started: October 2009 Created under the Federal Cloud Initiative
More informationImplementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1073-1089 (2011) Implementation of Business Logic Framework for Collaboration of Heterogeneous Service Systems in RFID/USN Environment SEOK-KYOO KIM 1,
More informationColburn Community Primary School ICT and Computing Policy
Colburn Community Primary School ICT and Computing Policy Introduction The use of information and communication technology is an integral part of the national curriculum and is a key skill for everyday
More information