Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Microsoft Corporation — Guidelines for Application Integration
Microsoft Corporation — Guidelines for Application Integration



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Guidelines for Application Integration

Автор: Microsoft Corporation

Аннотация:

This guide examines application integration in detail and describes the capabilities needed to enable application integration. It discusses major challenges involved and shows how you can adapt your environment to meet those challenges.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 148

Добавлена в каталог: 20.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Directories, extensible      68
Directories, integrating      72
Directories, meta-directories      68
Directory capability      126
Distributed Transaction Coordinator (DTC)      77
DTS (Data Transformation Services)      71
Dynamic data access      109
Encode/Decode capability      116
Encoding documents      89 116
Encryption      60 119
Encryption, secret key vs. public key      60
Environments, avoiding frequent rebuilds      14
Environments, choosing which to use      10
Environments, directories      See directories
Environments, independence from specific technology      10
Environments, integration hub      8—9
Environments, monitoring      See system monitoring
Environments, monitoring/maintaining      See operational management
Environments, point-to-point      7—8
Environments, requirements for      10
Environments, security      See security
Environments, stability, ensuring      67
Escalation rules      102
ETL (Extract, Transform, and Load)      12
event handling      67
Event handling by Microsoft technologies      93
Event handling, passive vs. active      122
event processing      79 98
Event Processing capability      98
Extensible directories      68
Extract, Transform, and Load (ETL)      12
Field Mapping      106
File transfer      116
File Transfer capability      116
File transfer, advantages of      116
File transfer, implementing application integration with      13
File/database access      110
Filtering data      108
forwarding messages      84 112
FTP      12. See also file transfer
Fully automated application integration      5. See also automated application integration
Fully automated application integration, combining with semi-automated application integration      6
Fully automated application integration, cost/benefit analysis      5
Fully automated application integration, manual override, impracticality of      6
Fully automated application integration, system breakdowns and      6
Functional-level authorization      58
Functoids      83
Health and Activity Tracker in BizTalk Server      94
HIS (Host Integration Server 2000)      71
Historical data mining      67
Host Integration Server 2000 (HIS)      71
Host Integration Server 2000 (HIS), host-based systemscommunicating directly with      71
HTTP      12
HTTP Basic authentication      56
HTTP requests, receiving/ delivering      72
Human involvement in application integration      13
Human Workflow Services (HWS)      77—78
Identity directory      126—127
Identity management      118
IIS (Internet Information Services)      72
Impersonation, in security context management      59
Implementing application integration      11—13
Implementing application integration with communications message protocols      12
Implementing application integration with direct data access      13
Implementing application integration with Extract, Transform, and Load      12
Implementing application integration with file transfer      13
Implementing application integration with human involvement      13
Implementing application integration with program calls      12
Implementing application integration with screen scraping      12
Implementing application integration with Web services      11
Increased usage, handling      64
Indirect addressing      111—112
Integrating directories      72
Integration hub environment      8—9
Integration hub environment, benefits and drawbacks of      9
Integration hub environment, number of interfaces needed for      9
Integration hub environment, scalability of      8—9
Integrity of data      See data integrity
Internet Information Services (IIS)      72
Journals      39
Kerberos      117 56
Kerberos, reply attacks and      58
latency      38—39. See also concurrency
Long-running transactions      49—51
Long-running transactions, aborting if not complete in certain time      51
Long-running transactions, ACID requirements and      49
Long-running transactions, database locking and      49
Long-running transactions, grouping shorter transactions into      50
Long-running transactions, timing out      51
Mainframes, sharing resources on      71
Malicious attacks      64
managing transactions      See transaction management
Manual application integration      4
Manual application integration, cost/benefit analysis      5
Manual application integration, efficiency of      4
Mapping data      105—106
merging data      See aggregation
message correlation      114
Message delivery      112. See also pipelines
Message forwarding      84 112
Message instrumentation      114
Message Queuing      46—47 73 113
Message routing      110 84
Message state, and State Management capability      99
MessageBox      84
Messaging, transactional      46—47
Meta-directories      68
Microsoft Distributed Transaction Coordinator (DTC)      77
Microsoft Operations Manager (MOM)      75
Microsoft technologies, authentication      See authentication
Microsoft technologies, authorization      See authorization
Microsoft technologies, BizTalk Server 2004      See BizTalk Server 2004
Microsoft technologies, Business Activity Management      93
Microsoft technologies, change management      94
Microsoft technologies, event handling      93
Microsoft technologies, Host Integration Server 2000 (HIS)      71
Microsoft technologies, identity management      91
Microsoft technologies, information protection      91
Microsoft technologies, Microsoft Operations Manager (MOM)      75
Microsoft technologies, nonrepudiation      92
Microsoft technologies, operational management capabilities provided by      93
Microsoft technologies, profile management      92
Microsoft technologies, security capabilities provided by      90
Microsoft technologies, security context management      92
Microsoft technologies, SQL Server 2000      See SQL Server 2000
Microsoft technologies, system monitoring      94
Microsoft technologies, Windows Server 2003      See Windows Server 2003
Microsoft technologies, Windows SharePoint Services      75
Microsoft technologies, XML      See XML
Microsoft Visual Studio .NET, and BizTalk Server      70
Modeling business processes      19—22
Modeling business processes, complex      19—22
Modeling business processes, complex, problems with      22
Modeling business processes, simple, examples of      19
Models      See environments
MOM (Microsoft Operations Manager)      75
Monitoring business transactions      66—67 93 122
Monitoring performance      65
monitoring resources      65
Monitoring security      66
monitoring systems      See system monitoring
Multicasting      112
Multifactorial authentication      56—57
Multistep processes, managing      98
Network monitoring, with Microsoft Operations Manager (MOM)      75
Network shares, authorization      57
nonrepudiation      92 121
Online analytical processing (OLAP)      71—72
Operational management      61—68
Operational management policy      61
Operational management policy, components necessary in      61
Operational management policy, defining terms in      62
Operational management, capabilities provided by Microsoft technologies      93
Operational management, capabilities required for      62
Operational management, policy      See operational management policy
Operational management, requirements, defining      62
Operational management, system monitoring      See system monitoring
Operations capabilities      121—127
optimistic concurrency      38—39
Orchestration capability      97
Orchestration, BizTalk Server      78
Organizational issues      14
parsers, XML      See XML parsers
Passive event handling      122
password management      57
Performance monitoring      65
Pessimistic concurrency      38
Pipelines, customizing      86
Pipelines, nonrepudiation support with      92
Point-to-point environment      7—8
Point-to-point environment, maximum number of connections      8
Point-to-point environment, problems with      8
Prioritization rules      102
Probing tests      63—64
Process state      99
Processing rules      77 100
Products, Microsoft      See Microsoft technologies
Profile management      119
Profile management in BizTalk Server      92
Program calls, implementing application integration with      12
Protocol bridging      90
Protocols, communications message      12
Provisioning, automated      124
Public key encryption vs. secret key      60
Public key encryption, key size, and level of security      121
Publish/subscribe addressing      111
Receive ports, vs. receive locations      85
Regression testing      126
release management      126
Reply attacks, Kerberos and      58
Request/reply communications      110
Request/reply communications, implementing      88—89
Resilient systems, failure in      65
Resource monitoring      65
Role-based authorization      57
routing messages      84 110
Routing, content-based      112
Rules processing      77 100
Rules Processing capability      100
Scalability      6—10
Scalability of integration hub environment      8—9
Scalability, automated application integration and      6
Schedule capability      99—100
Scheduling services      79
Schema definition      103 81
Schema definition, example of      104
Schema definition, forms of      103
Schema recognition      105
Schemas, checking      105
Schemas, definition      See schema definition
Schemas, preloading from standards organizations      103
Schemas, recognition      105
Schemas, validating      105
screen scraping      12
Secret key encryption, vs. public key      60
Security      53—61
Security context management      59 92 118
Security Context Management capability      118
Security of Web services      See Web Services Security specification
Security policy      53—55
Security policy, components to include      54
Security policy, creating      54
Security policy, referencing other documents in      55
Security, audit log      66
Security, authentication      See authentication
security, authorization      See authorization
Security, capabilities      117—121
Security, capabilities provided by Microsoft technologies      90
Security, capabilities required for      55
Security, communication plan, creating      54
Security, context management      See security context management
Security, data access log      66
Security, encryption      See encryption
Security, guidelines, creating      54
Security, logs, ensuring security of      66
Security, monitoring      66
Security, policy      See security policy
Security, requirements, defining      55—56
Security, risk analysis      56
Security, threat classification/ management      54
Security, token-based      58
Semantic mapping      106
Semi-automated application integration      4. See also automated application integration
Semi-automated application integration, combining with fully automated application integration      6
Semi-automated application integration, cost/benefit analysis      5
Semi-automated application integration, efficiency of      4
Serialization/deserialization      114
Service state      99
SharePoint      75
SharePoint Portal Server SSO system      91
Simulating human interface with applications      12
Single casting      113
Single sign-on (SSO)      91
SOAP requests, receiving/ delivering      72
SQL Server 2000      71—72
SQL Server 2000, Analysis Services      71—72 93
SQL Server 2000, Data Transformation Services      71
SSO system      91
Staged data access      109
State management      78 98—99
State Management capability      98—99
Storing messages in queues      46—47 73 113
Straight-through processing (STP)      30—33
Straight-through processing (STP) vs. composed applications      41
Straight-through processing (STP), business processing capabilities used in      31
Straight-through processing (STP), communications capabilities used in      32—33
Straight-through processing (STP), cost/benefit analysis      31
Straight-through processing (STP), Data Access capability      32
Straight-through processing (STP), data capabilities used in      32
Straight-through processing (STP), example of      31
Straight-through processing (STP), indirect access to applications, enabling      32
Straight-through processing (STP), Message Forwarding capability      32
Straight-through processing (STP), Serialization/Deserialization capability      33
Straight-through processing (STP), Transactional Delivery capability      33
Structure, centralized      See integration hub environment
Structure, decentralized      See point-to-point environment
Style sheets, XSLT      73
Subscription directory      126—127
Synchronizing data      See data synchronization
Synchronous communication vs. asynchronous communication      28
Synchronous communication, capabilities required for      29
Synchronous communication, composed applications and      43
System breakdowns, and fully automated application integration      6
System configuration snapshot      125
System health      64. See also system monitoring
system monitoring      63—66 121
System monitoring, application health monitoring      63—65
System monitoring, baselining      121—122
System monitoring, data aggregation and      63
System monitoring, performance monitoring      65
System monitoring, probing tests      63—64
System monitoring, security monitoring      66
System monitoring, system health monitoring      63—65
System-level authorization      57
TCP/IP      12
Technical issues      14
Terminal emulation software, and screen scraping      12
Timed transactions      51
Token-based security      58
Tracking request response time      65
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте