Rules Based Applications

Size: px
Start display at page:

Download "Rules Based Applications"

Transcription

1 White Paper April 2014

2 RULES BASED APPLICATIONS Rules and Applications where is the separation and does it matter? Most people think of business rules as a modest amount of precisely targeted business logic that is injected into an application. This is a narrow view of rules that can be very limiting in terms of the value that can be harvested from implementing a rules approach. While we can agree that this view does define rules as practiced by many in fact it is the essence of the Business Rules Manifesto the view can be productively extended to obtain much more value from any effort being invested into business rules. This effort is mostly expended in detaching the business rules from the underlying application, and then making them available for development and maintenance outside of that application s SDLC. Ideally, when we have extracted these rules we would hand them over 100% to their respective business owners; however this is a goal that still eludes many. Perhaps if there was more value to be harvested, more effort would be invested in this worthwhile goal. The first and obvious scope extension that can help us to obtain more value from rules is to expand the definition of rules beyond the boolean constraints view espoused by the Manifesto, and embrace all forms of business defined derived-data, including values, dates, and text. For instance, deriving costs and prices, setting trigger dates, and compiling printable text are all things that are often business defined. The people who are targeted for the more traditional business rules as described above are almost certainly the same people who own these other values the separation between these classes of rules is artificial in their eyes. A second scope extension is perhaps less obvious, but every bit as important. Business rules are usually defined in an idiom (Defn: A specialized vocabulary used by a group of people; jargon; a style or manner of expression peculiar to a given people. ). The language that forms the basis of the idiom is essentially proprietary. However, the raw data in any domain typically describes the domain s real-world entities in real world terms (by definition the entities exist irrespective of the organisation that records them). There is a language gap between the language of the real world data and the idiomatic language of the business rules that must be addressed. This requires a step to validate the real world data as collected by the business, and to then transform it to align with the idiomatic phrasing used by the rules. Only then can the rules be applied and the business respond appropriately to the events described by the data. The idiom is the language used by the business to define its strategies, policies, and (lowest in this hierarchy) the rules which ultimately govern its behavior. For those seeking more background on this discussion, please read Decisioning the next generation of business rules (recently published on both the Business Rules Journal and Modern Analyst). The rules in this case are the sharp end of applied business strategy they are the means by which business policies actually get applied to real-world entities and their events. These rules are applied within discrete, atomic units that we refer to as decisions. A decision in this context is a unique, business defined outcome that is derived by a set of rules (all of which must be applied as a single unit-of-work). We can draw an analogy with molecules and atoms a decision is like a molecule; the smallest tangible outcome from a rules process that can exist in its own right. Whereas the rule is like an atom essential as part of a decision, but cannot be used in isolation to achieve any particular purpose. Copyright IDIOM Limited 2014 April 2014 Page 2 of 8

3 In order to apply the higher order, policy defined business rules (always in the form of decisions), we need to bridge the gap between the raw data and the business idiom. Ergo, an effective rules engine must also be a data validation and transformation engine. In fact, our experience suggests that the vast majority of rules development effort is in the validation and transformation area. But unless this effort is made, the higher order policy defined business rules are unable to function. Again, the validation and transformation rules are business defined (by definition) and belong in the same scope as the core business rules we started with. There is no useful boundary between a business rule that derives an intermediate value from one which derives the ultimate business outcome they are all just rules aggregated into decisions and ultimately into complete sets of decisions a.k.a. the Decision Model in IDIOM parlance. This is a useful point to recap we have now (re)defined the business rules scope as being everything involved in the transition of the raw business data describing an entity in one state to its return in a new state. This is an important observation it means that we can define all of the bespoke elements of an application within the business rules concept. So what is left in the traditional application? A series of generic event driven features and functions like searching, selecting and saving entities, applying business rules, and receiving and sending messages to other devices or locations (e.g. printers, webservices, queues, legacy systems etc.). These generic capabilities can be controlled by meta-data that is defined by the real-world capability of the feature or function itself their meta-data is static and externally defined, just like the realworld business data. And like that real-world business data, we can use rules to derive the system meta-data and explicitly control the system s features and functions rules are now the business owners remote control for the system. The above now implicitly defines a generic application that can service virtually any commercial need provided that the appropriate rules are supplied to define and apply the relevant business policies, and to then drive the supporting application features and functions (via their respective meta-data). Such an application is not hypothetical! IDIOM has now built many such applications, all very similar in concept and architecture to the application described in our paper Architecture for Agile Provisioning of Financial Products and Services. Most of these applications use a variation of a common underlying architecture, which includes the following generic concepts: Business policy is defined and implemented by a mix of rules and configuration documents, all of which are stored in the database, and which are themselves controlled by rules. The context data (i.e. the transaction and all of its related entity and event data) is stored extant as XML in an XML column in the database. The context data can be large and complex hundreds of thousands of nodes with many nested levels of hierarchy and they only need to be understood by the rules that govern them. Most other traditional database column values are generated by the rules, and only exist to provide database indexes or for the special needs of other (less agile) applications. Rules generated data is also used to align any and all other systems, including legacy and accounting systems, with the latest transaction state. This data is extracted automatically by rote when saving, and then routed to meta-data defined end-points. Copyright IDIOM Limited 2014 April 2014 Page 3 of 8

4 Forward looking actions and events are created by rules as Bring-Ups (automated future events) and Actions (targeted events for human users). By building an application using the above design approach, development time, cost and risk can be reduced by an order-of-magnitude. And the business will love you for an application that empowers them while still hiding the technical complexities. For those familiar with data design, the following sample database schema provides some insight into the underlying architecture of the design approach: In the above diagram, we can see the context data (the transaction XML document) stored as SoldProductXML in the Sold Product Instance table [blue]. Note that query performance against this structure can be better than with standard normalized database schemas because joins are rarely required. Also, full text search on the XML column can provide instant Google like search over the full extent of the database. The rules for managing this transaction XML can be found in the DecisionModelBinary column of the Decision Model table; IDIOM now routinely loads the decision model dll or JAR directly from the database (at least in those environments capable of it). The policy configuration parameters are in the ProductConfigXML in the Product table [green], and are delivered to the rules each time they execute. Copyright IDIOM Limited 2014 April 2014 Page 4 of 8

5 The Financial Entry, Bring-Up, and Action table rows are generated by the rules within the SoldProductXML and are automatically stripped off by the database handler when saving the SoldProductXML. The following two diagrams provide a high level view of the overall IDIOM approach, centered on the IDIOM Decision Manager in the first diagram. The second diagram highlights the Decision Engine and a sample set of decision models. The green arrow linking the diagrams is used to indicate the flow of decision models, which are exported in a manifest that includes generated source code. This code is compiled and executed behind the Decision Engine interface, all of which are provided in source code form (Java and/or C#) for peace of mind. Copyright IDIOM Limited 2014 April 2014 Page 5 of 8

6

7

8 Finis Established in 2001, IDIOM Limited is a private company based in Auckland, New Zealand. IDIOM develops and licenses decision-making software that automates business policy on a large scale, making systems more transparent and agile, while reducing development cost, risk, and time. IDIOM s innovative business oriented software is used by business users to graphically define, document, and verify corporate decision-making and related business rules; it then auto-generates these into small footprint, non-intrusive software components for use in systems of any type or scale. IDIOM is a pioneer in the development and use of decision oriented concepts, and has applied these concepts in the development of intelligent processes for customers around the world in local / state / central government, insurance /superannuation / finance, health admin / clinical health, telecoms, logistics, and utilities. IDIOM automated business policy and decision making extends far beyond mere business rules, so that ownership and control of larger and more complex decision making can be fully delegated to business experts. IDIOM enabled development and management of policy based decision making by policy owners creates a propitious business policy life-cycle that significantly improves business agility and transparency. IDIOM develops and licenses the IDIOM Decision Manager, IDIOM Forms, IDIOM Decision Tracker and the IDIOM Decision Manager Workbench. IDIOM Contact Details Mark Norton Director Idiom Limited Office Mob After Hrs Aust. Free Call Dominion Rd. Mt Eden Auckland 1024 PO Box Titirangi Auckland 0642 New Zealand mark.norton@idiomsoftware.com Skype Mark.Norton

21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation

21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation 21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.

More information

Excel and IDIOM. A Comparison. Whitepaper October 2017

Excel and IDIOM. A Comparison. Whitepaper October 2017 Excel and IDIOM A Comparison Whitepaper October 2017 +64 9 6308950 @ idiomsales@idiomsoftware.com idiomsoftware.com 2-2, 93 Dominion Road, Mount Eden, Auckland 1024 Excel and IDIOM Executive Summary...

More information

Strategy & Planning: Data Governance & Data Quality

Strategy & Planning: Data Governance & Data Quality Strategy & Planning: Data Governance & Data Quality April 30, 2017 In the era of big data and data science, most commercial and nonprofit organizations realize the potential power of data in accelerating

More information

QLIKVIEW ARCHITECTURAL OVERVIEW

QLIKVIEW ARCHITECTURAL OVERVIEW QLIKVIEW ARCHITECTURAL OVERVIEW A QlikView Technology White Paper Published: October, 2010 qlikview.com Table of Contents Making Sense of the QlikView Platform 3 Most BI Software Is Built on Old Technology

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

ENCRYPTION IN USE FACT AND FICTION. White Paper

ENCRYPTION IN USE FACT AND FICTION. White Paper White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

DATA MATCHING IN THE IDENTITY ECOSYSTEM

DATA MATCHING IN THE IDENTITY ECOSYSTEM DATA MATCHING IN THE IDENTITY ECOSYSTEM Increasing Identity Transactions by Enabling Service Providers THE OPEN IDENTITY EXCHANGE REPORT WRITTEN BY EMMA LINDLEY INNOVATE IDENTITY 1 Executive Summary O

More information

Jumpstarting the Semantic Web

Jumpstarting the Semantic Web Jumpstarting the Semantic Web Mark Watson. Copyright 2003, 2004 Version 0.3 January 14, 2005 This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License. To view a copy

More information

Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing.

Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Overview The desire to use tools to increase validation productivity with the consequent

More information

The Seven Steps to Implement DataOps

The Seven Steps to Implement DataOps The Seven Steps to Implement Ops ABSTRACT analytics teams challenged by inflexibility and poor quality have found that Ops can address these and many other obstacles. Ops includes tools and process improvements

More information

Fast Track Model Based Design and Development with Oracle9i Designer. An Oracle White Paper August 2002

Fast Track Model Based Design and Development with Oracle9i Designer. An Oracle White Paper August 2002 Fast Track Model Based Design and Development with Oracle9i Designer An Oracle White Paper August 2002 Fast Track Model Based Design and Development with Oracle9i Designer Executive Overivew... 3 Introduction...

More information

SYSPRO s Fluid Interface Design

SYSPRO s Fluid Interface Design SYSPRO s Fluid Interface Design Introduction The world of computer-user interaction has come a long way since the beginning of the Graphical User Interface, but still most application interfaces are not

More information

Efficient Object-Relational Mapping for JAVA and J2EE Applications or the impact of J2EE on RDB. Marc Stampfli Oracle Software (Switzerland) Ltd.

Efficient Object-Relational Mapping for JAVA and J2EE Applications or the impact of J2EE on RDB. Marc Stampfli Oracle Software (Switzerland) Ltd. Efficient Object-Relational Mapping for JAVA and J2EE Applications or the impact of J2EE on RDB Marc Stampfli Oracle Software (Switzerland) Ltd. Underestimation According to customers about 20-50% percent

More information

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the

More information

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision At-A-Glance Unified Computing Realized Today, IT organizations assemble their data center environments from individual components.

More information

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved. SECURITY REDEFINED Managing risk and securing the business in the age of the third platform 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices

More information

FHA Federal Health Information Model (FHIM) Information Modeling Process Guide

FHA Federal Health Information Model (FHIM) Information Modeling Process Guide Office of the National Coordinator for Health IT Federal Health Architecture Program Management Office FHA Federal Health Information Model (FHIM) Information Modeling Process Guide Version 0.1 Draft,

More information

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations

More information

DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee

DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee Documents initiate and record business change. It is easy to map some business

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Heads of Internal Audit Webinar. Integrated Assurance. 24 July In partnership with

Heads of Internal Audit Webinar. Integrated Assurance. 24 July In partnership with Heads of Internal Audit Webinar Integrated Assurance 24 July 2013 In partnership with WELCOME TO THE WEBINAR The audio for this webcast will be broadcast via your PC speakers you do not need to dial in.

More information

Applying Systems Thinking to MBSE

Applying Systems Thinking to MBSE Applying Systems Thinking to MBSE 1 Daniel Hettema, and Steven H. Dam, Ph.D., ESEP, SPEC Innovations, 571-485-7799 daniel.hettema@specinnovations.com October 2013 Overview What makes systems thinking different

More information

Oracle Endeca Information Discovery

Oracle Endeca Information Discovery Oracle Endeca Information Discovery Glossary Version 2.4.0 November 2012 Copyright and disclaimer Copyright 2003, 2013, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered

More information

Qlik s Associative Model

Qlik s Associative Model White Paper Qlik s Associative Model See the Whole Story that Lives Within Your Data August, 2015 qlik.com Table of Contents Introduction 3 Qlik s associative model 3 Query-based visualization tools only

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

IDIOM Transaction Engine

IDIOM Transaction Engine An Application to Manage Complex Business Entities Whitepaper October 2018 +64 9 6308950 @ idiomsales@idiomsoftware.com idiomsoftware.com 2-2, 93 Dominion Road, Mount Eden, Auckland 1024 IDIOM Transaction

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more

More information

Enabling efficiency through Data Governance: a phased approach

Enabling efficiency through Data Governance: a phased approach Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency

More information

ACCELERATING SAP: INNOVATION IN TEST AUTOMATION

ACCELERATING SAP: INNOVATION IN TEST AUTOMATION ACCELERATING SAP: INNOVATION IN TEST AUTOMATION Worksoft White Paper By Linda Hayes, Founder, Worksoft, Inc. v0709 2007 Worksoft, Inc. All rights reserved. Worksoft and Worksoft Certify are registered

More information

Up and Running Software The Development Process

Up and Running Software The Development Process Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running

More information

A scalable AI Knowledge Graph Solution for Healthcare (and many other industries) Dr. Jans Aasman

A scalable AI Knowledge Graph Solution for Healthcare (and many other industries) Dr. Jans Aasman A scalable AI Knowledge Graph Solution for Healthcare (and many other industries) Dr. Jans Aasman About Franz Inc. Privately held, Self-funded, Profitable since 1984 Headquartered: Oakland, CA Flagship

More information

Lecture c, Process Mapping: Yourdon Notation for Data Flow Diagrams, covers Yourdon notation for data flow diagrams.

Lecture c, Process Mapping: Yourdon Notation for Data Flow Diagrams, covers Yourdon notation for data flow diagrams. WORKFLOW ANALYSIS Audio Transcript Component 10 Unit 3 Lecture C Fundamentals of Health Workflow Process Analysis & Redesign Interpreting and Creating Process Diagrams Process Mapping Yourdon Notation

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

Teiid Designer User Guide 7.5.0

Teiid Designer User Guide 7.5.0 Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

TOPLink for WebLogic. Whitepaper. The Challenge: The Solution:

TOPLink for WebLogic. Whitepaper. The Challenge: The Solution: Whitepaper The Challenge: Enterprise JavaBeans (EJB) represents a new standard in enterprise computing: a component-based architecture for developing and deploying distributed object-oriented applications

More information

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users

More information

ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT

ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT THOUGHT PIECE ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT Brad Stone Vice President Stone_Brad@bah.com Brian Hogbin Distinguished Technologist Hogbin_Brian@bah.com

More information

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group

More information

Paper SAS Taming the Rule. Charlotte Crain, Chris Upton, SAS Institute Inc.

Paper SAS Taming the Rule. Charlotte Crain, Chris Upton, SAS Institute Inc. ABSTRACT Paper SAS2620-2016 Taming the Rule Charlotte Crain, Chris Upton, SAS Institute Inc. When business rules are deployed and executed--whether a rule is fired or not if the rule-fire outcomes are

More information

Key questions to ask before commissioning any web designer to build your website.

Key questions to ask before commissioning any web designer to build your website. Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,

More information

ITIL Service Lifecycle Strategy

ITIL Service Lifecycle Strategy ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based

More information

EBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD

EBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD EBOOK NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD NetApp ONTAP Cloud for Microsoft Azure The ONTAP Cloud Advantage 3 Enterprise-Class Data Management 5 How ONTAP Cloud

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

ITIL : Professional Education Training. Innovative solutions for modern businesses.

ITIL : Professional Education Training. Innovative solutions for modern businesses. ITIL : 2011 Professional Education Training Innovative solutions for modern businesses www.syzygal.com The ITIL Service Lifecycle ITIL (IT INFRASTRUCTURE LIBRARY) is a best practice framework for IT Service

More information

Tips for a Good Meshing Experience

Tips for a Good Meshing Experience Tips for a Good Meshing Experience Meshes are very powerful and flexible for modeling 2D overland flows in a complex urban environment. However, complex geometries can be frustrating for many modelers

More information

Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst

Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst Executive Summary Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst December 2014 This ESG White Paper

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information.

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information. Prof- Neeta Bonde DBMS (FYCS) Unit - 1 DBMS: - Database is a collection of related data and data is a collection of facts and figures that can be processed to produce information. Mostly data represents

More information

New Zealand Government IbM Infrastructure as a service

New Zealand Government IbM Infrastructure as a service New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as

More information

The Role of Converged and Hyper-converged Infrastructure in IT Transformation

The Role of Converged and Hyper-converged Infrastructure in IT Transformation Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational

More information

Microsoft Developing SQL Databases

Microsoft Developing SQL Databases 1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20762 - Developing SQL Databases Price $4290.00 (inc GST) Version C Overview This five-day instructor-led course provides students with the

More information

SAP BEX ANALYZER AND QUERY DESIGNER

SAP BEX ANALYZER AND QUERY DESIGNER SAP BEX ANALYZER AND QUERY DESIGNER THE COMPLETE GUIDE A COMPREHENSIVE STEP BY STEP GUIDE TO CREATING AND RUNNING REPORTS USING THE SAP BW BEX ANALYZER AND QUERY DESIGNER TOOLS PETER MOXON PUBLISHED BY:

More information

THE STATE OF IT TRANSFORMATION FOR RETAIL

THE STATE OF IT TRANSFORMATION FOR RETAIL THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State

More information

REGULATORY COMPLIANCE TODAY, THE STUFF WE CAN ALL LEARN

REGULATORY COMPLIANCE TODAY, THE STUFF WE CAN ALL LEARN REGULATORY COMPLIANCE TODAY, THE STUFF WE CAN ALL LEARN Chris Atkinson, Solutions Architect - Financial Services, MarkLogic NOT THIS! A SIMPLE ASK FROM OUR BUSINESS LEADERS Deliver a complete, accurate,

More information

Shaping the Cloud for the Healthcare Industry

Shaping the Cloud for the Healthcare Industry Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

Introduction to K2View Fabric

Introduction to K2View Fabric Introduction to K2View Fabric 1 Introduction to K2View Fabric Overview In every industry, the amount of data being created and consumed on a daily basis is growing exponentially. Enterprises are struggling

More information

SOME TYPES AND USES OF DATA MODELS

SOME TYPES AND USES OF DATA MODELS 3 SOME TYPES AND USES OF DATA MODELS CHAPTER OUTLINE 3.1 Different Types of Data Models 23 3.1.1 Physical Data Model 24 3.1.2 Logical Data Model 24 3.1.3 Conceptual Data Model 25 3.1.4 Canonical Data Model

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Take responsibility for completing tasks and procedures subject to direction or guidance as needed.

Take responsibility for completing tasks and procedures subject to direction or guidance as needed. Relevant LINKS BACK TO ITQ UNITS [1] Handbook home page [2] Overview This is the ability to select and use a range of word processing software tools and techniques to produce documents that are at times

More information

Categorizing Migrations

Categorizing Migrations What to Migrate? Categorizing Migrations A version control repository contains two distinct types of data. The first type of data is the actual content of the directories and files themselves which are

More information

Tableau Metadata Model

Tableau Metadata Model Tableau Metadata Model Author: Marc Reuter Senior Director, Strategic Solutions, Tableau Software p2 Most Business Intelligence platforms fall into one of two metadata camps: either model the entire enterprise

More information

Interaction Design

Interaction Design Interaction Design 9-12-2012 Overview of Interaction Design Understanding the Problem Space Conceptualizing the Design Space HW#2 posted, due Wednesday 9/19 Activity#3 due Monday, 9/24/12 Select your presentation

More information

Design Recovery & Rebuild with X-Analysis

Design Recovery & Rebuild with X-Analysis MANAGEMENT OVERVIEW A GUIDE TO THE BENEFITS OF USING DESIGN RECOVERY & REBUILD Design Recovery & Rebuild with X-Analysis Databorough Ltd. 66 York Road Weybridge UK info@databorough.com Phone +44 (0)1932

More information

ENTERPRISE DATA STRATEGY IN THE HEALTHCARE LANDSCAPE

ENTERPRISE DATA STRATEGY IN THE HEALTHCARE LANDSCAPE ENTERPRISE DATA STRATEGY IN THE HEALTHCARE LANDSCAPE MARKLOGIC WHITE PAPER The healthcare landscape is changing. Heightened competition and risk in this evolving environment demands an enterprise data

More information

MySQL for Developers. Duration: 5 Days

MySQL for Developers. Duration: 5 Days Oracle University Contact Us: 0800 891 6502 MySQL for Developers Duration: 5 Days What you will learn This MySQL for Developers training teaches developers how to develop console and web applications using

More information

Micro Focus Partner Program. For Resellers

Micro Focus Partner Program. For Resellers Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert

More information

Data ownership within governance: getting it right

Data ownership within governance: getting it right Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data

More information

2.3 Algorithms Using Map-Reduce

2.3 Algorithms Using Map-Reduce 28 CHAPTER 2. MAP-REDUCE AND THE NEW SOFTWARE STACK one becomes available. The Master must also inform each Reduce task that the location of its input from that Map task has changed. Dealing with a failure

More information

Professional Services for Cloud Management Solutions

Professional Services for Cloud Management Solutions Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their

More information

MySQL for Developers. Duration: 5 Days

MySQL for Developers. Duration: 5 Days Oracle University Contact Us: Local: 0845 777 7 711 Intl: +44 845 777 7 711 MySQL for Developers Duration: 5 Days What you will learn This MySQL for Developers training teaches developers how to develop

More information

The Open Group SOA Ontology Technical Standard. Clive Hatton

The Open Group SOA Ontology Technical Standard. Clive Hatton The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts

More information

Sub- PPL Unit-I Class-SE Comp

Sub- PPL Unit-I Class-SE Comp 1. We describe the basic concepts for structuring large programs (encapsulation, interfaces, information hiding) and the mechanisms provided by languages to support it (packaging, separate compilation).

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

J2EE Application Development : Conversion and Beyond Osmond Ng

J2EE Application Development : Conversion and Beyond Osmond Ng IBM Software Group J2EE Application Development : Conversion and Beyond Osmond Ng IBM Software Group Practitioner View Point IBM Rational Application Developer J2EE/EJB Tooling J2EE construction tools

More information

Shine a Light on Dark Data with Vertica Flex Tables

Shine a Light on Dark Data with Vertica Flex Tables White Paper Analytics and Big Data Shine a Light on Dark Data with Vertica Flex Tables Hidden within the dark recesses of your enterprise lurks dark data, information that exists but is forgotten, unused,

More information

Solved Question Paper June 2017

Solved Question Paper June 2017 Solved Question Paper June 2017 1.a) What are the benefits of Object Oriented Methodology in real life applications? Briefly explain each element of the state diagram with respect to dynamic modeling.

More information

1 Executive Overview The Benefits and Objectives of BPDM

1 Executive Overview The Benefits and Objectives of BPDM 1 Executive Overview The Benefits and Objectives of BPDM This is an excerpt from the Final Submission BPDM document posted to OMG members on November 13 th 2006. The full version of the specification will

More information

Deliver Data Protection Services that Boost Revenues and Margins

Deliver Data Protection Services that Boost Revenues and Margins FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing

More information

Smallworld Core Spatial Technology 4 Spatial data is more than maps tracking the topology of complex network models

Smallworld Core Spatial Technology 4 Spatial data is more than maps tracking the topology of complex network models Smallworld Core Spatial Technology 4 Spatial data is more than maps tracking the topology of complex network models 2004 General Electric Company. All Rights Reserved GER-4230 (10/04) Abstract Spatial

More information

Designing and debugging real-time distributed systems

Designing and debugging real-time distributed systems Designing and debugging real-time distributed systems By Geoff Revill, RTI This article identifies the issues of real-time distributed system development and discusses how development platforms and tools

More information

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY E-Guide WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY SearchSDN : S oftware-defined networking (SDN) and network technologies are being combined to fundamentally change our approach

More information

Question 1: What is a code walk-through, and how is it performed?

Question 1: What is a code walk-through, and how is it performed? Question 1: What is a code walk-through, and how is it performed? Response: Code walk-throughs have traditionally been viewed as informal evaluations of code, but more attention is being given to this

More information

Legacy Modernization to SOA using Compass/VB

Legacy Modernization to SOA using Compass/VB Legacy Modernization to SOA using Compass/VB Case Study Name Avi Yaeli, Netta Aizenbud, Jonathan Bnayahu, Nurit Dor, Alex Akilov, Sara Porat IBM Research Labs in Haifa Jenny Choy, IGS Oct. 27, 2005 IBM

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

Data Aggregation for Asset Reconciliation

Data Aggregation for Asset Reconciliation INTRODUCTION This paper focuses on data consolidation for asset reconciliation within hedge funds and long only asset managers. The process requires aggregation of data from a number of external sources

More information

Qlik. 10 key elements of a successful data strategy and modern analytics platform. February 2019 Julie Kae Executive Director, Qlik.

Qlik. 10 key elements of a successful data strategy and modern analytics platform. February 2019 Julie Kae Executive Director, Qlik. Qlik 10 key elements of a successful data strategy and modern analytics platform February 2019 Julie Kae Executive Director, Qlik.org Legal Disclaimer Qlik roadmaps provide a general overview of our anticipated

More information

Designing High-Performance Data Structures for MongoDB

Designing High-Performance Data Structures for MongoDB Designing High-Performance Data Structures for MongoDB The NoSQL Data Modeling Imperative Danny Sandwell, Product Marketing, erwin, Inc. Leigh Weston, Product Manager, erwin, Inc. Learn More at erwin.com

More information

Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process

Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process Introduction System tests, often called slow tests, play a crucial role in nearly every Java development

More information

Please view notes for further information on later slides

Please view notes for further information on later slides Please view notes for further information on later slides 1 2 Mobile telecoms planning is driven primarily by coverage of population and secondarily by coverage of geographic area, often with reference

More information

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS Building digital trust and cyber security resilience is no longer just an IT issue, it s a business mandate. Fusion brings a simplified approach to our client

More information