Second Generation Legacy to Web Strategies Via XML

Size: px
Start display at page:

Download "Second Generation Legacy to Web Strategies Via XML"

Transcription

1 Second Generation Legacy to Web Strategies Via XML Part 1 - Business Strategic Issues by Don Estes Table of Contents 1. BUSINESS STRATEGIC ISSUES 1.1 THE B2B IMPERATIVE 1.2 HOW TO B2B 1.3 MIDDLEWARE VERSUS NATIVE XML 1.4 XML EQUALS SQL EVERYWHERE 1.5 XML BOLT-ONS 1.6 XML SCHEMA AND DATA INTEGRITY 1.7 STANDARD XML DICTIONARIES 1.8 XML AND MAINFRAMES 1. Business Strategic Issues 1.1 The B2B Imperative Business-to-business (B2B) e-commerce via the Internet is a disruptive technology. It turns many classic rules of the old economy upside down, where yesterday's winners may be tomorrow's losers. In many markets, tomorrow's winners are now preparing to undercut the incumbent. Targeted companies will be those who are too inflexible in their business process and supporting IT systems to respond effectively in time, and they will go under or be absorbed. In particular, B2B promises that any intermediaries who do not add value or who have noncompetitive cost structures will be certain losers. Although some markets will narrow, creating several niches for nimble companies, there are also many markets where the "winner take all" effect will rule. This is the observation that certain goods and services, Microsoft Office and ebay being two well known examples, gain more in value as more people use them. Microsoft Word may be no better than WordPerfect, just as Excel may be no better than Lotus 1-2-3, but if you want to exchange files with others, you will pick the product which is ubiquitous rather than the one which is better. Similarly, you pick an auction site based on the largest number of members, not the best process or user interface. There are substantial financial benefits that will accrue to successful B2B initiatives. By 2003, Forrester Research estimates that B2B e-commerce will reach $3 trillion; Gartner Group estimates $4 trillion. The announcement of global part sourcing by the Big Three automakers show that they "got it", and estimates put the value at a 14% reduction in the cost of building a car. In fact, the cumulative effect of B2B is estimated by The Economist magazine 1, reviewing reductions in transaction costs of between 2% and 40% depending on the industry, to be a permanent increase of 5% in the output of goods and services in the first world economies. In the US alone, that would mean $400 billion per year, with 1/4% to 1/2% added to US annual GDP growth. 1.2 How To B2B Maintaining application-to-application (A2A) operational integration is a daily challenge within most enterprises. Extending A2A integration into B2B integration is being forced onto the IT agenda by the business case. Unfortunately, the unsatisfactory A2A solutions provided in the past will not provide successful strategies for the more difficult case of B2B integration. We need new strategies to provide the flexibility, responsiveness and robustness lacking in most A2A implementations. Once accomplished, a successful B2B integration strategy may be used to eliminate the operational headaches from old A2A solutions. IT management has 3 strategic options on how to get to the web: F Buy an off the shelf solution and interface it to your existing applications F Create a new application solution from scratch F Re-use your legacy applications There is no universal answer here. Each solution will be the best choice in different circumstances, sometimes under the same roof. A careful analysis is required to determine the pros and cons of each approach for each application. One must make the best choice, although it is unlikely that a single one will maximize cost, risk, quality, reliability,

2 and time to market simultaneously. We have a basic rule of thumb that we use: F If the legacy application no longer fits the business, buy or build new F If the legacy application does an adequate job, re-use it through modernization Although this and subsequent articles will focus on re-use of legacy applications, there are many times when a new solution would be preferable, and we are the first to recommend new when it makes business and technical sense. 1.3 Middleware Versus Native XML We consider middleware to be a first generation solution. If you have to get your legacy application up and running right now, there are several middleware solutions available. Many of these are quite popular, and do the job. However, middleware adds to the maintenance burden and fails to address underlying structural issues within the application itself. A significant part of the value of adopting XML derives from a comprehensive improvement in the robustness of module interfaces. Consider the classic screen scraper approach. The middleware intercepts the HTML message inbound from the workstation, translates it to a fixed format as expected by the target program, and passes it on to the host. On the way back, the middleware captures the screen image outbound to what the host program thinks is a character based terminal, translates it to HTML, and passes it on to the browser running on the workstation. However, whenever the underlying program has to be changed, the middleware must be modified at the same time, increasing the maintenance effort and complicating the deployment. A second-generation solution would perform these functions within the host program, so that there would be a single point of maintenance. When communicating with a character based terminal, the traditional logic would be executed, but when communicating with a browser, it would decode and encode a browser compatible document. This could be HTML, but XML provides a much more flexible exchange. An XML document provides the data to be displayed, and a companion stylesheet written in the extensible Stylesheet Language (XSL) provides the presentation information. An XML aware browser such as Internet Explorer 5.0 combines the XML and XSL and internally generates a temporary HTML for display purposes. A default XSL can be generated once from a utility, which reads, for example, CICS specifications and creates an XSL, which would display equivalently. However, once created, the XSL file can be edited and customized, and the support of presentation information separated from the host program. This will be particularly important where an application needs to be globalized, so that the XSL provides local language and display capabilities about which the host application needs to know nothing. First generation solutions are unlikely to provide these application-enhancing capabilities. The essence of the Internet is the use of open standards. Middleware is almost always a proprietary solution, and runs contrary to this open philosophy. A second-generation solution will bypass proprietary layers of software, and will focus on open source and open standards. For XML, this will mean maintaining the XML encoding and decoding logic directly into your programs, in the language in which they are written, or calling a universal encoding and decoding subroutine for which you control the source. 1.4 XML Equals SQL Everywhere XML is being touted as the most significant event in data exchange since SQL. XML provides a loosely coupled interchange of data that is very similar to SQL. However, XML is much more general than SQL, and it includes the ability to exchange data between application programs and browsers, between application programs and other application programs or subroutines, between application programs and post-processing utilities, and between application programs and databases. Consider the difference between traditional fixed record I/O formats and SQL databases. Whenever a file format changes, all programs using the file must be reviewed and recompiled, in some cases after maintenance modifications are made but also for programs which require no maintenance changes at all. Thus, fixed record I/O forces a tightly coupled data exchange. By contrast, SQL databases allow a unique definition of each data item for each program. Data items receiving SQL data need not have the same definition as the database column. When a database table changes, only programs whose logic is directly impacted by the change need to be reviewed, modified and recompiled. As a result, SQL provides a loosely coupled data exchange. Other than SQL databases, all current data exchange is tightly coupled. Data file formats are

3 fixed and must agree exactly for all users of that file. Data exchange between a fixed screen format and interpretive middleware is similarly tightly coupled. Data exchange between application programs, either through a CALL interface or through message passing, is almost always through a fixed format that must agree exactly. Users of EDI as well as tightly coupled architectures such as DCOM and CORBA are all familiar with the limitations and burdens imposed by the fixed structure. Adopting a loosely coupled data exchange architecture based on XML not only removes the need for middleware with its attendant maintenance burden, but it reduces the maintenance burden across all programs, which must share data. XML addresses this maintenance burden in three ways: decreased cost of maintenance, increased reliability of software, and decreased time to implement changes (i.e., time to market). With the responsiveness required for the new competitive environment being expressed in Internet time, perhaps the greatest benefit of XML will be the decrease in the time required for reliably changing software. 1.5 XML Bolt-Ons There is also another factor driving XML implementations: imposed standards. Recently, the U.S. Depository Trust Company (DTC), which handles securities trading settlement in the USA, and SWIFT, the international financial transaction network, announced that next year they will begin accepting data exchanges via XML documents. Although the legacy, fixed format data exchange will continue to be supported for the foreseeable future, it is clear that not moving to XML based exchange will impose a steadily increasing burden for users of their services in the next few years. This is a shot across the bow for companies that don't have plans for XML data exchange. Companies that don't embrace XML either for its benefits or to avoid being left behind technologically may be forced into it by their data exchange partners. However, in this case, it makes sense to consider a simple XML bolt-on solution. The few file or message interface formats required for external communication with an application that speaks XML certainly do not mandate the wholesale retrofitting of the legacy application for XML. In this case, one could simply use an XML generation utility or write the code into the affected program or programs to create an XML document in place of the old fixed record format. Deciding for wholesale use of XML versus a simple bolt-on is a management decision, not a technical decision. It is similar to the decision to replace VSAM, for example, with a SQL database in order to capture the larger benefits of the relational database environment: data integrity at the logical and context levels, and a loosely coupled interface between program and data. Why replace a perfectly good file system or old database with SQL? If you have a good reason to answer yes to SQL, then you have a good reason to answer yes to the wholesale use of XML, and perhaps a few additional ones as well. As a practical matter, at first most sites will use XML only at the interfaces with external applications. However, as the power of the XML interface becomes clear and supporting tools become available, XML data exchange will begin to be used for A2A integration, and eventually within applications as well. In fact, we see this beginning to happen with some of our customers. 1.6 XML Schema and Data Integrity B2B e-commerce is the ultimate challenge in program-to-program data sharing. Implementing XML as the data exchange mechanism addresses a critical part of the problem with its loosely coupled architecture, but another critical part remains: data integrity. Successful general-purpose data exchange requires absolute data integrity. Data integrity must be considered at 4 levels: F Physical layer - hardware F Logical layer - basic data attributes F Context layer - where and how used F Semantic layer - the meaning of the data The physical layer is usually taken for granted, ensuring that parity errors and other failures at the hardware level cannot contaminate our data. The logical layer requires programmers and database analysts to coordinate each data item definition with regard to its basic attributes, such as type (numeric, alpha, date, etc.), size, format, scale, valid values, and etc. Getting the logical layer right has been an on-going challenge since the advent of computers, but diligence combined with solid tools and procedures generally makes a failure at this layer an unusual event at most sites. The context layer is the focus of data integrity issues at most sites. This involves referential integrity among data files and database tables, data flow between modules, and where and how the data items are used. Given that the logical layer is under control, this is the layer where most data related failures will occur. The semantic layer is seldom the focus of data integrity concerns, but this will change with a

4 vengeance as B2B data exchange becomes common. When all data is exchanged internally, there may be differences in the meaning of a given data item's definition, but it is readily resolvable when issues arise because both sides of the exchange are entirely under one roof. This will not be so with B2B data exchange. When data must be exchanged among partners and competitors, among dissimilar cultures and languages, and among differing hardware and software platforms, we are facing a digital version of the Biblical Tower of Babel. XML provides the mechanism to address this issue through the concept of data tags. Regardless of what the data name or names by which a data items is identified in different contexts, it is assigned a universal data tag which uniquely identifies the semantic meaning of that data item whenever it is used. For example, our recent Y2000 experience could be characterized as a data tagging exercise, in which we had to identify dates wherever they appeared, ensure that their format was correct, and that their use was correct. Now, we need to do the same thing for all data items that are candidates for data exchange in B2B e-commerce. However, Y2000 was comparatively simple, because there was little problem agreeing on what MMDDYY or YYYYMMDD meant. Consider a simple tag such as "name". Does this mean "first name + space + last name", or "last name + comma + space + first name", or what? And that's a USA-centric view of the problem. How do SELLER ACCT-ID length 4, numeric STREET-ADDRESS CITY length 20 alphanumeric STATE-CODE length 2, alphanumeric ZIP-CODE length 9, numeric DESCRIPTION you include the fact that Spanish names have two family names? What an American would consider to be the family name would not be the last name in Spanish and elsewhere. In many Asian countries the family name is the first name. Then there are cultures where some people have only one name. Globalization with its complementary problem of localization of display and usage is beginning to expose this sort of problem even before B2B e-commerce issues are considered. 1.7 Standard XML Dictionaries Through the use of XML schema definitions, consistent dictionaries of agreed semantics can be published. Large sites and particularly large companies with multiple sites and dissimilar implementations can serve as a proving ground for the infrastructure needed for data tagging even before addressing e-commerce issues. However, how do we get everyone with whom we have to exchange data to agree on a common dictionary? There are several industry specific initiatives in progress at this time. For example: F FRXML - general accounting reporting, from AICPA F FIXML - XML definitions of the FIX transaction protocol, from FIX organization F FinXML - data interchange for capital markets, from Integral Corporation F FpML - derivatives and FX processing, from JP Morgan and PricewaterhouseCoopers F NTM - risk management and derivatives, from Infinity F XML/EDI - general electronic data interchange, from XML/EDI Group Ideally, we should just adopt the agreed standard and retrofit all our legacy applications with the BUYER ACCOUNT-CODE length 7, numeric ADDRESS-LINE-1 length 30, alphanumeric ADDRESS-LINE-2 length 30, alphanumeric CITY length 25, alphanumeric STATE-NAME length 20, alphanumeric ZIP-CODE length 5, numeric DESCRIPTION Fig. 1 - Disjointed Data Definitions relevant standard. Two problems immediately surface: the standards are still in flux, and our applications may fit the standards like a square peg in a round hole. XML comes to the rescue with the extensible Stylesheet Language Transformation (XSLT) process. Consider this disjointed set of data definitions ("dialects") between two data exchange partners (see Fig. 1 left). It is pretty straightforward to define an XSLT to transform the seller's XML dialect into the buyer's XML dialect. This provides a 2-tier translation scheme that will work nicely for two parties, as well as for in-house data exchanges between different systems. However, when other parties come into the exchange, this solution starts to break down. As participants increase in number, the number of 2- tier translations required goes up much faster than the number of participants. As a practical matter, it becomes necessary to move to a 3-tier translation scheme. One party transforms their unique dialect into the current draft of the proposed industry standard, all exchange is done in the standard dialect, and then a second transformation is

5 F O done into the other party's dialect. Only a relatively small number of transformations are required, R E C R O S S C O R P O R A T I O N regardless of the number of data exchange partners. These are the ultimate promises of XML: industry wide data exchange standards, and a loosely coupled data exchange architecture that is flexible enough to grow and to allow quick response to threats and opportunities. The rule in IT services has always been that if you can get the data right, then the processing logic is easy. However, data problems have been so intractable that solution providers have focused on the logic and just allowed disjoint data definitions to propagate. Now, XML comes forth with a practical solution to data issues which fit all significant issues. W H I T E P A P E R 1.8 XML and Mainframes Most of the current discussion and development related to XML involves off-mainframe platforms and solutions that do not directly address the realities of mainframes and large IT shop operations. Perhaps more importantly, the credibility of the technology has not been established in the minds of the key people who have to get the work out every day. Yet, it is precisely those shops that have the greatest need for the A2A and B2B integration capabilities provided by XML technology. In future articles, we will seek to bridge the gap between the XML developers and the mainframers. We will explore practical strategies to embrace XML, even for shops that continue to support older technologies but would benefit from selective modernization. We will discuss XML technical details from a mainframe point of view, including XML schema development recommendations to mirror mainframe databases. And, we will discuss how to implement second generation, native XML implementations, including integration into COBOL programs and direct interface between workstation browsers and mainframe programs. Author Bio: Don Estes is Director of Product Architecture for Forecross Corporation, a legacy to web and XML implementation solutions company. He is responsible for second-generation legacy to web products and services, including automated testing of transformed programs. Send your comments to Don_Estes@Forecross.com. Earlier versions of this paper appeared in the May, 2000 issue of the Cutter IT Journal, and the September - October, 2000 issues of eaj Journal. Permission is granted for reproduction and distribution of this document provided it is complete, unmodified, and retains all identification including this statement, and provided that notification of recipient is sent to the above address. All other reproduction and distribution is expressly forbidden. 1 April 1, 2000, Second Generation Legacy to Web Strategies Via XML - Business Strategic Issues

Chapter 1 Introduction to Enterprise Software

Chapter 1 Introduction to Enterprise Software Chapter 1 Introduction to Enterprise Software What Is Enterprise Software? Evolution of Enterprise Software Enterprise Software and Component-Based Software Summary If you have heard of terms such as

More information

XML-Based Business-to-Business E-Commerce

XML-Based Business-to-Business E-Commerce 62-01-97 XML-Based Business-to-Business E-Commerce Michael Blank MOST COMPANIES HAVE ALREADY RECOGNIZED THE BENEFITS of doing business electronically. E-commerce takes many forms and includes supply chain

More information

Enhancing the value of EDI through JEDI

Enhancing the value of EDI through JEDI Enhancing the value of EDI through JEDI The integration of EDI and JIWA Financials Introduction For over a decade Electronic Data Interchange (EDI) has been a major driver in delivering greater efficiencies

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2009 Vol. 8, No. 3, May-June 2009 Cloud Computing Benefits and Challenges! Dave Thomas

More information

Overview Document Framework Version 1.0 December 12, 2005

Overview Document Framework Version 1.0 December 12, 2005 Document Framework Version 1.0 December 12, 2005 Document History Date Author Version Description October 5, 2005 Carl Yestrau 1.0 First complete version December 12, 2005 Page A Table of Contents 1.0

More information

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business

More information

PA Treasury Department Mainframe Modernization to Windows Pennsylvania Treasury Department Bureau of Information Technology Solutions

PA Treasury Department Mainframe Modernization to Windows Pennsylvania Treasury Department Bureau of Information Technology Solutions PA Treasury Department Mainframe Modernization to Windows Pennsylvania Treasury Department Bureau of Information Technology Solutions Nomination Category: IMPROVING STATE OPERATIONS Nominated by Denise

More information

Extending the Benefits of SOA beyond the Enterprise

Extending the Benefits of SOA beyond the Enterprise Extending the Benefits of SOA beyond the Enterprise 2 TABLE OF CONTENTS 1 SOA The Right Approach for Application Integration...3 2 SOA outside the Firewall: An Opportunity to Improve Collaboration...4

More information

How To Set Up A Net Integration Firewall

How To Set Up A Net Integration Firewall Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2

More information

Strategic Enterprise Application Integration

Strategic Enterprise Application Integration Visible Solutions Strategic Enterprise Application Integration By Alan Perkins Chief Solutions Architect ASG Federal The biggest problem facing CIO's today is their existing applications. Enterprise Application

More information

Application Integration: The Future of Technology in Business

Application Integration: The Future of Technology in Business Application Integration: The Future of Technology in Business ISLANDS OF DATA Over the last twenty years, the trend for businesses has been to base application development on need a new application is

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

Understanding Client/Server Computing

Understanding Client/Server Computing Understanding Client/Server Computing By Will Fastie PC Magazine; "Enterprize Computing;" Back in the eighties when network equipment vendors first started to hawk their wares, the term client/server was

More information

Enterprise Application Integration

Enterprise Application Integration Enterprise Integration By William Tse MSc Computer Science Enterprise Integration By the end of this lecturer you will learn What is Enterprise Integration (EAI)? Benefits of Enterprise Integration Barrier

More information

Market Maturity. Cloud Definitions

Market Maturity. Cloud Definitions HRG Assessment: Cloud Computing Provider Perspective In the fall of 2009 Harvard Research Group (HRG) interviewed selected Cloud Computing companies including SaaS (software as a service), PaaS (platform

More information

EDISPHERE. Application Integration

EDISPHERE. Application Integration EDISPHERE Application Integration Integrates Internal Applications in the Format Desired By the Applications EDISPHERE can seamlessly integrate with your internal business applications in many different

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE

More information

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform Technical Discussion David Churchill CEO DraftPoint Inc. The information contained in this document represents the current

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

Service Oriented Architectures

Service Oriented Architectures 8 Service Oriented Architectures Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ The context for SOA A bit of history

More information

Infrastructures for Digital Business Ecosystems : the wrong question?

Infrastructures for Digital Business Ecosystems : the wrong question? Infrastructures for Digital Business Ecosystems : the wrong question? Maurizio De Cecco http://maurizio.dececco.name/ http://www.linkedin.com/in/mauriziodececco As an independent expert working for the

More information

Modernizing EDI. Drivers, Options, and Success Factors

Modernizing EDI. Drivers, Options, and Success Factors Modernizing EDI Drivers, Options, and Success Factors An EXTOL International White Paper Modern technical innovations are affecting transaction protocols, document types, communication methods, security,

More information

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti Francesco Maselli Technical Manager Italy Milano, 6 Maggio 2008 Aula magna di SIAM CONFIDENTIALITY STATEMENT AND COPYRIGHT

More information

EDI 101 An Introduction to EDI. NewEDI 1

EDI 101 An Introduction to EDI. NewEDI 1 EDI 101 An Introduction to EDI NewEDI 1 Table of Contents Introduction...3 What is EDI?...4 How EDI Works...7 Why Use EDI...9 What EDI Solutions are Available?...11 Need More Help?...13 Glossary of EDI

More information

UNLOCKING XBRL CONTENT

UNLOCKING XBRL CONTENT UNLOCKING XBRL CONTENT An effective database solution for storing and accessing XBRL documents An Oracle & UBmatrix Whitepaper September 2009 Oracle Disclaimer The following is intended to outline our

More information

INTEGRATION SOFTWARE: BUILD OR BUY?

INTEGRATION SOFTWARE: BUILD OR BUY? INTEGRATION SOFTWARE: BUILD OR BUY? DAVID CHAPPELL MARCH 2010 SPONSORED BY MICROSOFT CORPORATION No modern organization uses only one application. A single software solution just isn t enough to address

More information

Internationalization and Web Services

Internationalization and Web Services Internationalization and Web Services 25 th Internationalization and Unicode Conference Presented by Addison P. Phillips Director, Globalization Architecture webmethods, Inc. 25 th Internationalization

More information

Oracle 11g is by far the most robust database software on the market

Oracle 11g is by far the most robust database software on the market Chapter 1 A Pragmatic Introduction to Oracle In This Chapter Getting familiar with Oracle Implementing grid computing Incorporating Oracle into everyday life Oracle 11g is by far the most robust database

More information

XML and the College Website A Practical Look at the Use of XML and XSL

XML and the College Website A Practical Look at the Use of XML and XSL WHITE PAPER XML and the College Website A Practical Look at the Use of XML and XSL By Shahab Lashkari, Product Manager and Max Kaufmann, Technical Product Specialist, OmniUpdate What are XML and XSL, and

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

Create a single 360 view of data Red Hat JBoss Data Virtualization consolidates master and transactional data

Create a single 360 view of data Red Hat JBoss Data Virtualization consolidates master and transactional data Whitepaper Create a single 360 view of Red Hat JBoss Data Virtualization consolidates master and transactional Red Hat JBoss Data Virtualization can play diverse roles in a master management initiative,

More information

Whitepaper. Trans. for Mobile

Whitepaper. Trans. for Mobile Whitepaper Trans forming Your Vision Into Winning Solutions How to Save 50%, 75% or more for Mobile Appp Development www.baytechservices.com Background As mobile access has transitioned from a nice to

More information

Rotorcraft Health Management System (RHMS)

Rotorcraft Health Management System (RHMS) AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center

More information

business transaction information management

business transaction information management business transaction information management What CAM Is The CAM specification provides an open XML based system for using business rules to define, validate and compose specific business documents from

More information

Business Process Management in the Finance Sector

Business Process Management in the Finance Sector Business Process Management in the Finance Sector Leveraging the power of processes for profit oracle.com Introduction It is vital for financial services companies to ensure the rapid implementation of

More information

Relational Databases in the Cloud

Relational Databases in the Cloud Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating

More information

ISM/ISC Middleware Module

ISM/ISC Middleware Module ISM/ISC Middleware Module Lecture 14: Web Services and Service Oriented Architecture Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 14 Aims to: Introduce

More information

EVALUATING INTEGRATION SOFTWARE

EVALUATING INTEGRATION SOFTWARE ENSEMBLE WHITE PAPER EVALUATING INTEGRATION SOFTWARE INTRODUCTION We created this white paper to help senior IT leaders and business managers who are evaluating integration software. On the following pages

More information

Fueling ISV Success with Sharepoint Integration

Fueling ISV Success with Sharepoint Integration 3SHARP TECHNOLOGY BUSINESS BRIEF Fueling ISV Success with Sharepoint Integration Promote Widespread User Adoption of Your App It s counterintuitive, but for most software publishers some of the biggest

More information

Security for Application Service Providers

Security for Application Service Providers Security for Application Service Providers Overview Outsourcing is nothing new. Time sharing services for data processing have been around for some time. EDI applications have been at least partially outsourced

More information

Statement on End of Life of

Statement on End of Life of Statement on End of Life of Microsoft Visual FoxPro Written by: Glenn S. Phillips, Sr. Consultant Last Updated: March 4, 2011 SUMMARY Microsoft Visual FoxPro is a discontinued product. This will have an

More information

Using a Java Platform as a Service to Speed Development and Deployment Cycles

Using a Java Platform as a Service to Speed Development and Deployment Cycles Using a Java Platform as a Service to Speed Development and Deployment Cycles Dan Kirsch Senior Analyst Sponsored by CloudBees Using a Java Platform as a Service to Speed Development and Deployment Cycles

More information

How to Evaluate a CRM System

How to Evaluate a CRM System How to Evaluate a CRM System Implementing an effective Customer Relationships Management (CRM) software system is becoming increasingly necessary for companies struggling to weather the recession to build

More information

Document Engineering: Analyzing and Designing the Semantics of Business Service Networks

Document Engineering: Analyzing and Designing the Semantics of Business Service Networks Document Engineering: Analyzing and Designing the Semantics of Business Service Networks Dr. Robert J. Glushko University of California Berkeley glushko@sims.berkeley.edu Tim McGrath Universal Business

More information

1 It Exists. As you look around the Internet and the world of modern technology, you see computers

1 It Exists. As you look around the Internet and the world of modern technology, you see computers 1 As you look around the Internet and the world of modern technology, you see computers everywhere. Anyone old enough to remember the computer room of yesterday remembers the day when it contained one

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Gary Chen Research Manager, Enterprise Virtualization Software C a p i t a l iz i n g on the Cloud Revo l u t i o n w ith OpenStack March 2014 OpenStack was a project

More information

ThreatSpike Dome: A New Approach To Security Monitoring

ThreatSpike Dome: A New Approach To Security Monitoring ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product

More information

Purchases Based on Unused Features

Purchases Based on Unused Features Key Questions and Hidden Costs to Evaluate When Considering an Agency Management System, Company Interfaces, and other Technology 1 By Mele Fuller, SAFECO Insurance Company There are many things that are

More information

How to Leverage Information Technology and Win the Competitive Advantage

How to Leverage Information Technology and Win the Competitive Advantage White Paper 3 Reasons SCADA Software is Going Nowhere How to Leverage Information Technology and Win the Competitive Advantage White Paper 3 Reasons SCADA Software is Going Nowhere How to Leverage Information

More information

SOA Success is Not a Matter of Luck

SOA Success is Not a Matter of Luck by Prasad Jayakumar, Technology Lead at Enterprise Solutions, Infosys Technologies Ltd SERVICE TECHNOLOGY MAGAZINE Issue L May 2011 Introduction There is nothing either good or bad, but thinking makes

More information

Optimizing EDI for Microsoft Dynamics AX

Optimizing EDI for Microsoft Dynamics AX WHITE PAPER Optimizing EDI for Microsoft Dynamics AX Common challenges and solutions associated with managing EDI requirements, and how Accellos approach optimizes EDI performance for Dynamics AX users.

More information

Corporate Bill Analyzer

Corporate Bill Analyzer Corporate Bill Analyzer Product Description V 3.1 Contents Contents Introduction Platform Overview Core features Bill/Invoice presentment Corporate hierarchy support Billing Account hierarchy support Call

More information

Common Lisp for Service Oriented Architecture Programs. 555 12 th Street, Suite 1450 Oakland, CA 94607 Phone: 510-452-2000 www.franz.

Common Lisp for Service Oriented Architecture Programs. 555 12 th Street, Suite 1450 Oakland, CA 94607 Phone: 510-452-2000 www.franz. Common Lisp for Service Oriented Architecture Programs 555 12 th Street, Suite 1450 Oakland, CA 94607 Phone: 510-452-2000 www.franz.com Table of Contents LISP FOR SERVICE ORIENTED ARCHITECTURE PROGRAMS...

More information

What is Open Source? Open source is defined by three key components:

What is Open Source? Open source is defined by three key components: Integrating Open Source into your business To help businesses deal with the complexity of globalization, unanticipated opportunities, unexpected threats, competitive demands and fiscal constraints, a business

More information

Why Am I Still Up A Creek?

Why Am I Still Up A Creek? I Just Bought EDI Software! Why Am I Still Up A Creek? JUST LIKE PEOPLE, COMPUTERS CAN SPEAK DIFFERENT LANGUAGES and dialects, making communication difficult or impossible. Electronic Data Interchange

More information

11 ways to migrate Lotus Notes applications to SharePoint and Office 365

11 ways to migrate Lotus Notes applications to SharePoint and Office 365 11 ways to migrate Lotus Notes applications to SharePoint and Office 365 Written By Steve Walch, Senior Product Manager, Dell, Inc. Abstract Migrating your Lotus Notes applications to Microsoft SharePoint

More information

THE BUSINESS CASE FOR HYBRID HTML5 MOBILE APPS

THE BUSINESS CASE FOR HYBRID HTML5 MOBILE APPS Exploring the business case for building hybrid HTML5 mobile applications for enterprise mobility projects compared to implementing with a purely native development approach. THE BUSINESS CASE FOR HYBRID

More information

SaaS Model - A Solution For Clean Up Garbage Stamps

SaaS Model - A Solution For Clean Up Garbage Stamps APPLYING THE SOFTWARE AS A SERVICE MODEL TO AIR EMISSIONS INVENTORY COLLECTION Dan Derby MACTEC Engineering and Consulting, Inc. 5001 South Miami Blvd #300, Research Triangle Park, North Carolina, 27709

More information

Overcoming Obstacles to B2B Commerce SUCCESSFULLY EXCHANGE DATA BETWEEN TRADING PARTNERS

Overcoming Obstacles to B2B Commerce SUCCESSFULLY EXCHANGE DATA BETWEEN TRADING PARTNERS Overcoming Obstacles to B2B Commerce SUCCESSFULLY EXCHANGE DATA BETWEEN TRADING PARTNERS EXCHANGING DATA BETWEEN TRADING PARTNERS Complications often arise when communicating among businesses, particularly

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

Introduction into Web Services (WS)

Introduction into Web Services (WS) (WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?

More information

THE QUEST FOR A CLOUD INTEGRATION STRATEGY

THE QUEST FOR A CLOUD INTEGRATION STRATEGY THE QUEST FOR A CLOUD INTEGRATION STRATEGY ENTERPRISE INTEGRATION Historically, enterprise-wide integration and its countless business benefits have only been available to large companies due to the high

More information

University Data Warehouse Design Issues: A Case Study

University Data Warehouse Design Issues: A Case Study Session 2358 University Data Warehouse Design Issues: A Case Study Melissa C. Lin Chief Information Office, University of Florida Abstract A discussion of the design and modeling issues associated with

More information

ecommerce LMS Administrator s Manual

ecommerce LMS Administrator s Manual ecommerce LMS Administrator s Manual Table of Contents Introduction... 1 Logging in to the System... 2 Welcome Screen... 3 Modifying Your Personal Profile... 3 Changing Your Password... 7 Modifying Your

More information

WHITE PAPER Embedding Additional Value into Applications: What Enterprises Need Most from Application Vendors

WHITE PAPER Embedding Additional Value into Applications: What Enterprises Need Most from Application Vendors WHITE PAPER Embedding Additional Value into Applications: What Enterprises Need Most from Application Vendors Sponsored by: InterSystems Sandra Rogers January 2010 Stephen D. Hendrick Global Headquarters:

More information

separate the content technology display or delivery technology

separate the content technology display or delivery technology Good Morning. In the mobile development space, discussions are often focused on whose winning the mobile technology wars how Android has the greater share of the mobile market or how Apple is has the greatest

More information

4D and SQL Server: Powerful Flexibility

4D and SQL Server: Powerful Flexibility 4D and SQL Server: Powerful Flexibility OVERVIEW MS SQL Server has become a standard in many parts of corporate America. It can manage large volumes of data and integrates well with other products from

More information

Enterprise Integration Architectures for the Financial Services and Insurance Industries

Enterprise Integration Architectures for the Financial Services and Insurance Industries George Kosmides Dennis Pagano Noospherics Technologies, Inc. gkosmides@noospherics.com Enterprise Integration Architectures for the Financial Services and Insurance Industries Overview Financial Services

More information

Native, Hybrid or Mobile Web Application Development

Native, Hybrid or Mobile Web Application Development Native, Hybrid or Mobile Web Application Development Learn more about the three approaches to mobile application development and the pros and cons of each method. White Paper Develop a Mobile Application

More information

ebusiness Web Hosting Alternatives Considerations Self hosting Internet Service Provider (ISP) hosting

ebusiness Web Hosting Alternatives Considerations Self hosting Internet Service Provider (ISP) hosting ebusiness Web Hosting and E-Business Software Web Hosting Alternatives Self hosting Internet Service Provider (ISP) hosting Commerce Service Provider (CSP) hosting Shared hosting Dedicated hosting Considerations

More information

Mary E. Shacklett President Transworld Data

Mary E. Shacklett President Transworld Data Transworld Data Mary E. Shacklett President Transworld Data For twenty-five years, Transworld Data has performed technology analytics, market research and IT consulting on every world continent, including

More information

Developing in the MDA Object Management Group Page 1

Developing in the MDA Object Management Group Page 1 Developing in OMG s New -Driven Architecture Jon Siegel Director, Technology Transfer Object Management Group In this paper, we re going to describe the application development process supported by OMG

More information

SharePoint Integration

SharePoint Integration IT Best Practices Series SharePoint Integration Companies are increasingly using Microsoft SharePoint as a powerful development platform for specific business functions and as a collaboration tool. For

More information

RESEARCH PAPER. Integrating the hybrid cloud. It s time for IT to get full value from the cloud. February 2015. Sponsored by

RESEARCH PAPER. Integrating the hybrid cloud. It s time for IT to get full value from the cloud. February 2015. Sponsored by RESEARCH PAPER Integrating the hybrid cloud It s time for IT to get full value from the cloud February 2015 Sponsored by Contents Executive summary The challenge Storage of data and applications Security

More information

Escaping the mainframe trap

Escaping the mainframe trap Escaping the mainframe trap EXECUTIVE SUMMARY Mainframe environments have historically been the natural choice to run mission-critical business applications. However, as businesses plan their IT strategies

More information

Tables in the Cloud. By Larry Ng

Tables in the Cloud. By Larry Ng Tables in the Cloud By Larry Ng The Idea There has been much discussion about Big Data and the associated intricacies of how it can be mined, organized, stored, analyzed and visualized with the latest

More information

An Open Policy Framework for Cross-vendor Integrated Governance

An Open Policy Framework for Cross-vendor Integrated Governance An Open Policy Framework for Cross-vendor Integrated Governance White Paper Intel SOA Expressway An Open Policy Framework for Cross-vendor Integrated Governance Intel SOA Expressway delivers a pluggable

More information

Making Data Available on the Web

Making Data Available on the Web Making Data Available on the Web By Simba Technologies Inc. SimbaEngine ODBC SDK Introduction Many companies use web-based services to automate business processes like sales, track items like packages,

More information

Realizing the Benefits of Data Modernization

Realizing the Benefits of Data Modernization February 2015 Perspective Realizing the Benefits of How to overcome legacy data challenges with innovative technologies and a seamless data modernization roadmap. Companies born into the digital world

More information

INTEGRATION STRATEGIES FOR HEALTHCARE IT VENDORS COST-EFFECTIVE INTEROPERABILITY SOLUTIONS

INTEGRATION STRATEGIES FOR HEALTHCARE IT VENDORS COST-EFFECTIVE INTEROPERABILITY SOLUTIONS COST-EFFECTIVE INTEROPERABILITY SOLUTIONS Orion Health White Paper Drew Ivan, Director of Business Technology Table of Contents 1 Introduction 3 2 Problem 3 3 Solution 4 3.1 Solution benefits 5 4 Migration

More information

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

TechTarget Virtualization Media. E-Guide

TechTarget Virtualization Media. E-Guide TechTarget Virtualization Media E-Guide Desktop Virtualization: Expert Guide to VDI, Hypervisors, and More Many businesses fail to understand that the desktop virtualization space extends far beyond just

More information

Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College

Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Agenda Middleware the hidden part of IT CICS (Customer Information Control System) track record as a middleware

More information

Make the Leap from ecommerce to Omni- Channel

Make the Leap from ecommerce to Omni- Channel Iaodesign/Shutterstock An ecommerce platform is the foundation for a successful Omni- Channel business model arvato Systems North America 6 East 32nd Street, New York, New York 10016 United States All

More information

Setting Up an AS4 System

Setting Up an AS4 System INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu, www.entsog.eu,

More information

Qualify versus Quality Center A Comparison Between the HP & Original Software AQM Solutions. An Original Insight

Qualify versus Quality Center A Comparison Between the HP & Original Software AQM Solutions. An Original Insight Qualify versus Quality Center A Comparison Between the HP & AQM Solutions An Original Insight Introduction Today s business applications are increasingly complex and can provide a strategic competitive

More information

Small Business CRM Vendor Selection Process

Small Business CRM Vendor Selection Process Small Business CRM Vendor Selection Process Salesboom.com Need help in selecting a Small business CRM software vendor for your Small business? Looking for Web based Contact Management or Sales Management

More information

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Platforms High end solutions Microsoft.Net Java technology 1 Enterprise

More information

Integration Using the MultiSpeak Specification

Integration Using the MultiSpeak Specification Integration Using the MultiSpeak Specification By: Gary A. McNaughton, Cornice Engineering, Inc. and Robert Saint, National Rural Electric Cooperative Association Introduction Over the years many different

More information

Electronic Commerce. Chapter Overview

Electronic Commerce. Chapter Overview Electronic Commerce Chapter Overview This chapter presents an overview of how e-commerce works, from the perspective of the organization and the customer. Businesses and individuals use e-commerce to reduce

More information

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO.

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO. EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES Peter R. Egli INDIGOO.COM 1/16 Contents 1. EAI versus SOA versus ESB 2. EAI 3. SOA 4. ESB 5. N-tier enterprise architecture

More information

Selecting the Right Change Management Solution Key Factors to Consider When Evaluating Change Management Tools for Your Databases and Teams

Selecting the Right Change Management Solution Key Factors to Consider When Evaluating Change Management Tools for Your Databases and Teams Tech Notes Selecting the Right Change Management Solution Key Factors to Consider When Evaluating Change Management Tools for Your Databases and Teams Embarcadero Technologies July 2007 Corporate Headquarters

More information

Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com

Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing 1 P a g e Table of Contents What is the key to agility in Data Warehousing?... 3 The need to address requirements completely....

More information

High-Volume Data Warehousing in Centerprise. Product Datasheet

High-Volume Data Warehousing in Centerprise. Product Datasheet High-Volume Data Warehousing in Centerprise Product Datasheet Table of Contents Overview 3 Data Complexity 3 Data Quality 3 Speed and Scalability 3 Centerprise Data Warehouse Features 4 ETL in a Unified

More information

The Customizable Cloud. How the Cloud Provides the More Flexible Alternative to Legacy ERP Platforms

The Customizable Cloud. How the Cloud Provides the More Flexible Alternative to Legacy ERP Platforms How the Cloud Provides the More Flexible Alternative to Legacy ERP Platforms Executive Summary For years, Enterprise Resource Planning (ERP) applications have been instrumental in integrating business

More information

Improving Agility at PHMSA through Service-Oriented Architecture (SOA)

Improving Agility at PHMSA through Service-Oriented Architecture (SOA) Leveraging People, Processes, and Technology Improving Agility at PHMSA through Service-Oriented Architecture (SOA) A White Paper Author: Rajesh Ramasubramanian, Program Manager 11 Canal Center Plaza,

More information

Week 11: MIS 3537: Internet and Supply Chains

Week 11: MIS 3537: Internet and Supply Chains Week 11: and Case MIS 3537: Internet and Supply Chains and 2003 - Present Week 11: Supply Chain IT Standards MIS 3537: Internet and Supply Chains Learning Objectives Electronic Data Interchange: EDI RosettaNet

More information