Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03
|
|
- Joel Walker
- 5 years ago
- Views:
Transcription
1 Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03
2 1 Objective of Paper 1.1 This document provides an overview of the Public Services Infrastructure (PSi). 2 Overview of PSi 2.1 PSi serves as a complete end-to-end platform for Government agencies in Singapore to develop, deploy and operate their e-services on the Internet efficiently and rapidly. Public Service Infrastructure Development Environment Testing Environment Quality Assurance Environment Production Environment Generator Application Services Application Services Application Services Application Services Platform Network Figure 1 Components of PSi 2.2 PSi comprises several components, namely, infrastructure, application services and the Generator (see Figure 1). The Generator is a development environment that allows developers to rapidly develop e-services. To simplify e-service development, PSi also provides a set of application services that can be used by e-services. These application services are payment, authentication and back office/legacy system integration services. 2.3 The Generator, application services and all e-services are deployed on the infrastructure layer of PSi. This infrastructure consists of a Page 1 of 7
3 set of hardware systems and software applications. The infrastructure is designed and constructed to cater to enterprise-scale e-service hosting requirements, such as being highly available and scalable. 3 Features of PSi 3.1 PSi provides high availability through its use of hardware redundancy, hotstandby machines, server clustering, system fail-over, and uninterruptible power supply. 3.2 PSi provides high performance through the use of enterprise-class servers and software applications. 3.3 PSi provides high scalability through the adoption of a multi-tiered design with multiple web servers, application servers and database gateways and servers. 3.4 PSi is platform independent. Its code can run in any J2EE compliant environment. 3.5 PSi is secure. Its Internet connection to the public is secured using the Secure Sockets Layer (SSL) protocol. It uses intrusion detection software to ward off hacking attempts. In addition to this, the PSi servers and system software are tested for and protected against common security flaws. 3.6 PSi is standards-based. It adopts the following standards: Java 2 Enterprise Edition (J2EE) o Java Server Pages (JSP) o Java Servlets o Java Database Connectivity (JDBC) o Enterprise JavaBeans (EJB) Extensible Markup Language (XML) Page 2 of 7
4 HyperText Markup Language (HTML) HyperText Transport Protocol (HTTP) 3.7 PSi adopts a thin-client approach. This means that developers do not need to install any software on their machines to start their e-service development. All they require is an Internet browser. 3.8 The PSi code is flexible and extensible. Flexibility is achieved through the use of plug-and-play component technology, and extensibility through the use of object-oriented programming technology. 4 Infrastructure 4.1 The underlying infrastructure that supports PSi is deployed on the SGNet government network. The infrastructure comprises hardware systems and software applications configured according to a multi-tier architecture. The infrastructure can be upgraded easily without affecting e-services that are already in the PSi production environment. Government agencies that develop and deploy their e-services on PSi need not set-up and maintain their own network infrastructures. 4.2 The infrastructure also consists of an Intermediate Zone (IZ) comprising hardware and database software that provides a data storage service to Government agencies. Government agencies can choose to use the IZ to host data that is essential to successful transaction completion. Alternatively, agencies can choose to integrate their own relational databases (RDBMS) or legacy systems directly into PSi without intermediate data storage. 4.3 A browser-based System Management Console (SMC) is provided as an infrastructure service for privileged users from agencies, or their appointed vendors. The SMC can be used to administer user accounts, e-services, application services, and reports. For example, privileged users can monitor the migration process between the different PSi environments. Page 3 of 7
5 4.4 Development of e-services in PSi takes place progressively across four identical environments (see Figure 1) i.e.: The Development environment, for developing e-services The Testing environment, for systems integration testing The Quality Assurance environment, for user acceptance testing The Production environment, for the delivery and provision of e-services to Internet users 4.5 The infrastructure has a Migration Service to manage the migration of e- services from the development environment, through to the testing, quality assurance and production environment. Each Government agency can specify the people who must vet each e-service before it is allowed to migrate to the next environment in the development cycle. These vetters can be Government officers or appointed vendors. 5 Application Services 5.1 The application services layer comprises a set of common services that most e-services would require. Typically, a Government agency will need to authenticate users, collect payments or access databases from their e- services. PSi satisfies these requirements by providing security, epayment and electronic data exchange (EDX) services. 5.2 The application services layer currently provides the following epayment mechanisms: NETSCash - Users may make payment for their transactions using a cash card on a PC with an attached cash card reader. Page 4 of 7
6 enets Debit - Users may make payment for their transactions via a direct debit from their bank account through the bank s secure Internet banking facilities. Customers will simply key in their Internet Banking User ID and PIN to effect a transaction. enets Credit - Users may make a credit card payment over the Internet using a Visa or Master credit card. The payment transactions are authorised by the credit card issuing bank in real-time. 5.3 When a payment collection process is invoked within an e-service, the PSi epayment service will prompt the Internet user to select the desired payment mechanism. PSi provides hardware, software and network connectivity to the relevant service providers to process payments electronically. Government agencies need not develop their own epayment services or make separate arrangements with electronic payment service providers. 5.4 PSi s security service provides the following features: Authentication of users via a User ID and password, or via a smart card. Encryption of data submitted via a smart card. Digital signing of data submitted via a smart card. SingPass Authentication Service - A service-wide single-factor authentication service to support electronic transactions over the Internet between the Government and, the general public and businesses. 5.5 The e-service developer can specify the level of security required for the e- service via the PSi Generator. For example, a developer can specify that an e-service requires authentication of at least a User ID and password. Users of the e-service can then use their User ID and password or a stronger authentication mechanism, (e.g., their smart card) to authenticate themselves. Page 5 of 7
7 5.6 PSi provides support for integration with the database and legacy systems of Government agencies via the EDX service. Each EDX service facilitates data transfer between the agency s database and its e-services built on PSi. The EDX service acts as a trusted proxy for e-services to query and write information to the database and legacy systems of the agencies. 5.7 An EDX service allows an e-service to retrieve or save information to or from designated databases. Databases can be located either at the PSi Intermediate Zone (IZ) or at the backend systems of the agencies. Hence, e- service developers can leverage on EDX services to access backend servers without worrying about interconnection issues. 5.8 An example of a database service offered by PSi using EDX is the Companies and Businesses Data Service (CBDS). CBDS provides information on companies and businesses for use by government e- services. The CBDS service will use information from the Companies and Businesses information maintained by the Registry of Companies and Businesses. 6 Generator 6.1 The Generator allows developers to: Develop the user interface of the e-service Developers are provided with a set of graphical components (e.g. check box, drop-down list box and text box) and can define how values for such components are captured or displayed. Implement the business logic for an e-service A high-level Business Rule Language is provided for e-service developers to code the business logic of their e-service. Create required variables and data fields and associate them with corresponding database values via EDX Page 6 of 7
8 Developers can define the database to retrieve/store the values for variables and data fields by selecting an appropriate EDX service for database access. Enabling security and cryptography functions for the e-service By selecting from a list of choices, developers can specify the security level for the e-service and other cryptography functions required, such as digital signature, encryption and SingPass authentication. Payment support for the e-service Developers can specify which supported epayment mechanism is to be provided by the e-service by selecting the appropriate epayment mechanisms. 7 Conclusion 7.1 PSi provides the Singapore Government a rich and highly-integrated centralised software platform to rapidly develop, deploy and operate public e-services on the Internet. With PSi, shared infrastructures and services can be easily reused by all the Government agencies, allowing for effective and efficient development and management of e-services. 7.2 PSi is designed and implemented with the forefront technologies and design approaches available in the IT industry to offer enterprise-scale services. Page 7 of 7
Novell Access Manager 3.1
Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete
More informationDeveloping Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation
Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation By the Sun Educational Services Java Technology Team January, 2001 Copyright
More informationVision of J2EE. Why J2EE? Need for. J2EE Suite. J2EE Based Distributed Application Architecture Overview. Umair Javed 1
Umair Javed 2004 J2EE Based Distributed Application Architecture Overview Lecture - 2 Distributed Software Systems Development Why J2EE? Vision of J2EE An open standard Umbrella for anything Java-related
More informationEnterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers
1. Introduction Applications are developed to support their business operations. They take data as input; process the data based on business rules and provides data or information as output. Based on this,
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationDistributed Multitiered Application
Distributed Multitiered Application Java EE platform uses a distributed multitiered application model for enterprise applications. Logic is divided into components https://docs.oracle.com/javaee/7/tutorial/overview004.htm
More information(9A05803) WEB SERVICES (ELECTIVE - III)
1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available
More informationWebSphere 4.0 General Introduction
IBM WebSphere Application Server V4.0 WebSphere 4.0 General Introduction Page 8 of 401 Page 1 of 11 Agenda Market Themes J2EE and Open Standards Evolution of WebSphere Application Server WebSphere 4.0
More informationPervasive Web Application Architecture. History Scalability Availability Development Application Architecture
Pervasive Web Application Architecture History Scalability Availability Development Application Architecture It support multiple devices, such as PCs, WAP phones, PDAs and voice-only phones enables to
More informationApplication Servers in E-Commerce Applications
Application Servers in E-Commerce Applications Péter Mileff 1, Károly Nehéz 2 1 PhD student, 2 PhD, Department of Information Engineering, University of Miskolc Abstract Nowadays there is a growing demand
More informationX100 ARCHITECTURE REFERENCES:
UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion
More informationAgent-Enabling Transformation of E-Commerce Portals with Web Services
Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:
More informationIBM CICS Transaction Gateway for Multiplatforms V7.1 delivers access to CICS containers and extended systems monitoring capabilities
IBM Europe Announcement ZP07-0457, dated November 6, 2007 IBM CICS Transaction Gateway for Multiplatforms V7.1 delivers access to CICS containers and extended systems monitoring capabilities Description...2
More informationWebSphere Application Server, Version 5. What s New?
WebSphere Application Server, Version 5 What s New? 1 WebSphere Application Server, V5 represents a continuation of the evolution to a single, integrated, cost effective, Web services-enabled, J2EE server
More informationBEA WebLogic Server. and BEA WebLogic Express. Introduction to BEA WebLogic Server 6.1
BEA WebLogic Server and BEA WebLogic Express Introduction to BEA WebLogic Server 6.1 BEA WebLogic Server Version 6.1 Document Date: June 24, 2002 Copyright Copyright 2002 BEA Systems, Inc. All Rights Reserved.
More informationAdapter for Mainframe
BEA WebLogic Java Adapter for Mainframe Introduction Release 5.1 Document Date: August 2002 Copyright Copyright 2002 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and documentation
More informationSoftlink International Liberty Security
Softlink International Liberty Security www.softlinkint.com The Product: Liberty Liberty is Softlink s flagship product for Special, Academic, Government and Public libraries used by hundreds of academics,
More informationBEAWebLogic. Server. Introduction to WebLogic Server and WebLogic Express. Version 8.1 Revised: June 28, 2006 Part Number:
BEAWebLogic Server Introduction to WebLogic Server and WebLogic Express Version 8.1 Revised: June 28, 2006 Part Number: 860-001002-012 Copyright Copyright 2003 BEA Systems, Inc. All Rights Reserved. Restricted
More informationOracle9i Application Server Architecture and Com
Oracle9i Application Server Quick Tour: Architecture Page 1 de 7 Oracle9i Application Server Architecture and Com Standard Edition Enterprise Edition Wireless Edition Services and Components To provide
More informationBusiness White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise
Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager
More informationOracle Service Bus Integration Implementation Guide Oracle FLEXCUBE Universal Banking Release [April] [2014]
Oracle Service Bus Integration Implementation Guide Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014] Table of Contents 1. INTRODUCTION... 1-1 1.1 SCOPE... 1-1 1.2 INTRODUCTION TO ORACLE
More informationJ2EE Interview Questions
1) What is J2EE? J2EE Interview Questions J2EE is an environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces
More informationIntroduction. Enterprise Java Instructor: Please introduce yourself Name Experience in Java Enterprise Edition Goals you hope to achieve
Enterprise Java Introduction Enterprise Java Instructor: Please introduce yourself Name Experience in Java Enterprise Edition Goals you hope to achieve Course Description This course focuses on developing
More informationLotus Learning Management System R1
Lotus Learning Management System R1 Version 1.0.4 March 2004 Administrator's Guide G210-1785-00 Contents Chapter 1 Introduction to the Learning Management System and Administration...1 Understanding the
More informationIntroducing Cisco Unified MeetingPlace Web Conferencing
CHAPTER 1 Introducing Cisco Unified MeetingPlace Web Conferencing This chapter contains the following sections: About Cisco Unified MeetingPlace, page 1-1 About Cisco Unified MeetingPlace Web Conferencing,
More informationProducts Included in the Installation Program
Oracle Fusion Middleware Getting Started With Installation for Oracle WebLogic Server 11g Release 1 (10.3.1) E13751-01 May 2009 This guide provides an overview of the WebLogic Server installation process
More informationBEAWebLogic Server. Introduction to BEA WebLogic Server and BEA WebLogic Express
BEAWebLogic Server Introduction to BEA WebLogic Server and BEA WebLogic Express Version 10.0 Revised: March, 2007 Contents 1. Introduction to BEA WebLogic Server and BEA WebLogic Express The WebLogic
More informationIBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce
Software Announcement February 1, 2000 IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Overview Payment Gateway for AIX,
More informationBEA WebLogic. Server. Introduction to WebLogic Server and WebLogic Express
BEA WebLogic Server Introduction to WebLogic Server and WebLogic Express Release 8.1 Document Revised: October 29, 2002 Copyright Copyright 2002 BEA Systems, Inc. All Rights Reserved. Restricted Rights
More informationEnterprise Java Security Fundamentals
Pistoia_ch03.fm Page 55 Tuesday, January 6, 2004 1:56 PM CHAPTER3 Enterprise Java Security Fundamentals THE J2EE platform has achieved remarkable success in meeting enterprise needs, resulting in its widespread
More informationDesigning a Distributed System
Introduction Building distributed IT applications involves assembling distributed components and coordinating their behavior to achieve the desired functionality. Specifying, designing, building, and deploying
More informationPLATFORM TECHNOLOGY UNIT-5
1. Write in brief about the J2EE enterprise edition? Java is one of the most commonly used and mature programming languages for building enterprise applications. Java development has evolved from small
More informationService-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA) SOA is a software architecture in which reusable services are deployed into application servers and then consumed by clients in different applications or business processes.
More informationIntroduction To Web Architecture
Introduction To Web Architecture 1 Session Plan Topic Estimated Duration Distributed computing 20 min Overview of Sun Microsoft Architecture 15 min Overview of Microsoft Architecture 15 min Summary 15
More informationVirtual Credit Card Processing System
The ITB Journal Volume 3 Issue 2 Article 2 2002 Virtual Credit Card Processing System Geraldine Gray Karen Church Tony Ayres Follow this and additional works at: http://arrow.dit.ie/itbj Part of the E-Commerce
More informationAppendix A - Glossary(of OO software term s)
Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationDemonstrated Node Configuration for the Central Data Exchange Node
Demonstrated Node Configuration for the Central Data Exchange Node DRAFT May 30, 2003 Task Order No.: T0002AJM038 Contract No.: GS00T99ALD0203 Abstract The Environmental Protection Agency (EPA) selected
More informationXenApp 5 Security Standards and Deployment Scenarios
XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards
More informationThe Cisco HCM-F Administrative Interface
CHAPTER 5 This chapter contains information on the following topics: Overview of Cisco HCM-F Administrative Interface, page 5-1 Browser Support, page 5-2 Login and Logout, page 5-4 Online Help, page 5-5
More informationORACLE IDENTITY MANAGER SIZING GUIDE. An Oracle White Paper March 2007
ORACLE IDENTITY MANAGER SIZING GUIDE An Oracle White Paper March 2007 Note The following is intended to provide consideration guidelines for sizing Oracle Identity Manager. It is intended for information
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationOracle WebLogic Server 11g: Administration Essentials
Oracle University Contact Us: +33 (0) 1 57 60 20 81 Oracle WebLogic Server 11g: Administration Essentials Duration: 5 Days What you will learn This Oracle WebLogic Server 11g: Administration Essentials
More informationIBM WebSphere Application Server V3.5, Advanced Edition for Linux Extends Support to Red Hat, Caldera, SuSE, and TurboLinux
Software Announcement December 5, 2000 IBM Server V3.5, Advanced Extends Support to Red Hat, Caldera, SuSE, and TurboLinux Overview WebSphere Application Edition for Linux manages and integrates enterprise-wide
More informationThe team that wrote this redbook
Preface p. xix The team that wrote this redbook p. xix Comments welcome p. xxiii Overview of WebSphere Application Server V3.5 p. 1 What is WebSphere Application Server? p. 1 WebSphere Application Server
More informationAdvanced Java Programming
Advanced Java Programming Length: 4 days Description: This course presents several advanced topics of the Java programming language, including Servlets, Object Serialization and Enterprise JavaBeans. In
More informationInside WebSphere Application Server
Inside WebSphere Application Server The anatomy of WebSphere Application Server is quite detailed so, for now, let's briefly outline some of the more important parts. The following diagram shows the basic
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationChapter 2 FEATURES AND FACILITIES. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 FEATURES AND FACILITIES SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: JDeveloper features. Java in the database. Simplified database access. IDE: Integrated Development
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationOutline. Project Goal. Overview of J2EE. J2EE Architecture. J2EE Container. San H. Aung 26 September, 2003
Outline Web-based Distributed EJB BugsTracker www.cs.rit.edu/~sha5239/msproject San H. Aung 26 September, 2003 Project Goal Overview of J2EE Overview of EJBs and its construct Overview of Struts Framework
More informationTransactionVision Technical White Paper
E X E C U T I V E S U M M A R Y Unique Solution TransactionVision is transaction tracking and analysis software that provides a real-time view of business transactions flowing through a distributed enterprise
More informationOracle WebLogic Server 12c: Administration I
Oracle WebLogic Server 12c: Administration I Duration 5 Days What you will learn This Oracle WebLogic Server 12c: Administration I training teaches you how to install and configure Oracle WebLogic Server
More informationIn the most general sense, a server is a program that provides information
d524720 Ch01.qxd 5/20/03 8:37 AM Page 9 Chapter 1 Introducing Application Servers In This Chapter Understanding the role of application servers Meeting the J2EE family of technologies Outlining the major
More informationEnterprise Java Beans
Enterprise Java Beans Taking IT easy with Middleware Premkumar Devanbu, Center for Software Systems Research Dept. of Computer Science, University of California, Davis, CA, USA. Outline Introduction, Motivation
More informationGemStone Systems. GemStone. GemStone/J 4.0
GemStone Systems The Software Infrastructure Technology Leader for the New B2B Economy GemStone/J 4.0 Minimizes total cost of ownership, while maximizing scalability, high availability, and rapid deployment
More informationIntroducing Cisco Unified MeetingPlace Web Conferencing
CHAPTER 1 Introducing Cisco Unified MeetingPlace Web Conferencing See the following sections: About Cisco Unified MeetingPlace, page 1-1 About Cisco Unified MeetingPlace Web Conferencing, page 1-1 Terms
More informationWHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationSmart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security
Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds
More informationBorland AppServer. Borland
Borland AppServer An Integrated Solution for Developing, Deploying, and Managing Distributed Multi-tier Applications. August 1998 Borland PAGE 1 Contents Introduction 4 Enterprises Shift to the Middle-tier
More informationWeb as a Distributed System
Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,
More informationOracle Developer Day
Oracle Developer Day Sponsored by: J2EE Track: Session #3 Developing JavaServer Faces Applications Name Title Agenda Introduction to JavaServer Faces What is JavaServer Faces Goals Architecture Request
More informationEllipse Web Services Overview
Ellipse Web Services Overview Ellipse Web Services Overview Contents Ellipse Web Services Overview 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 References 4 Definitions 4 Background 5
More informationIBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit
Software Announcement July 25, 2000 IBM V3.5, Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Overview WebSphere Application Server V3.5, manages and integrates
More informationOracle Service Bus. 10g Release 3 (10.3) October 2008
Oracle Service Bus Tutorials 10g Release 3 (10.3) October 2008 Oracle Service Bus Tutorials, 10g Release 3 (10.3) Copyright 2007, 2008, Oracle and/or its affiliates. All rights reserved. This software
More informationChapter 10 Web-based Information Systems
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 10 Web-based Information Systems Role of the WWW for IS Initial
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationMAKING THE BUSINESS CASE MOVING ORACLE FORMS TO THE WEB
MAKING THE BUSINESS CASE MOVING ORACLE FORMS TO THE WEB About Us Agenda Strategic Direction of Oracle Forms Applications Migration Options Migrating to 10g and 11g Migrating to J2EE and ADF Migrating to
More informationClient/Server-Architecture
Client/Server-Architecture Content Client/Server Beginnings 2-Tier, 3-Tier, and N-Tier Architectures Communication between Tiers The Power of Distributed Objects Managing Distributed Systems The State
More informationX-S Framework Leveraging XML on Servlet Technology
X-S Framework Leveraging XML on Servlet Technology Rajesh Kumar R Abstract This paper talks about a XML based web application framework that is based on Java Servlet Technology. This framework leverages
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationVendor: SUN. Exam Code: Exam Name: SUN Certified ENITRPRISE ARCHITECT FOR J2EE(tm)TECHNOLOGY. Version: Demo
Vendor: SUN Exam Code: 310-051 Exam Name: SUN Certified ENITRPRISE ARCHITECT FOR J2EE(tm)TECHNOLOGY Version: Demo QUESTION NO: 1 Which acts as a proxy to an EJB? A. home instance B. remote instance C.
More informationIBM Tivoli Federated Identity Manager Version Installation Guide GC
IBM Tivoli Federated Identity Manager Version 6.2.2 Installation Guide GC27-2718-01 IBM Tivoli Federated Identity Manager Version 6.2.2 Installation Guide GC27-2718-01 Note Before using this information
More informationSecure Internet Commerce -- Design and Implementation of the Security Architecture of Security First Network Bank, FSB. Abstract
Secure Internet Commerce -- Design and Implementation of the Security Architecture of Security First Network Bank, FSB. Nicolas Hammond NJH Security Consulting, Inc. 211 East Wesley Road Atlanta, GA 30305-3774
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationTechnical Description: Nixu Registry Server
Technical Description: Nixu Registry Server Nixu Software Oy Ltd A Nixu Group Company Keilaranta 15 FI-02150 Espoo Finland 1 1. Overview of Nixu Registry Server Nixu Registry Server is a Domain Name Registry
More informationControl-M and Payment Card Industry Data Security Standard (PCI DSS)
Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M
More informationService Oriented Architecture
Service Oriented Architecture Web Services Security and Management Web Services for non-traditional Types of Data What are Web Services? Applications that accept XML-formatted requests from other systems
More informationChapter 1 GETTING STARTED. SYS-ED/ Computer Education Techniques, Inc.
Chapter 1 GETTING STARTED SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: The IDE: Integrated Development Environment. MVC: Model-View-Controller Architecture. BC4J: Business Components
More informationExample Azure Implementation for Government Agencies. Indirect tax-filing system. By Alok Jain Azure Customer Advisory Team (AzureCAT)
Example Azure Implementation for Government Agencies Indirect tax-filing system By Alok Jain Azure Customer Advisory Team (AzureCAT) June 2018 Example Azure Implementation for Government Agencies Contents
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationUsing IBM DataPower as the ESB appliance, this provides the following benefits:
GSB OVERVIEW IBM WebSphere Data Power SOA Appliances are purpose-built, easy-to-deploy network devices that simplify, secure, and accelerate your XML and Web services deployments while extending your SOA
More informationPayment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security
More informationTOPLink for WebLogic. Whitepaper. The Challenge: The Solution:
Whitepaper The Challenge: Enterprise JavaBeans (EJB) represents a new standard in enterprise computing: a component-based architecture for developing and deploying distributed object-oriented applications
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop. Scalability: Dimensions for PACS System Growth
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Scalability: Dimensions for PACS System Growth Tony Damalas VP Technology, Diebold Security 8 th Annual
More informationSecure Access Troubleshooting Rewrite related issues (Core/Web Based Access)
Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource
More informationBEAWebLogic. Platform. Introducing WebLogic Platform. Version 8.1 Document Date: July 2003 Part Number:
BEAWebLogic Platform Introducing WebLogic Platform Version 8.1 Document Date: July 2003 Part Number: 885-001002-003 Copyright Copyright 2005 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend
More informationPeopleSoft Internet Architecture
PeopleSoft Internet Architecture AN OPEN ARCHITECTURE FOR INTERNET ACCESS AND INTEGRATION 3 ( 2 3 / (6 2 ) 7 Ã3 2 6, 7, 2 1 Ã3 $ 3 ( 5 - $ 1 8 $ 5 < Ã 3 (23/(6 2)7Ã, 17(51(7Ã$ 5&+,7(&785( - $18$5
More informationIBM SecureWay On-Demand Server Version 2.0
Securely delivering personalized Web applications IBM On-Demand Server Version 2.0 Highlights Delivers personalized Web solutions on demand to anyone, anywhere using profile serving Provides industry-leading,
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationJohn Heimann Director, Security Product Management Oracle Corporation
John Heimann Director, Security Product Management Oracle Corporation Oracle9i Application Server v2 Security What s an Application Server? Development and deployment environment Web(HTML,XML,SOAP) J2EE
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationSUN Enterprise Development with iplanet Application Server
SUN 310-540 Enterprise Development with iplanet Application Server 6.0 http://killexams.com/exam-detail/310-540 QUESTION: 96 You just created a new J2EE application (EAR) file using iasdt. How do you begin
More informationuick Start Guide 1. Install Oracle Java SE Development Kit (JDK) version or later or 1.7.* and set the JAVA_HOME environment variable.
API Manager uick Start Guide WSO2 API Manager is a complete solution for publishing APIs, creating and managing a developer community, and for routing API traffic in a scalable manner. It leverages the
More informationODYSSEY. cryptic by intent. Snorkel-TX. Feature Highlights & Technical Specifications. Odyssey Technologies Ltd.
Snorkel-TX Feature Highlights & Technical Specifications Snorkel-TX is a powerful transaction security server that enables failsafe authentication, access control, non-repudiation and integrity for web
More informationSingtel Managed Virtual Private Cloud powered by VMware. Fits Your Unique Business Needs Perfectly.
Singtel Business Product Factsheet Brochure Managed Defense Virtual Private Services Cloud powered by VMware Singtel Managed Virtual Private Cloud powered by VMware. Fits Your Unique Business Needs Perfectly.
More informationAdobe ColdFusion 11 Enterprise Edition
Adobe ColdFusion 11 Enterprise Edition Version Comparison Adobe ColdFusion 11 Enterprise Edition Adobe ColdFusion 11 Enterprise Edition is an all-in-one application server that offers you a single platform
More informationOverview p. 1 Server-side Component Architectures p. 3 The Need for a Server-Side Component Architecture p. 4 Server-Side Component Architecture
Preface p. xix About the Author p. xxii Introduction p. xxiii Overview p. 1 Server-side Component Architectures p. 3 The Need for a Server-Side Component Architecture p. 4 Server-Side Component Architecture
More information