Fundamental Points of the ABScard Technology

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Fundamental Points of the ABScard Technology"

Transcription

1 Fundamental Points of the ABScard Technology Architettura ABSCARD Pagina 1 di 13

2 General Index 1.Architecture Introduction Security Management ABScard enterprise version Verticalizations System Architecture Presentation Identification Application Database ABScard Function Diagram Installation Prerequisites Hardware Prerequisites Prerequisiti Software...13 Architettura ABSCARD Pagina 2 di 13

3 1.Architecture 1.1 Introduction ABScard is a transactional system developed with multi-tier technology, in order to guarantee a high degree of separation between the data and the presentation of the data. The use of Java language and TCP/IP protocol allows the system to be implemented through various types of servers (Windows, Linux, UNIX, etc.) The possibility to host the database on servers with high levels of security and performance (ex. Mainframe IBM, UNIX servers, Windows servers) along with its modular architecture make the ABScard able to carry out an elevated number of transactions per second. The ABScard system is multichannel, and the system is able to elaborate transactions coming from: Internet : interfaced through a browser. POS terminals and/or smart-card reader terminals: on hardware using ABScard software Hand-held devices/smartphone Self-Service terminals Mobile Phones: transactions formatted through GSM messages Thanks to the capacity to run transactions through POS terminals and mobile phones, ABScard extends the benefits of an innovative transactional system to traditional circuits. ABScard is the ideal solution for: Payment systems Customer loyalty and point accumulation systems Authentication systems Electronic ticket offices Municipal ID cards for citizens Online betting Mobile phone recharge or debit card recharge Architettura ABSCARD Pagina 3 di 13

4 1.1.1 Security The security of the transactions is one of the principle characteristics of the system, on the internet channel ABScard makes use of the most recent technology available today. The transaction data are encrypted with symmetric public key algorithms and authentification. The encrypting algorithm used in this version of the software is rijndael, which has been certified by NIST (National Institute of Standard and Technology, USA) as well as the new AES (Advanced Encription Standard). In addition, the session keys have a duration limited to the transaction, making any brute force attack, besides practically impossible, also inconsequential (the session key changes constantly). Further security is provided by strong-authentication which confirms the reciprocal authentication between the server application and the client. This provides protection against attacks using pirate-applet mecchanisms. On the POS channel, the ABScard protocal allows for various levels of security, from clear transmission to transaction encryption using banking standards. Architettura ABSCARD Pagina 4 di 13

5 1.1.2 Management The system management is done through software modules with internet browser type interfacing. This allows the installation of work units to be as simplified as possible. Security is guaranteed by a system of personized access, which selectively authorizes the access to management functions. In addition, every operation is performed by the server with a transaction, which guarantees the security and registration of all activity. The management transactions all the following type of operations to be performed: Back-Office o Management of system tables o Batch elaborations o Pre-established queries o Dynamic queries o Management of internal security profiles o Management of Retailers Help-desk o Card Management o Merchant Management o Client terminal management (ex. POS) o Operator profile management Through the configuration files it is possible to personalize the menus and queries, in order to rapidly and independently personalize/verticalize the system. Architettura ABSCARD Pagina 5 di 13

6 1.1.3 ABScard enterprise version Verticalizations The enterprise version of the ABScard server allows the system to be integrated and/or personalized. The following are possible: Advanced integration with external informative structures (ex. Gateway/Service Providers) Perform user application. New transactions (Java language) able to expand the current functions of the system or to create new applications. The user transactions allow enterprise applications to be created rapidly, taking advantage of the architeture of a system that is transactional, scalable and multi-platform. Enterprise functions are available even on ABScard certified client platforms (ex. POS), which allow a great flexibility in the implementation of new transacions or the personalization of existing ones. Architettura ABSCARD Pagina 6 di 13

7 1.2 System Architecture The system is structured in four levels or tiers, each single level performs a specific system function. The levels are defined as follows: Presentation Identification Application Database The separation into multiple levels allows the system to be installed making the best use of the hardware architecture, which has been conceptualized according to the highest possible security levels. The transactions are developed using the concept of channels, which allows for a versatile system respect to the transmissive channel, that is interfaced only on the Presentation level. The relationship between levels is represented by the following diagram: Presentation I dentification Application Database Figure 1. Architettura ABSCARD Pagina 7 di 13

8 1.2.1 Presentation The presentation level is performed by one or more servers specialized in the channel function (gateway server) from which the transactions are received. The task of the presentation level is to carry out all of the specific functions of a determined channel and to streamline communication with the successive levels. On the internet channel, the function is performed through a web-server, which must support the execution of active pages (typically JSP) and be able to recall Java classes. The execution of the transactions does not require any application to be installed; the interfacing is done through an internet browser. The applied logic of the presentation is done through Java applet. On the POS channel, the presentation function is performed by a POS gateway server, which interfaces with the periferical communication devices towards the POS terminals. The execution of the transactions takes place through POS terminal, or hardware devices with smart-card readers, that have the client-pos ABScard software installed. The terminals connect to the server through one of the typical means of communication, such as a dedicated telephone line, a LAN/GPRS connection or serial connection. The concentration is done either by concentration device hardware or by service providers (ex. TNS). The server acts as the gateway towards the identification level. On the Mobile channel, the presentation function is performed by a GSM gateway server, that is able to communicate with devices or channels of transmission/reception of SMS messages towards the SMS service provider. The execution of the transaction takes place through telephones, typically mobile telephones, able to send SMS messages. The use of TCP protocol and encryption allows the presentation level to be geographically distributed in respect to the server applications. Architettura ABSCARD Pagina 8 di 13

9 1.2.2 Identification The identification level is implemented by one or more specialized server applications (called Identification Servers). Cyphering/deciphering the transactions Transaction identification Proxing of the transactions applied on one or more application server The function of proxing allows the transaction load to be distributed to multiple applied servers. Therefore, it is possible to specialize the servers for transaction groups. For volumes of elevated transactions, this function can be integrated with hardware devices for traffic balancing, that allows for the creation of redundant architecture at a high level of service Application The application level is implemented by one or more server applications. The server communicates with the identification level and normally accesses data by communicating with the database level by way of multiple connections (connection pool). An application server (APS) carries out the following functions: Syntactical check of the transactions Elaboration of the transactions Composition of the reply Registration (logging) Database The database level is implemented using a relational type database. The DBMS, to be compatible with the ABScard server, must be able to support SQL transactions and multiple connections via DJBC connections. Architettura ABSCARD Pagina 9 di 13

10 1.3 ABScard Function Diagram The following diagram shows the flow of a generic transaction coming from different clients. Protocol Converter HW or Protocol Converter Provider PTSN/GPRS POS Gateway ABScard Telephone Recharge (Jastfin) TCP/IP WebServer Gateway Application/ Identification Server ABScard Bet Providers Bank (acquirer Visa) Gateway GSM ABScard Database TCP/IP GSM PROVI DER Client Tier Service Delivery Center ABS Service Provider Tier Figure 2. Architettura ABSCARD Pagina 10 di 13

11 The elevated versatility allows the activation of a congruous number of servers for elevated transactional loads, or to concentrate the identification and application functions on a sole server. The separation of the protocol from the transactions (based on XML) and the presentation level allows for the modification of existing interfaces or the implementation of new communication channels, leaving the application server architecture unchanged. Architettura ABSCARD Pagina 11 di 13

12 1.4 Installation Prerequisites Hardware Prerequisites The ABScard system was developed to be independent from the hardware platform. It can be installed on a variable number of servers depending on the transactional volume that the system must support. The communication through TCP/IP Protocol, limited to the ports used, must be allowed between the servers that host the system and that are separate from systems of a hardware or software type. The number and the strength of the servers on which the system is installed is based on the transactional volume that must be guaranteed, from the access channel and also from the type of the transactions themselves. The web server, given the limited space on the disk and the elaborative load required by the system, does not require any particular strength. It is, however, necessary to adequately size the internet access keeping in mind the average dimensions of the pages (especially those containging applet) and the number of simultaneous connections that must be guaranteed. The Identification Server, having the highest elaborative load due to encryption, must be characterized by an adequate power in CPU. A multiprocessor server is often necessary, also to guarantee adequate transaction response times. The Application Server does not have specific characteristics, being above all the most easily expandible level (thanks to the transaction balancing function of the identification server). It can be flanked by other servers if necessary. The database server obviously requires characteristics regarding reliability in terms of data storage. Architettura ABSCARD Pagina 12 di 13

13 1.4.2 Prerequisiti Software Component Software Platform Notes Identification Server Multiplatform Requires Java Runtime 1.4 or higher. Application Server Multiplatform Requires Java Runtime 1.4 or higher. POS Server Multiplatform Requires Java Runtime 1.4 or higher. Database Multiplatform Certified with Microsoft SQL Server, MySQL, Oracle. Requires database with JDBC interface. Gateway Internet Multiplatform Requires WEB Server compatibile con JSP o ASP Gateway GSM Multiplatform Requires Java Runtime and specific interface with SMS carrier Helpdesk/backoffice via WEB Helpdesk/backoffice Client Multiplatform Multiplatform Requires WEB Server JSP or ASP compatible Requires Java Runtime 1.4 or higher. Architettura ABSCARD Pagina 13 di 13

All Business Solutions s.r.l. P.IVA 03645370283 www.abscard.com. Sede Legale Via Ripamonti, n.89 20141 Milano Tel. +39 2.36504272 Fax. +39 2.

All Business Solutions s.r.l. P.IVA 03645370283 www.abscard.com. Sede Legale Via Ripamonti, n.89 20141 Milano Tel. +39 2.36504272 Fax. +39 2. The ABScard system is the most innovative solution of its kind on the market for its services of customer loyalty and payment methods to supplement traditional banking services. All Business Solutions

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

Premium Server Client Software

Premium Server Client Software Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011 DBMS Infrastructures and IT Career Recommendations Jeff Fineberg November 21, 2011 Topics Importance of Databases Security Computing Environments / Infrastructures Methodologies for Data access Database

More information

Stock Trader System. Architecture Description

Stock Trader System. Architecture Description Stock Trader System Architecture Description Michael Stevens mike@mestevens.com http://www.mestevens.com Table of Contents 1. Purpose of Document 2 2. System Synopsis 2 3. Current Situation and Environment

More information

SMPP Gateway. Whitepaper. Whitepaper AGOSTO 2009. www.iquall.net/mensajeria_smppgateway.html

SMPP Gateway. Whitepaper. Whitepaper AGOSTO 2009. www.iquall.net/mensajeria_smppgateway.html Whitepaper Whitepaper AGOSTO 2009 www.iquall.net/mensajeria_smppgateway.html SMPP Introduce yourself in the SMS World without being an expert in the field of telecommunication. Use your actual platforms

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

ITG Software Engineering

ITG Software Engineering IBM WebSphere Administration 8.5 Course ID: Page 1 Last Updated 12/15/2014 WebSphere Administration 8.5 Course Overview: This 5 Day course will cover the administration and configuration of WebSphere 8.5.

More information

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

Title Page. Hosted Payment Page Guide ACI Commerce Gateway

Title Page. Hosted Payment Page Guide ACI Commerce Gateway Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005 Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and

More information

.CRF. Electronic Data Capture and Workflow System for Clinical Trials

.CRF. Electronic Data Capture and Workflow System for Clinical Trials .CRF Electronic Data Capture and Workflow System for Clinical Trials Business challenge Most research takes place in different centers simultaneously. These are often located in different cities or even

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

Mobile Devices: Server and Management Lesson 03 Application Servers Part 2

Mobile Devices: Server and Management Lesson 03 Application Servers Part 2 Mobile Devices: Server and Management Lesson 03 Application Servers Part 2 Oxford University Press 2007. All rights reserved. 1 Sun Java System Web Server 6 For large business applications Compatible with

More information

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19 3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server

More information

1 Product. Open Text is the leading fax server vendor in the world. *

1 Product. Open Text is the leading fax server vendor in the world. * 1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor

More information

NETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION

NETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION NETWORK MONITORING & ALERTING SERVICES Complete IT Support for Business Westgate IT Network Monitoring & Alerting Services: Service Definition Service Name Network Monitoring & Alerting Services Overview

More information

2012 LABVANTAGE Solutions, Inc. All Rights Reserved.

2012 LABVANTAGE Solutions, Inc. All Rights Reserved. LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written

More information

APIS IT d.o.o. Fiscalization technical aspects

APIS IT d.o.o. Fiscalization technical aspects APIS IT d.o.o. Fiscalization technical aspects Project overview April 2012. Project inception 14.6.2012. Conceptual design 26.7.2012. Proposal of Fiscalization Law 2.8.2012. Solution presentation 1.10.2012.

More information

A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS

A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

Phire Architect Hardware and Software Requirements

Phire Architect Hardware and Software Requirements Phire Architect Hardware and Software Requirements Copyright 2014, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are

More information

A framework for web-based product data management using J2EE

A framework for web-based product data management using J2EE Int J Adv Manuf Technol (2004) 24: 847 852 DOI 10.1007/s00170-003-1697-8 ORIGINAL ARTICLE M.Y. Huang Y.J. Lin Hu Xu A framework for web-based product data management using J2EE Received: 8 October 2002

More information

SAP NetWeaver 7.0 - Application Server architecture

SAP NetWeaver 7.0 - Application Server architecture SAP NetWeaver 7.0 - Application Server architecture 1. Introduction The purpose of this document is to explain what components are part of the SAP NetWeaver Application Server and to explain in details

More information

Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware

Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware 2 Executive Summary 2 JBoss Enterprise Middleware 5 JBoss/Dell Inventory Management 5 Architecture 6 Benefits

More information

Designing a Microsoft SQL Server 2005 Infrastructure

Designing a Microsoft SQL Server 2005 Infrastructure Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Version 14.0. Overview. Business value

Version 14.0. Overview. Business value PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing

More information

PROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS

PROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS Progress DataDirect Connect DATA SHEET PROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS Progress DataDirect ODBC, JDBC and ADO.NET data connectivity

More information

eticketing Architecture Overview

eticketing Architecture Overview Group eticketing Architecture Overview The purpose of this document is to provide Ticket Office management with an introduction to eticketing service capabilities. With the uptake of ecommerce on the Internet,

More information

Digi Connectware Manager:

Digi Connectware Manager: Digi Connectware Manager: Dynamic IP Address Support White Paper Abstract In the world of TCP/IP, each network device receives an identifier called an IP address. Unfortunately, there are a finite number

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Monitoring Traffic manager

Monitoring Traffic manager Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Tier Architectures. Kathleen Durant CS 3200

Tier Architectures. Kathleen Durant CS 3200 Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others

More information

Global Enterprise Business Management Platform Interactive, Intelligent with Controls to Ensure Profit

Global Enterprise Business Management Platform Interactive, Intelligent with Controls to Ensure Profit Global Enterprise Business Platform Interactive, Intelligent with Controls to Ensure Profit Sales and Sales Force Customer Relationship Supply Chain Stores & Purchase Production Product Data Scheduling

More information

Executive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite

Executive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite Technical paper Infor Cloverleaf Integration Suite Executive summary Many hospitals struggle with managing the increasing amounts of information coming from multiple data sources. Not only can it be difficult

More information

GiftCardXpress - Elavon Brief

GiftCardXpress - Elavon Brief GiftCardXpress - Elavon Brief CFXWORKS, INC 2015 http://www.cfxworks.com GiftCardXpress - Elavon Brief GiftCardXpress (Elavon) Version 16.1: This gift card solution, GiftCardXpress (Elavon), is an open

More information

Developing Applications with Java EE 6 on WebLogic Server 12c

Developing Applications with Java EE 6 on WebLogic Server 12c Oracle University Contact Us: 0845 777 7711 Developing Applications with Java EE 6 on WebLogic Server 12c Duration: 5 Days What you will learn The Developing Applications with Java EE 6 on WebLogic Server

More information

ActiveXperts Network Monitor. White Paper

ActiveXperts Network Monitor. White Paper ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations

More information

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit) Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Perfect (ASD) Point of Sales (POS)

Perfect (ASD) Point of Sales (POS) Perfect (ASD) Point of Sales (POS) ASD POS is a comprehensive Point of Sale (POS) solution for fast-paced, high-volume, multi-site retail operations. Whether you need to manage a single retail location,

More information

8.0 System Requirements

8.0 System Requirements 8.0 System Requirements Console Supported Platforms Vendor OS Patch Level Microsoft Windows Server 2008 Windows Server 2003 Windows XP Red Hat Enterprise Linux 4 (v2.6 Linux kernel) Enterprise Linux 5

More information

GENWARE COMPUTER SYSTEMS AUDITING SOLUTION FOR COGNOS BUSINESS INTELLIGENCE

GENWARE COMPUTER SYSTEMS AUDITING SOLUTION FOR COGNOS BUSINESS INTELLIGENCE GENWARE COMPUTER SYSTEMS AUDITING SOLUTION FOR COGNOS BUSINESS INTELLIGENCE TECHNOLOGY PARTNER COGNOS CERTIFIED VALUE PROPOSITION AND BUSINESS OPPORTUNITIES Genware Computer Systems works with their clients

More information

Equipment Room Database and Web-Based Inventory Management

Equipment Room Database and Web-Based Inventory Management Equipment Room Database and Web-Based Inventory Management Project Proposal Sean M. DonCarlos Ryan Learned Advisors: Dr. James H. Irwin Dr. Aleksander Malinowski December 12, 2002 TABLE OF CONTENTS Project

More information

Flexible, Innovative POS and Store Inventory Management Solution

Flexible, Innovative POS and Store Inventory Management Solution SOLUTION BLUEPRINT RETAIL Flexible, Innovative POS and Store Inventory Management Solution Industry Retail Business Challenge Improving retail services while reducing operations expenses Technology Solution

More information

MMGD0204 Web Application Technology. Chapter 9 SERVER-SIDE SCRIPTING LANGUAGE

MMGD0204 Web Application Technology. Chapter 9 SERVER-SIDE SCRIPTING LANGUAGE MMGD0204 Web Application Technology Chapter 9 SERVER-SIDE SCRIPTING LANGUAGE Server-Side Scripting Language A web server technology in which a user's request is fulfilled by running a script directly on

More information

Attachment D System Hardware & Software Overview & Recommendations For IRP System

Attachment D System Hardware & Software Overview & Recommendations For IRP System Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3

More information

Client Overview. Engagement Situation. Key Requirements for Platform Development :

Client Overview. Engagement Situation. Key Requirements for Platform Development : Client Overview Our client provides leading video platform for enterprise HD video conferencing and has product suite focused on product-based visual communication solutions. Our client leverages its solutions

More information

GlobalComServer Application Interface

GlobalComServer Application Interface GlobalComServer Application Interface Communication Interface FAX, SMS, Vocal, E-mail, TELEX Introduction The creator of Fax, Voice, E-mail, SMS and telex solutions, AVM Informatique is a leader in the

More information

Maximizing ROI on Test and Durability

Maximizing ROI on Test and Durability Maximizing ROI on Test and Durability Product Details Product Overview: ncode Automation is a complete environment for automated data storage, analysis and reporting. It also provides a web-based collaborative

More information

4D as a Web Application Platform

4D as a Web Application Platform 4D as a Web Application Platform 4D is a powerful, flexible, and very scalable Web application platform. This white paper examines the common requirements for Web application servers, and discusses the

More information

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services CA Workload Automation Agents extend the automation capabilities

More information

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Internet Engineering: Web Application Architecture Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Centralized Architecture mainframe terminals terminals 2 Two Tier Application

More information

Introduction. C a p a b i l i t y d o c u m e n t : B i z T a l k S e r v e r

Introduction. C a p a b i l i t y d o c u m e n t : B i z T a l k S e r v e r Microsoft Technology Practice Capability document Overview Microsoft BizTalk Server is the middleware application server providing Business Process Management, Process Automations along with SOA / ESB

More information

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT Dr. Alexander Pons, University of Miami, apons@miami.edu ABSTRACT The deployment of Web applications consisting of dynamic content requires the selection

More information

Oracle 11g is by far the most robust database software on the market

Oracle 11g is by far the most robust database software on the market Chapter 1 A Pragmatic Introduction to Oracle In This Chapter Getting familiar with Oracle Implementing grid computing Incorporating Oracle into everyday life Oracle 11g is by far the most robust database

More information

Prodacapo System Requirements. Applicable for Prodacapo Version 10.0

Prodacapo System Requirements. Applicable for Prodacapo Version 10.0 Prodacapo System Requirements Applicable for Prodacapo Version 10.0 TABLE OF CONTENTS 1 GENERAL... 4 2 NETWORK INSTALLATION... 5 2.1 Application Server System Requirements... 5 2.2 Client System Requirements...

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

Secure Data Hosting. Your data is our top priority.

Secure Data Hosting. Your data is our top priority. Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

Web. Studio. Visual Studio. iseries. Studio. The universal development platform applied to corporate strategy. Adelia. www.hardis.

Web. Studio. Visual Studio. iseries. Studio. The universal development platform applied to corporate strategy. Adelia. www.hardis. Web Studio Visual Studio iseries Studio The universal development platform applied to corporate strategy Adelia www.hardis.com The choice of a CASE tool does not only depend on the quality of the offer

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing

More information

Top 7 Tips for Better Business Continuity

Top 7 Tips for Better Business Continuity Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com sales@biscom.com (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables

More information

Database FAQs - SQL Server

Database FAQs - SQL Server Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information

DATA BACKUP & RESTORE

DATA BACKUP & RESTORE DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is

More information

Wealth Management System

Wealth Management System Wealth Management System Clients in the new economy demand straight answers. With ubiquitous information on the Internet and an around-the-clock global financial market accessible by pagers, email, mobile

More information

Techniques for Scaling Components of Web Application

Techniques for Scaling Components of Web Application , March 12-14, 2014, Hong Kong Techniques for Scaling Components of Web Application Ademola Adenubi, Olanrewaju Lewis, Bolanle Abimbola Abstract Every organisation is exploring the enormous benefits of

More information

Data Replication in Privileged Credential Vaults

Data Replication in Privileged Credential Vaults Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches

More information

What Is the Java TM 2 Platform, Enterprise Edition?

What Is the Java TM 2 Platform, Enterprise Edition? Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today

More information

AuditMatic Enterprise Edition Installation Specifications

AuditMatic Enterprise Edition Installation Specifications Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this

More information

Requirement Priority Name Requirement Text Response Comment

Requirement Priority Name Requirement Text Response Comment N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Xerox DocuShare Private Cloud Service. Security White Paper

Xerox DocuShare Private Cloud Service. Security White Paper Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

Snow Agent System Pilot Deployment version

Snow Agent System Pilot Deployment version Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Certified E-commerce Consultant (CEC)

Certified E-commerce Consultant (CEC) Certified E-commerce Consultant (CEC) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of

More information

SCALABLE FLEXIBLE RELIABLE. The Complete Time and Attendance / Workforce Management Solution for Any Organization

SCALABLE FLEXIBLE RELIABLE. The Complete Time and Attendance / Workforce Management Solution for Any Organization SCALABLE RELIABLE FLEXIBLE The Complete Time and Attendance / Workforce Management Solution for Any Organization NOVAtime gives you all of it, with NOVAtime 3000 Enterprise Edition Scalability Whether

More information

Building Java Servlets with Oracle JDeveloper

Building Java Servlets with Oracle JDeveloper Building Java Servlets with Oracle JDeveloper Chris Schalk Oracle Corporation Introduction Developers today face a formidable task. They need to create large, distributed business applications. The actual

More information

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

GETTING STARTED GUIDE

GETTING STARTED GUIDE GETTING STARTED GUIDE This guide helps you to get up and running with Verastream Bridge Integrator. After you read this guide you should be able to: CONTENTS What do you get when you install Verastream

More information

Implementing the Application Control Engine Service Module

Implementing the Application Control Engine Service Module Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application

More information

CA ARCserve Backup Agents and Options

CA ARCserve Backup Agents and Options PRODUCT SUMMARY: CA ARCSERVE BACKUP R12.5 AGENTS AND OPTIONS CA ARCserve Backup r12.5 Agents and Options خدةش شدزذ ءشءء خءحزدءز ذ باةب سسءج -ءجزدط سز ءءد ١٢.٥ ز ذصث ء ظ ضز س زء ء زصدس ز اءزدشس جصءز طدذ

More information

High Availability Implementation for JD Edwards EnterpriseOne

High Availability Implementation for JD Edwards EnterpriseOne High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation

More information