Rules Based Applications
|
|
- Lee Eustace Barrett
- 5 years ago
- Views:
Transcription
1 White Paper April 2014
2 RULES BASED APPLICATIONS Rules and Applications where is the separation and does it matter? Most people think of business rules as a modest amount of precisely targeted business logic that is injected into an application. This is a narrow view of rules that can be very limiting in terms of the value that can be harvested from implementing a rules approach. While we can agree that this view does define rules as practiced by many in fact it is the essence of the Business Rules Manifesto the view can be productively extended to obtain much more value from any effort being invested into business rules. This effort is mostly expended in detaching the business rules from the underlying application, and then making them available for development and maintenance outside of that application s SDLC. Ideally, when we have extracted these rules we would hand them over 100% to their respective business owners; however this is a goal that still eludes many. Perhaps if there was more value to be harvested, more effort would be invested in this worthwhile goal. The first and obvious scope extension that can help us to obtain more value from rules is to expand the definition of rules beyond the boolean constraints view espoused by the Manifesto, and embrace all forms of business defined derived-data, including values, dates, and text. For instance, deriving costs and prices, setting trigger dates, and compiling printable text are all things that are often business defined. The people who are targeted for the more traditional business rules as described above are almost certainly the same people who own these other values the separation between these classes of rules is artificial in their eyes. A second scope extension is perhaps less obvious, but every bit as important. Business rules are usually defined in an idiom (Defn: A specialized vocabulary used by a group of people; jargon; a style or manner of expression peculiar to a given people. ). The language that forms the basis of the idiom is essentially proprietary. However, the raw data in any domain typically describes the domain s real-world entities in real world terms (by definition the entities exist irrespective of the organisation that records them). There is a language gap between the language of the real world data and the idiomatic language of the business rules that must be addressed. This requires a step to validate the real world data as collected by the business, and to then transform it to align with the idiomatic phrasing used by the rules. Only then can the rules be applied and the business respond appropriately to the events described by the data. The idiom is the language used by the business to define its strategies, policies, and (lowest in this hierarchy) the rules which ultimately govern its behavior. For those seeking more background on this discussion, please read Decisioning the next generation of business rules (recently published on both the Business Rules Journal and Modern Analyst). The rules in this case are the sharp end of applied business strategy they are the means by which business policies actually get applied to real-world entities and their events. These rules are applied within discrete, atomic units that we refer to as decisions. A decision in this context is a unique, business defined outcome that is derived by a set of rules (all of which must be applied as a single unit-of-work). We can draw an analogy with molecules and atoms a decision is like a molecule; the smallest tangible outcome from a rules process that can exist in its own right. Whereas the rule is like an atom essential as part of a decision, but cannot be used in isolation to achieve any particular purpose. Copyright IDIOM Limited 2014 April 2014 Page 2 of 8
3 In order to apply the higher order, policy defined business rules (always in the form of decisions), we need to bridge the gap between the raw data and the business idiom. Ergo, an effective rules engine must also be a data validation and transformation engine. In fact, our experience suggests that the vast majority of rules development effort is in the validation and transformation area. But unless this effort is made, the higher order policy defined business rules are unable to function. Again, the validation and transformation rules are business defined (by definition) and belong in the same scope as the core business rules we started with. There is no useful boundary between a business rule that derives an intermediate value from one which derives the ultimate business outcome they are all just rules aggregated into decisions and ultimately into complete sets of decisions a.k.a. the Decision Model in IDIOM parlance. This is a useful point to recap we have now (re)defined the business rules scope as being everything involved in the transition of the raw business data describing an entity in one state to its return in a new state. This is an important observation it means that we can define all of the bespoke elements of an application within the business rules concept. So what is left in the traditional application? A series of generic event driven features and functions like searching, selecting and saving entities, applying business rules, and receiving and sending messages to other devices or locations (e.g. printers, webservices, queues, legacy systems etc.). These generic capabilities can be controlled by meta-data that is defined by the real-world capability of the feature or function itself their meta-data is static and externally defined, just like the realworld business data. And like that real-world business data, we can use rules to derive the system meta-data and explicitly control the system s features and functions rules are now the business owners remote control for the system. The above now implicitly defines a generic application that can service virtually any commercial need provided that the appropriate rules are supplied to define and apply the relevant business policies, and to then drive the supporting application features and functions (via their respective meta-data). Such an application is not hypothetical! IDIOM has now built many such applications, all very similar in concept and architecture to the application described in our paper Architecture for Agile Provisioning of Financial Products and Services. Most of these applications use a variation of a common underlying architecture, which includes the following generic concepts: Business policy is defined and implemented by a mix of rules and configuration documents, all of which are stored in the database, and which are themselves controlled by rules. The context data (i.e. the transaction and all of its related entity and event data) is stored extant as XML in an XML column in the database. The context data can be large and complex hundreds of thousands of nodes with many nested levels of hierarchy and they only need to be understood by the rules that govern them. Most other traditional database column values are generated by the rules, and only exist to provide database indexes or for the special needs of other (less agile) applications. Rules generated data is also used to align any and all other systems, including legacy and accounting systems, with the latest transaction state. This data is extracted automatically by rote when saving, and then routed to meta-data defined end-points. Copyright IDIOM Limited 2014 April 2014 Page 3 of 8
4 Forward looking actions and events are created by rules as Bring-Ups (automated future events) and Actions (targeted events for human users). By building an application using the above design approach, development time, cost and risk can be reduced by an order-of-magnitude. And the business will love you for an application that empowers them while still hiding the technical complexities. For those familiar with data design, the following sample database schema provides some insight into the underlying architecture of the design approach: In the above diagram, we can see the context data (the transaction XML document) stored as SoldProductXML in the Sold Product Instance table [blue]. Note that query performance against this structure can be better than with standard normalized database schemas because joins are rarely required. Also, full text search on the XML column can provide instant Google like search over the full extent of the database. The rules for managing this transaction XML can be found in the DecisionModelBinary column of the Decision Model table; IDIOM now routinely loads the decision model dll or JAR directly from the database (at least in those environments capable of it). The policy configuration parameters are in the ProductConfigXML in the Product table [green], and are delivered to the rules each time they execute. Copyright IDIOM Limited 2014 April 2014 Page 4 of 8
5 The Financial Entry, Bring-Up, and Action table rows are generated by the rules within the SoldProductXML and are automatically stripped off by the database handler when saving the SoldProductXML. The following two diagrams provide a high level view of the overall IDIOM approach, centered on the IDIOM Decision Manager in the first diagram. The second diagram highlights the Decision Engine and a sample set of decision models. The green arrow linking the diagrams is used to indicate the flow of decision models, which are exported in a manifest that includes generated source code. This code is compiled and executed behind the Decision Engine interface, all of which are provided in source code form (Java and/or C#) for peace of mind. Copyright IDIOM Limited 2014 April 2014 Page 5 of 8
6
7
8 Finis Established in 2001, IDIOM Limited is a private company based in Auckland, New Zealand. IDIOM develops and licenses decision-making software that automates business policy on a large scale, making systems more transparent and agile, while reducing development cost, risk, and time. IDIOM s innovative business oriented software is used by business users to graphically define, document, and verify corporate decision-making and related business rules; it then auto-generates these into small footprint, non-intrusive software components for use in systems of any type or scale. IDIOM is a pioneer in the development and use of decision oriented concepts, and has applied these concepts in the development of intelligent processes for customers around the world in local / state / central government, insurance /superannuation / finance, health admin / clinical health, telecoms, logistics, and utilities. IDIOM automated business policy and decision making extends far beyond mere business rules, so that ownership and control of larger and more complex decision making can be fully delegated to business experts. IDIOM enabled development and management of policy based decision making by policy owners creates a propitious business policy life-cycle that significantly improves business agility and transparency. IDIOM develops and licenses the IDIOM Decision Manager, IDIOM Forms, IDIOM Decision Tracker and the IDIOM Decision Manager Workbench. IDIOM Contact Details Mark Norton Director Idiom Limited Office Mob After Hrs Aust. Free Call Dominion Rd. Mt Eden Auckland 1024 PO Box Titirangi Auckland 0642 New Zealand mark.norton@idiomsoftware.com Skype Mark.Norton
21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationExcel and IDIOM. A Comparison. Whitepaper October 2017
Excel and IDIOM A Comparison Whitepaper October 2017 +64 9 6308950 @ idiomsales@idiomsoftware.com idiomsoftware.com 2-2, 93 Dominion Road, Mount Eden, Auckland 1024 Excel and IDIOM Executive Summary...
More informationStrategy & Planning: Data Governance & Data Quality
Strategy & Planning: Data Governance & Data Quality April 30, 2017 In the era of big data and data science, most commercial and nonprofit organizations realize the potential power of data in accelerating
More informationQLIKVIEW ARCHITECTURAL OVERVIEW
QLIKVIEW ARCHITECTURAL OVERVIEW A QlikView Technology White Paper Published: October, 2010 qlikview.com Table of Contents Making Sense of the QlikView Platform 3 Most BI Software Is Built on Old Technology
More informationChapter 4. Fundamental Concepts and Models
Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas
More informationENCRYPTION IN USE FACT AND FICTION. White Paper
White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises
More informationMassive Scalability With InterSystems IRIS Data Platform
Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special
More informationDATA MATCHING IN THE IDENTITY ECOSYSTEM
DATA MATCHING IN THE IDENTITY ECOSYSTEM Increasing Identity Transactions by Enabling Service Providers THE OPEN IDENTITY EXCHANGE REPORT WRITTEN BY EMMA LINDLEY INNOVATE IDENTITY 1 Executive Summary O
More informationJumpstarting the Semantic Web
Jumpstarting the Semantic Web Mark Watson. Copyright 2003, 2004 Version 0.3 January 14, 2005 This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License. To view a copy
More informationMoving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing.
Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Overview The desire to use tools to increase validation productivity with the consequent
More informationThe Seven Steps to Implement DataOps
The Seven Steps to Implement Ops ABSTRACT analytics teams challenged by inflexibility and poor quality have found that Ops can address these and many other obstacles. Ops includes tools and process improvements
More informationFast Track Model Based Design and Development with Oracle9i Designer. An Oracle White Paper August 2002
Fast Track Model Based Design and Development with Oracle9i Designer An Oracle White Paper August 2002 Fast Track Model Based Design and Development with Oracle9i Designer Executive Overivew... 3 Introduction...
More informationSYSPRO s Fluid Interface Design
SYSPRO s Fluid Interface Design Introduction The world of computer-user interaction has come a long way since the beginning of the Graphical User Interface, but still most application interfaces are not
More informationEfficient Object-Relational Mapping for JAVA and J2EE Applications or the impact of J2EE on RDB. Marc Stampfli Oracle Software (Switzerland) Ltd.
Efficient Object-Relational Mapping for JAVA and J2EE Applications or the impact of J2EE on RDB Marc Stampfli Oracle Software (Switzerland) Ltd. Underestimation According to customers about 20-50% percent
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationCisco Unified Computing System Delivering on Cisco's Unified Computing Vision
Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision At-A-Glance Unified Computing Realized Today, IT organizations assemble their data center environments from individual components.
More informationSECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.
SECURITY REDEFINED Managing risk and securing the business in the age of the third platform 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices
More informationFHA Federal Health Information Model (FHIM) Information Modeling Process Guide
Office of the National Coordinator for Health IT Federal Health Architecture Program Management Office FHA Federal Health Information Model (FHIM) Information Modeling Process Guide Version 0.1 Draft,
More informationModernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure
Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations
More informationDITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee
DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee Documents initiate and record business change. It is easy to map some business
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationHeads of Internal Audit Webinar. Integrated Assurance. 24 July In partnership with
Heads of Internal Audit Webinar Integrated Assurance 24 July 2013 In partnership with WELCOME TO THE WEBINAR The audio for this webcast will be broadcast via your PC speakers you do not need to dial in.
More informationApplying Systems Thinking to MBSE
Applying Systems Thinking to MBSE 1 Daniel Hettema, and Steven H. Dam, Ph.D., ESEP, SPEC Innovations, 571-485-7799 daniel.hettema@specinnovations.com October 2013 Overview What makes systems thinking different
More informationOracle Endeca Information Discovery
Oracle Endeca Information Discovery Glossary Version 2.4.0 November 2012 Copyright and disclaimer Copyright 2003, 2013, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered
More informationQlik s Associative Model
White Paper Qlik s Associative Model See the Whole Story that Lives Within Your Data August, 2015 qlik.com Table of Contents Introduction 3 Qlik s associative model 3 Query-based visualization tools only
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationIDIOM Transaction Engine
An Application to Manage Complex Business Entities Whitepaper October 2018 +64 9 6308950 @ idiomsales@idiomsoftware.com idiomsoftware.com 2-2, 93 Dominion Road, Mount Eden, Auckland 1024 IDIOM Transaction
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationEnabling efficiency through Data Governance: a phased approach
Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency
More informationACCELERATING SAP: INNOVATION IN TEST AUTOMATION
ACCELERATING SAP: INNOVATION IN TEST AUTOMATION Worksoft White Paper By Linda Hayes, Founder, Worksoft, Inc. v0709 2007 Worksoft, Inc. All rights reserved. Worksoft and Worksoft Certify are registered
More informationUp and Running Software The Development Process
Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running
More informationA scalable AI Knowledge Graph Solution for Healthcare (and many other industries) Dr. Jans Aasman
A scalable AI Knowledge Graph Solution for Healthcare (and many other industries) Dr. Jans Aasman About Franz Inc. Privately held, Self-funded, Profitable since 1984 Headquartered: Oakland, CA Flagship
More informationLecture c, Process Mapping: Yourdon Notation for Data Flow Diagrams, covers Yourdon notation for data flow diagrams.
WORKFLOW ANALYSIS Audio Transcript Component 10 Unit 3 Lecture C Fundamentals of Health Workflow Process Analysis & Redesign Interpreting and Creating Process Diagrams Process Mapping Yourdon Notation
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationTeiid Designer User Guide 7.5.0
Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationTOPLink for WebLogic. Whitepaper. The Challenge: The Solution:
Whitepaper The Challenge: Enterprise JavaBeans (EJB) represents a new standard in enterprise computing: a component-based architecture for developing and deploying distributed object-oriented applications
More informationA Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum
A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users
More informationALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT
THOUGHT PIECE ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT Brad Stone Vice President Stone_Brad@bah.com Brian Hogbin Distinguished Technologist Hogbin_Brian@bah.com
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationPaper SAS Taming the Rule. Charlotte Crain, Chris Upton, SAS Institute Inc.
ABSTRACT Paper SAS2620-2016 Taming the Rule Charlotte Crain, Chris Upton, SAS Institute Inc. When business rules are deployed and executed--whether a rule is fired or not if the rule-fire outcomes are
More informationKey questions to ask before commissioning any web designer to build your website.
Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,
More informationITIL Service Lifecycle Strategy
ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based
More informationEBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD
EBOOK NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD NetApp ONTAP Cloud for Microsoft Azure The ONTAP Cloud Advantage 3 Enterprise-Class Data Management 5 How ONTAP Cloud
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationNOTES ON OBJECT-ORIENTED MODELING AND DESIGN
NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented
More informationITIL : Professional Education Training. Innovative solutions for modern businesses.
ITIL : 2011 Professional Education Training Innovative solutions for modern businesses www.syzygal.com The ITIL Service Lifecycle ITIL (IT INFRASTRUCTURE LIBRARY) is a best practice framework for IT Service
More informationTips for a Good Meshing Experience
Tips for a Good Meshing Experience Meshes are very powerful and flexible for modeling 2D overland flows in a complex urban environment. However, complex geometries can be frustrating for many modelers
More informationAnalyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst
Executive Summary Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst December 2014 This ESG White Paper
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationThe Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan
Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationDBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information.
Prof- Neeta Bonde DBMS (FYCS) Unit - 1 DBMS: - Database is a collection of related data and data is a collection of facts and figures that can be processed to produce information. Mostly data represents
More informationNew Zealand Government IbM Infrastructure as a service
New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as
More informationThe Role of Converged and Hyper-converged Infrastructure in IT Transformation
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational
More informationMicrosoft Developing SQL Databases
1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20762 - Developing SQL Databases Price $4290.00 (inc GST) Version C Overview This five-day instructor-led course provides students with the
More informationSAP BEX ANALYZER AND QUERY DESIGNER
SAP BEX ANALYZER AND QUERY DESIGNER THE COMPLETE GUIDE A COMPREHENSIVE STEP BY STEP GUIDE TO CREATING AND RUNNING REPORTS USING THE SAP BW BEX ANALYZER AND QUERY DESIGNER TOOLS PETER MOXON PUBLISHED BY:
More informationTHE STATE OF IT TRANSFORMATION FOR RETAIL
THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State
More informationREGULATORY COMPLIANCE TODAY, THE STUFF WE CAN ALL LEARN
REGULATORY COMPLIANCE TODAY, THE STUFF WE CAN ALL LEARN Chris Atkinson, Solutions Architect - Financial Services, MarkLogic NOT THIS! A SIMPLE ASK FROM OUR BUSINESS LEADERS Deliver a complete, accurate,
More informationShaping the Cloud for the Healthcare Industry
Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as
More informationQM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS
QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives
More informationIntroduction to K2View Fabric
Introduction to K2View Fabric 1 Introduction to K2View Fabric Overview In every industry, the amount of data being created and consumed on a daily basis is growing exponentially. Enterprises are struggling
More informationSOME TYPES AND USES OF DATA MODELS
3 SOME TYPES AND USES OF DATA MODELS CHAPTER OUTLINE 3.1 Different Types of Data Models 23 3.1.1 Physical Data Model 24 3.1.2 Logical Data Model 24 3.1.3 Conceptual Data Model 25 3.1.4 Canonical Data Model
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationTake responsibility for completing tasks and procedures subject to direction or guidance as needed.
Relevant LINKS BACK TO ITQ UNITS [1] Handbook home page [2] Overview This is the ability to select and use a range of word processing software tools and techniques to produce documents that are at times
More informationCategorizing Migrations
What to Migrate? Categorizing Migrations A version control repository contains two distinct types of data. The first type of data is the actual content of the directories and files themselves which are
More informationTableau Metadata Model
Tableau Metadata Model Author: Marc Reuter Senior Director, Strategic Solutions, Tableau Software p2 Most Business Intelligence platforms fall into one of two metadata camps: either model the entire enterprise
More informationInteraction Design
Interaction Design 9-12-2012 Overview of Interaction Design Understanding the Problem Space Conceptualizing the Design Space HW#2 posted, due Wednesday 9/19 Activity#3 due Monday, 9/24/12 Select your presentation
More informationDesign Recovery & Rebuild with X-Analysis
MANAGEMENT OVERVIEW A GUIDE TO THE BENEFITS OF USING DESIGN RECOVERY & REBUILD Design Recovery & Rebuild with X-Analysis Databorough Ltd. 66 York Road Weybridge UK info@databorough.com Phone +44 (0)1932
More informationENTERPRISE DATA STRATEGY IN THE HEALTHCARE LANDSCAPE
ENTERPRISE DATA STRATEGY IN THE HEALTHCARE LANDSCAPE MARKLOGIC WHITE PAPER The healthcare landscape is changing. Heightened competition and risk in this evolving environment demands an enterprise data
More informationMySQL for Developers. Duration: 5 Days
Oracle University Contact Us: 0800 891 6502 MySQL for Developers Duration: 5 Days What you will learn This MySQL for Developers training teaches developers how to develop console and web applications using
More informationMicro Focus Partner Program. For Resellers
Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert
More informationData ownership within governance: getting it right
Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data
More information2.3 Algorithms Using Map-Reduce
28 CHAPTER 2. MAP-REDUCE AND THE NEW SOFTWARE STACK one becomes available. The Master must also inform each Reduce task that the location of its input from that Map task has changed. Dealing with a failure
More informationProfessional Services for Cloud Management Solutions
Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their
More informationMySQL for Developers. Duration: 5 Days
Oracle University Contact Us: Local: 0845 777 7 711 Intl: +44 845 777 7 711 MySQL for Developers Duration: 5 Days What you will learn This MySQL for Developers training teaches developers how to develop
More informationThe Open Group SOA Ontology Technical Standard. Clive Hatton
The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts
More informationSub- PPL Unit-I Class-SE Comp
1. We describe the basic concepts for structuring large programs (encapsulation, interfaces, information hiding) and the mechanisms provided by languages to support it (packaging, separate compilation).
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationJ2EE Application Development : Conversion and Beyond Osmond Ng
IBM Software Group J2EE Application Development : Conversion and Beyond Osmond Ng IBM Software Group Practitioner View Point IBM Rational Application Developer J2EE/EJB Tooling J2EE construction tools
More informationShine a Light on Dark Data with Vertica Flex Tables
White Paper Analytics and Big Data Shine a Light on Dark Data with Vertica Flex Tables Hidden within the dark recesses of your enterprise lurks dark data, information that exists but is forgotten, unused,
More informationSolved Question Paper June 2017
Solved Question Paper June 2017 1.a) What are the benefits of Object Oriented Methodology in real life applications? Briefly explain each element of the state diagram with respect to dynamic modeling.
More information1 Executive Overview The Benefits and Objectives of BPDM
1 Executive Overview The Benefits and Objectives of BPDM This is an excerpt from the Final Submission BPDM document posted to OMG members on November 13 th 2006. The full version of the specification will
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationSmallworld Core Spatial Technology 4 Spatial data is more than maps tracking the topology of complex network models
Smallworld Core Spatial Technology 4 Spatial data is more than maps tracking the topology of complex network models 2004 General Electric Company. All Rights Reserved GER-4230 (10/04) Abstract Spatial
More informationDesigning and debugging real-time distributed systems
Designing and debugging real-time distributed systems By Geoff Revill, RTI This article identifies the issues of real-time distributed system development and discusses how development platforms and tools
More informationWHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY
E-Guide WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY SearchSDN : S oftware-defined networking (SDN) and network technologies are being combined to fundamentally change our approach
More informationQuestion 1: What is a code walk-through, and how is it performed?
Question 1: What is a code walk-through, and how is it performed? Response: Code walk-throughs have traditionally been viewed as informal evaluations of code, but more attention is being given to this
More informationLegacy Modernization to SOA using Compass/VB
Legacy Modernization to SOA using Compass/VB Case Study Name Avi Yaeli, Netta Aizenbud, Jonathan Bnayahu, Nurit Dor, Alex Akilov, Sara Porat IBM Research Labs in Haifa Jenny Choy, IGS Oct. 27, 2005 IBM
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationData Aggregation for Asset Reconciliation
INTRODUCTION This paper focuses on data consolidation for asset reconciliation within hedge funds and long only asset managers. The process requires aggregation of data from a number of external sources
More informationQlik. 10 key elements of a successful data strategy and modern analytics platform. February 2019 Julie Kae Executive Director, Qlik.
Qlik 10 key elements of a successful data strategy and modern analytics platform February 2019 Julie Kae Executive Director, Qlik.org Legal Disclaimer Qlik roadmaps provide a general overview of our anticipated
More informationDesigning High-Performance Data Structures for MongoDB
Designing High-Performance Data Structures for MongoDB The NoSQL Data Modeling Imperative Danny Sandwell, Product Marketing, erwin, Inc. Leigh Weston, Product Manager, erwin, Inc. Learn More at erwin.com
More informationUtilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process
Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process Introduction System tests, often called slow tests, play a crucial role in nearly every Java development
More informationPlease view notes for further information on later slides
Please view notes for further information on later slides 1 2 Mobile telecoms planning is driven primarily by coverage of population and secondarily by coverage of geographic area, often with reference
More informationDELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS
DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS Building digital trust and cyber security resilience is no longer just an IT issue, it s a business mandate. Fusion brings a simplified approach to our client
More information