Service Broker for 3 Party Enabling

Size: px
Start display at page:

Download "Service Broker for 3 Party Enabling"

From this document you will learn the answers to the following questions:

  • What does the whitepaper say would be included in WWW mash - ups?

  • What is an example of a Developer?

  • What does the figure 3 show a flow of service?

Transcription

1 Deutsche Telekom Laboratories An-Institut der Technischen Universität Berlin rd Service Broker for 3 Party Enabling Horst Stein, Niklas Blum (FhG Fokus) White Paper No. 5 August 2009

2 Abstract and Keywords Abstract and Keywords This whitepaper describes our approach to include telecommunications service enablers into WWW mash-ups or other 3 rd party applications by defining a policy-based service broker that mediates between the 3 rd party applications and real-time communication service enablers. Furthermore, defined policies serve besides service access definitions as a flexible expression for user/service-specific capabilities. Index Terms: Enabler, 3 rd Party enabling, mash-up, brokering, authorisation, delegation Status Public Participants Not restricted. Page 2

3 Table of contents Table of contents Abstract and Keywords Introduction Architecture Use Cases Outlook References Table of figures Page 3

4 1 Introduction The emerging Web 2.0 digital marketplace presents an important opportunity for telecommunications operators to offer their own capabilities as services. Besides communication services like short message service (SMS), voice-call or location, further capabilities like billing, identity management, authentication or control of Quality of Service (QoS) are candidates as telecommunications enablers for the development of new applications. Deutsche Telekom AG has launched its open development portal called Developer Garden [1] in November 2008 with some communications related enablers like SMS and voice call. The target of the portal is to expose simple interfaces for developers, who can combine these services to create web applications and new products. Via the open development portal, the 3rd party service developer becomes part of the community and gets access to core network functionalities using Web Services and the open programming interfaces via the software development kit. Comparable activities are performed in British Telecom's Ribbit [2] and in the Orange Partner program [3]. If the telecommunications operator exposes valuable sources of functionality and content to a wider audience, it is necessary to underpin the service delivery platform with certain security and management mechanisms. A set of technologies must be provided in order to control the access of the service, manage the impact of executing the service usage or apportion this payment according to revenue sharing rules if the service is partly or wholly owned by a 3rd party provider. Figure 1 provides an overview of the role of the service broker as part of the emerging web / telco service sphere. Introduction The Service Broker realises technical mechanisms for brokering between telecommunications and 3rd party service (e.g. Web 2.0 mash-ups, enterprise services) environments. Our approach is a policy-based service broker allowing the definition of request- and service-specific policies serving as Service Level Agreements (SLAs) between a service access gateway to service enablers in an operator environment and applications in 3rd party domains. The project is organized by Deutsche Telekom Laboratories in cooperation with the Fraunhofer Institute for Open Communication Systems (FOKUS). Figure 1 Enabler Environment for 3rd Parties Page 4

5 Architecture 2 Architecture The Service Broker is designed as several independent modules which are accessible through Open Mobile Alliance (OMA) Service Environment (OSE) [4] compliant interfaces. OMA defines several application service enablers and specifies general access functions for 3rd party service access in OSE as a common abstraction layer for IP Multimedia Subsystem (IMS)- based NGNs. Central element in OSE is the Policy Evaluation, Enforcement and Management (PEEM) component which intercepts service requests from a foreign domain as well as from any other service requestors and applies certain rules (policies). PEEM may be used for the authorizations of requests or to define enabler capabilities for exposure based on request policies. OMA has specified two interfaces PEM-1 [5] to trigger policy evaluation requests for intercepted service requests and PEM-2 [6] for policy retrieval from the policy repository. Our architecture of the Service Broker (figure 2) comprises Message Interceptor(s), Callable Interface PEM-1, Policy Evaluation Engine, Policy Enforcement Engine, Service Capability Manager, a workflow engine and the Policy Management Engine. Figure 2 Architecture of the Service Broker Page 5

6 In our experimental environment the Service Broker delegates service requests which address enabler services from Developer Garden, FOKUS Open IMS, and SOA Telco Playground based on policy definitions hold in a Policy repository (figure 2). Figure 3 illustrates a flow of service usage, i.e. from a service request to the service enabler using the evaluation mechanisms of the Service Broker. A policy is a formalism to manage resources, to provide controllable access and to reuse the existing resources exposed by an operator or 3rd party provider. Each policy is defined as a rule set and each rule is composed of conditions and actions. Actions may be either identifiers for responses of the Policy Enforcement Engine to allow or deny a certain request or the definition of a target in case of a defined delegation to a different service (e.g. an orchestrated service). Architecture The Policy Management Engine provides the mechanism for policy repository management and implements common operations such as uploading a policy, modifying it or deleting it. The underlying protocol is based on XML Configuration Access Protocol (XCAP) [7]. As an example to incorporate more complex services we make use of a Business Process Execution Language (BPEL)-based work-flow engine [8] which is targeted for delegation as defined within a specific policy. This mechanism allows that the original exposed service interface remains the same from a 3rd party service perspective, while the executed service that will be called through a defined action as part of the policy nevertheless provides a specific business logic, defined by the operator policy for a specific (3rd party) service or user. Service (Consumer) Service request Interceptor Service (Resource) PE request Callable Interface PE response PE responses: allow deny delegated services resp. PEv request PEn decision Policy Repository Policy Evaluation Engine PEv result Policy Enforcement Engine Delegated Delegated Service Delegated Service Delegated Service Service Figure 3 Flow of Service Usage Page 6

7 Use Cases 3 Use Cases One major use case of the Service Broker is authorization and delegation of service requests from a 3rd party service provider towards the operator domain (Figure 4). As the Service Broker is stateless, authorization is performed for every request. For each service enabler, an XSLT file has to be created for the interceptor providing the transformation according to OMA PEM-1 of the service request for policy evaluation [9]. Figure 4 Message flow for request authorisation Authorisation and delegation criteria are described in the policies e.g. related to request originator (e.g. domain, IP address, identity like SIP URI, tel URI, MSISDN) or request target (service identifier, identity like domain range, number scheme). This allows for instance to route an SMS request targeted for a customer from a specific country-provider (e.g. T-Mobile UK) to the related country specific resource (SMS Center of T-Mobile UK) based on a specific policy, without changing the call parameters. A second use case is the delegation to an additional service enabler in dependence of a special service contract (e.g. low budget service with advertisement vs. premium service without advertisement) through policies. The advantage using such a mechanism is that the functional (exposed) interface remains the same from the perspective of the service developer but the executed application logic may include certain business logics as advertisement enriched services. Page 7

8 Use Cases Figure 5 enabler Service Delegation to additional advertisement Further use cases (e.g. handling events - incoming call or messages - from the network based on policies, exposure of allowed enabler) are realised in the experimental setup. Page 8

9 Outlook 4 Outlook This whitepaper desribes the design for a service broker component based on state-of-the art SOA principles that take the latest standards and concepts in telecommunications into account. The work is based on a policy evaluation and enforcement engine that provides the capability to match service requests to operator defined policies. The policies allow a fine-grained service usage as a mapping of service contracts between service enablers, 3rd party services and users. From the presented perspective the unique approach is to provide one single standardized interface and policy expression format to evaluate service access, service usage as well as service capability information defined by the operator. Future work will concentrate on the dynamic service discovery, orchestration, and composition based on semantics, to allow the combination of many (operator-specific) service enablers automatically for more complex services. Page 9

10 References 5 References [1] [2] [3] [4] Open Mobile Alliance (OMA). OMA Service Environment. Approved Version Feb [5] Open Mobile Alliance (OMA).Policy Evaluation, Enforcement and Management Callable Interface (PEM1) [6] J. Rosenberg. RFC4825 The Extensible Markup Language (XML) Configuration Access Protocol (XCAP). May 2007 [7] IPsphere Framework Technical Specification (Release1) IPsphere 1.0. June IPsphere Forum [8] ActiveBPEL. [9] N. Blum, I. Boldea, T. Magedanz, U. Staiger, H. Stein, "A Service Broker providing Real-time Telecommunications Services for 3r d Party Services", Proc. of 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), Seattle, July 2009, ISBN , DOI /COMPSAC Page 10

11 Table of figures 6 Table of figures Figure 1 Enabler Environment for 3rd Parties...4 Figure 2 Architecture of the Service Broker...5 Figure 3 Flow of Service Usage...6 Figure 4 Message flow for request authorisation...7 Figure 5 Service Delegation to additional advertisement enabler...8 Page 11

12 Table of figures Publisher: Deutsche Telekom AG Laboratories Ernst-Reuter -Platz 7 D Berlin Telefon: Authors: Dr. Horst Stein (Deutsche Telekom Laboratories) Niklas Blum (Fraunhofer Institut für Offene Kommunikationssystem FOKUS) 2009 Deutsche Telekom Laboratories The information contained in this document represents the current view of the authors on the issues discussed as of the date of publication. This document should not be interpreted to be a commitment on the part of Deutsche Telekom Laboratories, and Deutsche Telekom Laboratories cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. Deutsche Telekom Laboratories makes no warranties - express, implied, or statutory - as to the information in this document. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of Deutsche Telekom Laboratories. Deutsche Telekom Laboratories may have patents, patent applications, trademarks, copyrights or other intellectual property rights covering the subject matter in this document. Except as expressly provided in any written license agreement from Deutsche Telekom Laboratories, the furnishing of this document does not give you any license to these patents, trademarks, copyrights or other intellectual property. Page 12

XML Document Management Architecture

XML Document Management Architecture XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the

More information

Presence SIMPLE Architecture

Presence SIMPLE Architecture Presence SIMPLE Architecture Approved Version 1.1 27 Jun 2008 Open Mobile Alliance OMA-AD-Presence_SIMPLE-V1_1-20080627-A OMA-AD-Presence_SIMPLE-V1_1-20080627-A Page 2 (21) Use of this document is subject

More information

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring

More information

SOA Driven Architectures for Service Creation Through Enablers in an IMS Testbed

SOA Driven Architectures for Service Creation Through Enablers in an IMS Testbed ITU Kaleidoscope 2011 The fully networked human? Innovations for future networks and services SOA Driven Architectures for Service Creation Through Enablers in an IMS Testbed Mosiuoa Tsietsi Rhodes University,

More information

AN AGILE SERVICE PLATFORM

AN AGILE SERVICE PLATFORM AN AGILE SERVICE PLATFORM FOR TELECOMMUNICATION ENVIRONMENTS Lajos Lange 1, Alexander Blotny 1, Thomas Magedanz 1 1 Fraunhofer Institute FOKUS, Kaiserin-Augusta Allee 31, 10589 Berlin, Germany Email: {Lajos.Lange

More information

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users

More information

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target

More information

Software Solutions for the Telecommunications Industry

Software Solutions for the Telecommunications Industry Software Solutions for the Telecommunications Industry A Unique Framework NCT software platform the building block Framework Architecture Framework Architecture NCT - Fault Management Fault Registration

More information

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In

More information

IAAS CLOUD EXCHANGE WHITEPAPER

IAAS CLOUD EXCHANGE WHITEPAPER IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support

More information

Pipeliner CRM Phaenomena Guide Opportunity Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Opportunity Management. 2015 Pipelinersales Inc. www.pipelinersales.com Opportunity Management 205 Pipelinersales Inc. www.pipelinersales.com Opportunity Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT. Creating and sharing

More information

Leveraging BPM Workflows for Accounts Payable Processing BRAD BUKACEK - TEAM LEAD FISHBOWL SOLUTIONS, INC.

Leveraging BPM Workflows for Accounts Payable Processing BRAD BUKACEK - TEAM LEAD FISHBOWL SOLUTIONS, INC. Leveraging BPM Workflows for Accounts Payable Processing BRAD BUKACEK - TEAM LEAD FISHBOWL SOLUTIONS, INC. i Fishbowl Solutions Notice The information contained in this document represents the current

More information

Service Delivery Platforms for Network Operators

Service Delivery Platforms for Network Operators Service Delivery Platforms for Network Operators 26 Service Delivery Platforms for Network Operators Kansuke Kuroyanagi Yuichi Mori OVERVIEW: SDPs deployed by mobile operators have been successfully growing

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org info@open-mtc.org 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

CRM Accelerators Overview

CRM Accelerators Overview CRM Accelerators Overview Microsoft Dynamics CRM November 2008 CRM Accelerators are a range of free-of-charge add-on solutions which are being developed for Microsoft Dynamics CRM 4.0 customers and partners.

More information

Pipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com Lead Management 205 Pipelinersales Inc. www.pipelinersales.com Lead Management Learn how to use sales lead management with Pipeliner Sales CRM Application. CONTENT. Creating and sharing the Sales Lead

More information

Location in SIP/IP Core (LOCSIP)

Location in SIP/IP Core (LOCSIP) in SIP/IP Core (LOCSIP) Conveyance with IMS: the OMA LOCSIP Service Enabler Mike Loushine / Don Lukacs Telcordia Applied Research 2009, Telcordia Technologies Inc. in SIP/IP Core (LOCSIP) Topics General

More information

BizTalk Server 2006. Business Activity Monitoring. Microsoft Corporation Published: April 2005. Abstract

BizTalk Server 2006. Business Activity Monitoring. Microsoft Corporation Published: April 2005. Abstract BizTalk Server 2006 Business Activity Monitoring Microsoft Corporation Published: April 2005 Abstract This paper provides a detailed description of two new Business Activity Monitoring (BAM) features in

More information

UPGRADE. Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV. Microsoft Dynamics Entrepreneur Solution.

UPGRADE. Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV. Microsoft Dynamics Entrepreneur Solution. UPGRADE Microsoft Dynamics Entrepreneur Solution Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV White Paper June 2008 The information contained in this document represents the current

More information

3GPP TS 24.623 V8.1.0 (2008-09)

3GPP TS 24.623 V8.1.0 (2008-09) TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol

More information

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner

More information

Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core

Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core T. Magedanz, P. Weik, D. Vingarzan, F. Carvalho de Gouveia, S.

More information

The OMA Perspective On SOA in Telecoms

The OMA Perspective On SOA in Telecoms The OMA Perspective On SOA in Telecoms Adopting SOA for Telecom Workshop, Open Standards Forum 2008 Ditton Manor, 30 September 3 October 2008 Musa Unmehopa» Chairman OMA Architecture Working Group» Distinguished

More information

Agenda. Overview. Federation Requirements. Panlab IST034305 Teagle for Partners

Agenda. Overview. Federation Requirements. Panlab IST034305 Teagle for Partners Agenda Panlab IST034305 Teagle for Partners Sebastian Wahle, sebastian.wahle@fokus.fraunhofer.de Overview Testbed Federation Requirements Panlab Roles Federation Architecture Functional Components of Teagle

More information

Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3.

Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3. Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0 Table of Contents Lab 1: Configuring and Managing WSS 3.0 1 Information in this document, including URL and other Internet

More information

Support and Service Management Service Description

Support and Service Management Service Description Support and Service Management Service Description Business Productivity Online Suite - Standard Microsoft Exchange Online Standard Microsoft SharePoint Online Standard Microsoft Office Communications

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

Service Broker Function in IMS Architecture - Issues and Considerations

Service Broker Function in IMS Architecture - Issues and Considerations 12th WSE International Conference on COMPUTERS, Heraklion, Greece, July 23-25, 2008 Function in IMS Architecture - Issues and Considerations HUI-NA CHUA, CHOR-MIN TAN Malaysian Research Centre, British

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003. White Paper

Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003. White Paper Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003 White Paper Published: October, 2003 Table of Contents Introduction 4 Relationship between

More information

MICROSOFT DYNAMICS CRM Roadmap. Release Preview Guide. Q4 2011 Service Update. Updated: August, 2011

MICROSOFT DYNAMICS CRM Roadmap. Release Preview Guide. Q4 2011 Service Update. Updated: August, 2011 MICROSOFT DYNAMICS CRM Roadmap Release Preview Guide Q4 2011 Service Update Updated: August, 2011 EXECUTIVE SUMMARY Microsoft has delivered significant innovation and value in customer relationship management

More information

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile s Maria Koutsopoulou, Spyridon Panagiotakis, Athanassia Alonistioti, Alexandros

More information

Deploying Fusion Middleware in a 100% Virtual Environment Using OVM ANDY WEAVER FISHBOWL SOLUTIONS, INC.

Deploying Fusion Middleware in a 100% Virtual Environment Using OVM ANDY WEAVER FISHBOWL SOLUTIONS, INC. Deploying Fusion Middleware in a 100% Virtual Environment Using OVM ANDY WEAVER FISHBOWL SOLUTIONS, INC. i Fishbowl Solutions Notice The information contained in this document represents the current view

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

XML Document Management Requirements

XML Document Management Requirements XML Document Management Requirements Candidate Version 2.0 16 Sep 2008 Open Mobile Alliance OMA-RD-XDM-V2_0-20080916-C OMA-RD-XDM-V2_0-20080916-C Page 2 (39) Use of this document is subject to all of the

More information

Veeam Task Manager for Hyper-V

Veeam Task Manager for Hyper-V Veeam Task Manager for Hyper-V Version 1.0 User Guide July, 2014 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Getting Started with Service- Oriented Architecture (SOA) Terminology

Getting Started with Service- Oriented Architecture (SOA) Terminology Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a

More information

A business view for NGN service usage

A business view for NGN service usage A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks

More information

Application of DCMI in an Internet Portal Data Center

Application of DCMI in an Internet Portal Data Center Application of DCMI in an Internet Portal Data Center Harry Rogers Principal Hardware Architect Bryan Kelly Systems Engineer Disclaimer Microsoft Corporation. All rights reserved. The information contained

More information

Overview of Active Directory Rights Management Services with Windows Server 2008 R2

Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Student Manual Module 5: Information Rights Management on Server Applications Information in this document, including

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

CRM Form to Web. Internet Lead Capture. Installation Instructions VERSION 1.0 DATE PREPARED: 1/1/2013

CRM Form to Web. Internet Lead Capture. Installation Instructions VERSION 1.0 DATE PREPARED: 1/1/2013 CRM Form to Web Internet Lead Capture Installation Instructions VERSION 1.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2013 Brite Global, Incorporated. All rights reserved. The information

More information

VoIP Conferencing. The latest in IP technologies deliver the next level of service innovation for better meetings. Global Collaboration Services

VoIP Conferencing. The latest in IP technologies deliver the next level of service innovation for better meetings. Global Collaboration Services Global Collaboration Services VoIP Conferencing The latest in IP technologies deliver the next level of service innovation for better meetings. ENERGIZE YOUR CONNECTIONS Table of Contents > > Contents...

More information

Convergent services in the service oriented architecture Natalya Yashenkova

Convergent services in the service oriented architecture Natalya Yashenkova Convergent services in the service oriented architecture Natalya Yashenkova The article describes how service oriented architecture and the standard OSS solutions can close the gap between the process

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

Programmabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper

Programmabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper Programmabilty Microsoft Dynamics AX 2009 Programmability in Microsoft Dynamics AX 2009 White Paper December 2008 Contents Introduction... 4 Scenarios... 4 The Presentation Layer... 4 Business Intelligence

More information

ETSI TS 124 423 V8.4.0 (2012-01)

ETSI TS 124 423 V8.4.0 (2012-01) TS 124 423 V8.4.0 (2012-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; TISPAN; PSTN/ISDN simulation services;

More information

Digital Marketing. SiMplifieD.

Digital Marketing. SiMplifieD. Digital Marketing. Simplified. DIGITAL MARKETING PAIN POINTS Research indicates that there are numerous barriers to effective management of digital marketing campaigns, including: Agencies and vendors

More information

Usage Analysis Tools in SharePoint Products and Technologies

Usage Analysis Tools in SharePoint Products and Technologies Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information

More information

Network Marketing With Appngin and Services

Network Marketing With Appngin and Services Say Hello to Service Delivery Platform for Converged Communication appngin helps telecommunication operators become more competitive with new and powerful next generation applications. It s an engine that

More information

Expanded Frequency Capping

Expanded Frequency Capping IMPLEMENTATION GUIDE Expanded Frequency Capping Ad Management at its best! August 2007 For more information, please contact support@zedo.com Disclaimer This Implementation Guide is for informational purposes

More information

Windows Small Business Server 2003 Upgrade Best Practices

Windows Small Business Server 2003 Upgrade Best Practices Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003

More information

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

HTTP State Management

HTTP State Management HTTP State Management Candidate Version 1.1 27 Feb 2007 Open Mobile Alliance OMA-TS-HTTPSM-V1_1-20070227-C OMA-TS-HTTPSM-V1_1-20070227-C Page 2 (17) Use of this document is subject to all of the terms

More information

Implementing Business Portal in an Extranet Environment

Implementing Business Portal in an Extranet Environment Implementing Business Portal in an Extranet Environment Published: December 2005 Table of contents Introduction...1 What is extranet access?...1 Why deploy Business Portal in an extranet?...1 Order Management...1

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or

More information

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation

More information

SharePoint Composites. Do-It-Yourself SharePoint solutions

SharePoint Composites. Do-It-Yourself SharePoint solutions SharePoint Composites Do-It-Yourself SharePoint solutions Executive Summary SharePoint Composites, the newest set of capabilities in Microsoft SharePoint Server 2010, enables do-it-yourself collaborative

More information

Pipeliner CRM Phaenomena Guide Importing Leads & Opportunities. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Importing Leads & Opportunities. 2015 Pipelinersales Inc. www.pipelinersales.com Importing Leads & Opportunities 205 Pipelinersales Inc. www.pipelinersales.com Importing Leads & Opportunities Learn how to import opportunities and leads into Pipeliner Sales CRM Application. CONTENT.

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Timesheet audit trail and absence reporting for DCAA. Syed Ali May 2014

Timesheet audit trail and absence reporting for DCAA. Syed Ali May 2014 Timesheet audit trail and absence reporting for DCAA This document describes the timesheet audit trail and absence reporting features in Microsoft Dynamics AX 2012 R3 that help organization meet requirements

More information

OAuth Guide Release 6.0

OAuth Guide Release 6.0 [1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or

More information

How To Understand The Benefits Of An Oss Architecture

How To Understand The Benefits Of An Oss Architecture IMS Management Issues. OSS challenges in a NGN environment. Dr. André Zehl Senior Manager Technology Strategy a.zehl @ t-online.net Deutsche Telekom AG Products & Innovation 3rd International FOKUS IMS

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:

More information

Deploying the Workspace Application for Microsoft SharePoint Online

Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

The Value of Certification

The Value of Certification The Value of Certification Connecting the dots between employers and employees March 2007 Introduction This whitepaper discusses how selected organizations view and ultimately compensate technical staff

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures 4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius

More information

AllJoyn Device System Bridge

AllJoyn Device System Bridge IoT Whitepaper AllJoyn Connecting device ecosystems Abstract The document describes how different types of industrial and consumer devices can be integrated into the AllJoyn ecosystem. With the, Microsoft

More information

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac. ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide

More information

Integrating Oracle ECM with ERP Systems: JDE, EBS and PeopleSoft JERRY ABER FISHBOWL SOLUTIONS, INC.

Integrating Oracle ECM with ERP Systems: JDE, EBS and PeopleSoft JERRY ABER FISHBOWL SOLUTIONS, INC. Integrating Oracle ECM with ERP Systems: JDE, EBS and PeopleSoft JERRY ABER FISHBOWL SOLUTIONS, INC. i Fishbowl Solutions Notice The information contained in this document represents the current view of

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

An Oracle White Paper June 2009. Integration Technologies for Primavera Solutions

An Oracle White Paper June 2009. Integration Technologies for Primavera Solutions An Oracle White Paper June 2009 Integration Technologies for Primavera Solutions Introduction... 1 The Integration Challenge... 2 Integration Methods for Primavera Solutions... 2 Integration Application

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt

More information

RS MDM. Integration Guide. Riversand

RS MDM. Integration Guide. Riversand RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.

More information

The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions

The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions Published: December 2008 Information in this document, including URL and other Internet Web site

More information

End-To-End Invoice Processing Automation at Land O Lakes NATALIE HAWLEY LAND O LAKES

End-To-End Invoice Processing Automation at Land O Lakes NATALIE HAWLEY LAND O LAKES End-To-End Invoice Processing Automation at Land O Lakes NATALIE HAWLEY LAND O LAKES i Fishbowl Solutions Notice The information contained in this document represents the current view of Fishbowl Solutions,

More information

ONEM2M SERVICE LAYER PLATFORM

ONEM2M SERVICE LAYER PLATFORM ONEM2M SERVICE LAYER PLATFORM Roland Hechwartner (Deutsche Telekom) onem2m TP Vice Chair Roland.hechwartner@t mobile.at onem2m www.onem2m.org 2015 onem2m The Partnership Project Over 200 member organizations

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

Active Directory Provider User s Guide

Active Directory Provider User s Guide Active Directory Provider User s Guide Mike Horton Version 01.00.03 Last Updated: December 28, 2007 Category: DotNetNuke v4.6.0 and greater Information in this document, including URL and other Internet

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

Feature for India (Third-party invoice)

Feature for India (Third-party invoice) Microsoft Dynamics AX Feature for India (Third-party invoice) White Paper Date: December 2006 Table of Contents Introduction... 3 Third-party invoice... 3 Post a third-party invoice...3 Forms for this

More information

SOA Blueprints Concepts

SOA Blueprints Concepts TECHNICAL SPECIFICATION Draft v0.5 (For Public Review) A move to drive industry standardization of SOA concepts and terminology http://www.middlewareresearch.com The Middleware Company Research Team Steve

More information

Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture

Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture Cisco Systems and Microsoft Corporation Published: September 2006 Abstract Cisco Systems, Inc. and

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security

More information

BYOD Guidance: Architectural Approaches

BYOD Guidance: Architectural Approaches GOV.UK Guidance BYOD Guidance: Architectural Approaches Published Contents 1. Service separation 2. Scenario 1: Exposing internal web applications 3. Scenario 2: Exposing email, calendar and contacts This

More information

A Proposed Model For QoS guarantee In IMSbased Video Conference services

A Proposed Model For QoS guarantee In IMSbased Video Conference services International Journal of Intelligent Information Technology Application, 2009, 2(5):243-249 A Proposed Model For QoS guarantee In IMSbased Video Conference services Maryam Kiani Department of Electrical

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Enhancing VoIP with Voice Peering

Enhancing VoIP with Voice Peering Enhancing VoIP with Voice Peering The Voice Peering Fabric is a service of Stealth Communications. Jinci Liu, Stealth Communications, Inc. Published: July 2005 (last revised January 2006) Abstract From

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Microsoft Dynamics NAV

Microsoft Dynamics NAV Microsoft Dynamics NAV Requirements for Microsoft Dynamics NAV 2013 System Requirements for Microsoft Dynamics NAV 2013... 1 System Requirements for the Microsoft Dynamics NAV Windows Client... 1 System

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information