Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment"

Transcription

1 Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment 284 Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment Masaichiro Yoshioka Takuma Sudo Akihiro Yoshikawa Keiichi Sakata OVERVIEW: New enterprise information system is requested to be flexible and efficient in order to cope with rapidly changing business environments and advancement of services. For this reason, the Internet technology has been applied to the enterprise information system, and new information technologies such as distributed object technology, Java* 1 and ActiveX* 2 are beginning to be introduced. There also exist many properties in enterprise information systems, such as the application programs or legacy data, which have been developed for a long time. In order to unite these properties with new information technologies, legacy system technology using distributed object technology was developed. With this technology, processes and data such as on-line processing, batch processing, and databases on the existing mainframe systems including can be utilized from the distributed object environment. Development of new applications utilizing the existing property and construction of new and flexible value-added systems integrated with the commercial software of a distributed object base thereby become possible. INTRODUCTION NEW enterprise information systems need to be flexible and efficient in order to cope with rapidly changing business environments and progress in services. For this reason, Internet technology is being applied to enterprise information systems, and new information technologies, such as distributed object technology, Java and ActiveX are beginning to be introduced. It has become important to unite the properties built into existing application programs with new information technology, and develop more flexible and extensible enterprise information systems. The legacy system technology assists in this unification. It enables the existing property freely utilized from the new environment through flexible connections with the distributed object technology. Using this technology, the existing programs and data can be used independent of the distributed object environment, without any significant change. Value-added services by with other systems can thereby be provided quickly and easily, employing existing property to the maximum efficiency. This report discusses the positioning of legacy system technology, its architecture, and (Virtual-Storage Operating System 3) wrapping products. SYSTEM INTEGRATION IN NETWORK OBJECTPLAZA Network Objectplaza 1) is the architecture for the next-generation information system constructed on the basis of the distributed object environment which Hitachi advocates. As a distributed object base, Network Objectplaza consists of TPBroker containing ORB (Object Request Broker), CORBA (Common Object Request Broker Architecture)* 3 services, a system base, a development environment, an operation management, and application frameworks. Here, the system base enables the construction of systems, in which not only C++ and Java applications but also various existing applications or commercial packages can be accessed *1: Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. *2: ActiveX is a trademark of Microsoft Corp. in the U.S. and other countries. *3: CORBA is a standard for distributed objects being developed by the Object Management Group (OMG).

2 Hitachi Review Vol. 47 (1998), No HTTP Development environment framework Applications framework System management System base Client Legacy system ActiveX Secure framework Distributed object base ORB + CORBA service HiRDB Java HTTP: hypertext transfer protocol : application program HiRDB: highly scalable relational database Fig. 1 Network Ojectplaza. Network Objectplaza is a distributed object base information systems architecture. In this architecture, the system base is a core function which integrates servers and clients into a distributed object environment. freely from clients, such as a web browser, Java, ActiveX, etc. (Fig. 1). One reason that Network Objectplaza is built on the CORBA environment is that CORBA provides interoperability for achieving a variety of system s. The most notable one now is the of an on-line program or a batch program on. Moreover, for the system in heterogeneous environment, the tools for making various systems and applications cooperate flexibly, utilization technology and SI (system ) technology are also important. ARCHITECTURE OF LEGACY SYSTEM INTEGRATION Wrapping Wrapping is the technology that provides a new interface using a conversion program (), without changing the interface of the existing software. The system, conventionally used only in a specific environment, can in this way be used in a new environment. Specifically, we call this use in a new environment Legacy System Wrapping, in which the existing mainframe system is wrapped. If we use this wrapping technology in a distributed object environment, the program and data of the existing system can be treated as an object, and can be cooperated with other objects easily (Fig. 2). Classification of Wrapping Methods The objects of wrapping are on-line systems, batch processing, and database systems on a mainframe. Although the interface of each legacy system differs, the will absorb the difference, and show those properties as objects with the unified interface as a distributed object (Fig. 3). In the case of on-line system wrapping, there are several methods for connection with a legacy system. The simplest method is to use a which carries out the same operation as a terminal (screen in Fig. 3). By this method, the configuration of the mainframe does not need to be changed at all.

3 Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment 286 Network Objectplaza Legacy system wrapping DCCM3 TMS-4V On-line On-line system batch XDM HiRDB Application System base Web page generation HTTP IIOP Database DB Java Distributed object base Web browser Internet intranet ActiveX Java ActiveX IIOP: Internet inter-orb (object request brocker) protocol DCCM3: Data Communication and Control Manager3 TMS-4V: Transaction Management System 4V XDM: extensible data manager Fig. 2 Legacy System Integration Technology. Legacy system technology converts the legacy system interface into the distributed object interface. Accessed from a web browser or Java application, the conventional properties, such as an on-line system, batch processing, and database, etc., will be more advantageously used, and now values will be added. Conversely, when changing a legacy system for maintenance, for example, the position of the input domain in a screen is moved 1 line, and a corresponding correction is also needed for the side. This is because a screen recognizes the data by the coordinates on the display screen. The logic interface wraps the inputoutput data of an on-line system using the more logical connection than the screen. Since it does not use a screen interface, efficiency is better and is not influenced by the layout of a screen. Although the form of the input-output data differs for each application, since definition data describing this form usually exists, the can create definition data for wrapping using this definition. Furthermore, the business logic takes the interface structure for each application into consideration. The concrete method of wrapping depends on each application. For example, the business logic can automatically manage legacy input- Mainframe Online processing (Application specific) logic Logical messages Logical interface Screen ORB DB processing Screen control data ODBC, etc. Remote batch interface New New New New New ODBC (Open Database Connectivity) is Microsoft s strategic interface for accessing databases. Fig. 3 Classification of On-Line System Wrapping. An enterprise application on a mainframe system is wrapped into an object form. On-line system wrapping has several connection methods.

4 Hitachi Review Vol. 47 (1998), No output data which use two or more screens to be acquired only by 1 call from a client. processing can be performed using a remote batch interface, and the result can also be acquired by the file transmission. Although it is not as real-time as an on-line operation, it can be used in a way like start first when required and see the result after taking for a while. Moreover, a database can also be directly controlled by the wrapping using a database access interface such as ODBC. It will be fit for a simple operation like reference. (to client PC) ORB HTTP New application New application WWW connection services Wrapper Definition file Reading definition file Session management Scenario execution State surveillance Error handling Connection gateway Architecture of On-Line Wrapping Since originally an on-line system is connected and used by terminals, it is premised on the architecture peculiar to terminals, such as specific communication sessions. For this reason, a needs to have a functionality to control these interfaces. The architecture of on-line wrapping using the business logic is shown in Fig. 4. Here, the definition file holds, for example, a parameter peculiar to applications, such as the name of the data item or the name of the screen. Session management manages the communication session with a legacy system, and provides the function of maintaining the session virtually. This is because, when a client uses the WWW (World Wide Web), although communication with a browser will be disconnected by every screen, a legacy system usually holds session, while continuing the operation. Scenario execution provides a function which automatically performs and controls accesses to two or more screens. State surveillance is needed in order to understand the state change of a legacy system correctly. In the case of a transition to an unexpected state, an error handling function tries to recover from that state. In addition, cooperation with the two phase commit or the recovery service, for example, is also needed in some applications. INTEGRATION WITH SYSTEM The function for treating the resource and process on as an object in a distributed object environment is called the wrapping function. Using this function, the system can cooperate with an open system easily, without greatly changing the environments on. By integrating and a distributed object environment, we can obtain advanced value-added services quickly and easily, employing the existing property with the maximum Fig. 4 Architecture of On-Line System Wrapping. On-line consists of the gateway for connecting with the on-line system, and the function controlling the accesses. efficiency. Functional Outline of Wrapping The wrapping function includes (1) on-line wrapping, (2) batch wrapping, and (3) database wrapping. The wrapping function has a file which defines its operation. The support tool to create this definition file is also provided. By using the wrapping function, we can access the resources on through the application object on servers, such as UNlX* 4 or Windows NT* 5, from the client of Windows 95* 5, for example. When using a WWW browser, web page generator (web page generation function) can be used. The web page generator calls the CORBA object from HTML (hypertext markup language), and sticks the results on a web page. It can create a web page easily from the results from access. On-Line Wrapping The on-line wrapping is a function to treat a transaction with the on-line system on as an object. XDM/DCCM3 wrapping and TMS-4V/SP wrapping are first among the on-line wrappings. Using these functions, we can change the user interface from a dumb-terminal basis to a WWW *4: UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Limited. *5: Windows and Windows NT are registered trademarks of Microsoft Corp. in the U. S. and other countries.

5 Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment 288 Fig. 5 On-Line System Wrapping and Wrapping Outline. In on-line system wrapping and batch wrapping, a common base and individual are provided on the distributed object environment of UNIX system. Other enterprise systems Mobile clients Internet Enterprise office systems UNIX, WindowsNT server WWW server Distributed object application New Web page generator Object -base Object for DCCM3 Object for batch Distributed object base: TPBroker Definition file Object for TMS-4V/SP XM analysis support tool XDM/DCCM3 TMS-4V/SP Open job entry Online wrapping wrapping browser, or building a new system by cooperating each work which had no relation before has become possible. At this time, the existing application on needs to be changed only a little. In the definition file for on-line wrapping, the screen layout information and the screen transition information are described in scripts. (1) XDM/DCCM3 wrapping XDM/DCCM3 wrapping is the function of wrapping DCCM3 applications using the terminal screen interface, a logic interface, and message communication. As a support function of DCCM3 wrapping, there is an XM analysis support tool which creates wrapping definition file information automatically from the XM file which defines a terminal screen. (2) TMS-4V/SP wrapping TMS-4V / SP wrapping is the function of wrapping TMS-4V/SP applications using a logic interface. (3) Wrapping of other on-line systems The wrapping function of other systems, such as the on-line system on VOS1, will also be provided in the same manner. Wrapping wrapping is the function which enables the starting and execution surveillance of batch jobs from a distributed object environment. After a job is performed, the execution result is returned to the application on the distributed object side. By batch wrapping, extensive data can be processed asynchronously in a lump. It can be used when dealing with extensive data on collectively. An outline of on-line wrapping and a batch wrapping is shown in Fig. 5. Database Wrapping Database wrapping is a function for accessing abundant data on from a distributed object environment. This function is a database access tool in distributed object environment, and the distributed object applications created using PGALLERY or Visual Basic* 6 will be able to access various kinds of database, such as XDM (Extensible Data Manager), HiRDB (Highly Scalable Relational Database), Sybase SQL Anywhere* 7, and ORACLE* 8. The database is attaining performance improvement by parallel processing using multithread. Moreover, since it also corresponds to DCOM (distributed component object model), a flexible enterprise information system can be constructed. An outline of a database wrapping is shown in Fig. 6. FUTURE DEVELOPMENT (1) Expansion for target In the legacy information system of an enterprise, various systems of many vendors are connected by mainframe to personal-computer server. Hitachi had produced wrapping technology of the system *6: Visual Basic is a registered trademark of Microsoft Corp. in the U.S. and other countries. *7: Sybase SQL Anywhere is a product name of Sybase, Inc. *8: ORACLE is a registered trademark of Oracle Corporation.

6 Hitachi Review Vol. 47 (1998), No Windows NT or Windows 95 Windows NT or UNIX Client applications created using PGALLERY or Visual Basic Tables Database access ActiveX control Internet Access to legacy DBMS such as XDM/RD is possible. DBMS: database management systems CORBA interface DCOM interface Database access for ORB Distributed object base TPBroker HiRDB Sybase ORACLE Legacy DBMS such as XDM/RD Fig. 6 Database wrapping Outline. Various kinds of database can be accessed from applications in a distributed object environment. Legacy system wrapping New system UNIX server Enterprise information system Intra-enterprise Existing systems Mainframe UNIX server, etc. Other enterprise systems Inter-enterprise Mainframe, UNIX server, etc. Internet/Intranet Distributed object technology Windows NT server Consumers/ social activities : Object Fig. 7 An Enterprise Information System Using Distributed Object Technology. Globalization of an enterprise information system will be accelerated by the and consolidation of various systems using distributed object technology. first. In order to provide synthetic solutions to a customer, the target of wrapping to other mainframe systems, to conventional client server systems, and also to packaged software. (2) Correspondence to toolkit- Toolkit-Integration is a library which defines the common interface for heterogeneous system, and enables clients to access applications and data of a variety of systems using the unified interface. The wrapping products will also correspond to this toolkit-, in order to achieve with more systems. CORBA security service can be used in toolkit-. We can thereby achieve fundamental services such as encryption of communication data, access control, and obtaining the access log, and the unified login capability. (3) Expansion of system technology If we use the properties of the conventional system effectively, and cooperating with the system inside and outside, we can turn a new enterprise information system into a global system. Therefore, in the system or the system consolidation, the technology has become very important for building a highly value-added system which meets each business situation combining the various kinds

7 Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment 290 of technology. From now on, we intend to provide and expand the technology and environments much further so that different systems can be integrated more freely by combining the and integrating the systems and packages of components (Fig. 7). CONCLUSIONS This report explains the legacy wrapping technology that utilizes existing system properties using the distributed object technology which is becoming the core technology of future enterprise information systems. We consider that the open standardization and open system/network connectivity of an enterprise information system will be increasingly accelerated with the development of information technology. On the other hand, the programs and the data property which have been built thus far have also been increasing with the expansion of business. Hitachi intends to support construction of flexible and highly value-added systems which integrate new information technology and conventional system properties. REFERENCES (1) Saito, et al: Information System for the Next Generation, Hitachi Review 47, No. 6 (1998), pp (2) T. J. Mowbray, et al: The Essential CORBA, John Wiley & Sons, Inc. (1996) ABOUT THE AUTHORS Masaichiro Yoshioka Joined Hitachi, Ltd. in 1982 and now works at the 3rd Research Department of the Systems Development Laboratory. He is currently engaged in the research and development of an open enterprise information system. Mr. Yoshioka ia a member of the Information Processing Society of Japan, ACM, and IEEE-CS, and can be reached by at Takuma Sudo Joined Hitachi, Ltd. in 1989 and now works at the 4th OS Development Department of the Software Development Center. He is currently engaged in the development of base in a distributed object system. Mr. Sudo is a member of the Information Processing Society of Japan, and can be reached by at hitachi. co. jp Akihiro Yoshikawa Joined Hitachi, Ltd. in 1990 amd now works at the 3rd Research Department of the Systems Development Laboratory. He is currently engaged in the research and development of an open enterprise information system. Mr. Yoshikawa ia a member of the Information Processing Society of Japan, and can be reached by e- mail at hitachi. co. jp Keiichi Sakata Joined Hitachi, Ltd. in 1975 and now works at the 1st OS Development Department of the Software Development Center. He is currently engaged in the development of mainframe-open system. Mr. Sakata is a member of the Information Processing Society of Japan, and can be reached by at jp

Total System Operations and Management for Network Computing Environment

Total System Operations and Management for Network Computing Environment Total System Operations and Management for Network Computing Environment Hitachi Review Vol. 47 (1998), No. 6 291 Satoshi Miyazaki, D. Eng. Toshiaki Hirata Masaaki Ohya Eiji Matsumura OVERVIEW: The architecture

More information

Dependable, Open and Real-time Architecture for Power Systems

Dependable, Open and Real-time Architecture for Power Systems Dependable, Open and Real-time Architecture for Power Systems 48 Dependable, Open and Real-time Architecture for Power Systems DORA-Power Atsuhiko Hirota Masayuki Kikuchi Takashi Owaki Yukiyoshi Tani OVERVIEW:

More information

Layering a computing infrastructure. Middleware. The new infrastructure: middleware. Spanning layer. Middleware objectives. The new infrastructure

Layering a computing infrastructure. Middleware. The new infrastructure: middleware. Spanning layer. Middleware objectives. The new infrastructure University of California at Berkeley School of Information Management and Systems Information Systems 206 Distributed Computing Applications and Infrastructure Layering a computing infrastructure Middleware

More information

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator. What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

More information

Windows Authentication on Microsoft SQL Server

Windows Authentication on Microsoft SQL Server Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication

More information

Enabling the Information Age

Enabling the Information Age Enabling the Information Age Web Application Server 4.0 Agenda Architecture Overview Features 2 1 (OAS) 4.0 Strategy Provide High Enterprise Quality of Service Scalable: Multithreaded, Distributed Server

More information

Secure System Solution and Security Technology

Secure System Solution and Security Technology Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

IBM WebSphere Business Integration for HIPAA

IBM WebSphere Business Integration for HIPAA Prepare your business for the future as you prepare for HIPAA IBM WebSphere Business Integration for HIPAA Helps ensure your business is ready to meet the HIPAA mandates Allows private and highly secure

More information

Failover Support. DataDirect Connect for ODBC Drivers. Introduction. Connection Failover

Failover Support. DataDirect Connect for ODBC Drivers. Introduction. Connection Failover Failover Support DataDirect Connect for ODBC Drivers Introduction Connection failover and connection retry are two useful features that are available in the following DataDirect Connect for ODBC drivers:

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

CL4 Open Access ODBC Database Server Release 1.1

CL4 Open Access ODBC Database Server Release 1.1 CL4 Open Access ODBC Database Server Release 1.1 Overview This document describes CL4 Open Access ODBC Server, the ODBC/OLE- DB client and ODBC server for the CL4 application development environment. Release

More information

Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks

Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Hitachi Review Vol. 51 (2002), No. 2 65 Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Yoshiyuki Kurosaki Toshio Sato Kiminori Sugauchi Tokuji Tamada OVERVIEW:

More information

An Oracle White Paper July 2011. Oracle Desktop Virtualization Simplified Client Access for Oracle Applications

An Oracle White Paper July 2011. Oracle Desktop Virtualization Simplified Client Access for Oracle Applications An Oracle White Paper July 2011 Oracle Desktop Virtualization Simplified Client Access for Oracle Applications Overview Oracle has the world s most comprehensive portfolio of industry-specific applications

More information

Interstage Application Server V7.0 Single Sign-on Operator's Guide

Interstage Application Server V7.0 Single Sign-on Operator's Guide Interstage Application Server V7.0 Single Sign-on Operator's Guide Single Sign-on Operator's Guide - Preface Trademarks Trademarks of other companies are used in this user guide only to identify particular

More information

Client-Server Applications

Client-Server Applications Client-Server Applications Prof. Sanjeev Setia Distributed Software Systems CS 707 Distributed Software Systems 1 Client Server Systems Distributed Software Systems 2 1 Client/Server Application Distributed

More information

Architecture Design For Web-based Application Systems. Instructor: Dr. Jerry Gao Class: CMPE296U

Architecture Design For Web-based Application Systems. Instructor: Dr. Jerry Gao Class: CMPE296U Architecture Design For Web-based Application Systems Instructor: Dr. Jerry Gao Class: CMPE296U Architecture Design For Web-Based Application Systems - (1994-1995) Hypertext Web Systems: Graphic Web Browsers

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

Information integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A

Information integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A Title Information integration platform for CIMS Author(s) Chan, FTS; Zhang, J; Lau, HCW; Ning, A Citation IEEE International Conference on Management of Innovation and Technology Proceedings, Singapore,

More information

IBM WebSphere MQ File Transfer Edition, Version 7.0

IBM WebSphere MQ File Transfer Edition, Version 7.0 Managed file transfer for SOA IBM Edition, Version 7.0 Multipurpose transport for both messages and files Audi logging of transfers at source and destination for audit purposes Visibility of transfer status

More information

Enterprise Portal for Internet Business

Enterprise Portal for Internet Business UDC 621.395.74:658.15:681.32 Enterprise Portal for Internet Business VMasaaki Nishikiori (Manuscript received August 31, 2000) The emerging Internet technology has brought about a new business situation

More information

JDBC Drivers, Bridges and SequeLink. Edward M. Peters Vice President & General Manager DataDirect

JDBC Drivers, Bridges and SequeLink. Edward M. Peters Vice President & General Manager DataDirect JDBC Drivers, Bridges and SequeLink Edward M. Peters Vice President & General Manager DataDirect DataDirect s Business Provide world class data connectivity from any application, to any data source, from

More information

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19 3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server

More information

System types. Distributed systems

System types. Distributed systems System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors

More information

Middleware Lou Somers

Middleware Lou Somers Middleware Lou Somers April 18, 2002 1 Contents Overview Definition, goals, requirements Four categories of middleware Transactional, message oriented, procedural, object Middleware examples XML-RPC, SOAP,

More information

WEB DATABASE PUBLISHING

WEB DATABASE PUBLISHING WEB DATABASE PUBLISHING 1. Basic concepts of WEB database publishing (WEBDBP) 2. WEBDBP structures 3. CGI concepts 4. Cold Fusion 5. API - concepts 6. Structure of Oracle Application Server 7. Listeners

More information

White paper. IBM WebSphere Application Server architecture

White paper. IBM WebSphere Application Server architecture White paper IBM WebSphere Application Server architecture WebSphere Application Server architecture This IBM WebSphere Application Server white paper was written by: Jeff Reser, WebSphere Product Manager

More information

Overview Guide SAP Replication Server Options SP200

Overview Guide SAP Replication Server Options SP200 Overview Guide SAP Replication Server Options 15.7.1 SP200 Linux, Microsoft Windows, and UNIX DOCUMENT ID: DC32753-01-1571200-01 LAST REVISED: March 2014 Copyright 2014 by SAP AG or an SAP affiliate company.

More information

single sign-on capability

single sign-on capability hp NonStop servers hp white paper single sign-on capability Technology that provides corporate users with access to all of their information through a single portal website. case study: a growing internet

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

What Is the Java TM 2 Platform, Enterprise Edition?

What Is the Java TM 2 Platform, Enterprise Edition? Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today

More information

IBM Tivoli Directory Integrator

IBM Tivoli Directory Integrator IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Visualization Dashboards for Real-time, Business & Manufacturing Data

Visualization Dashboards for Real-time, Business & Manufacturing Data Product Bulletin Visualization Dashboards for Real-time, Business & Manufacturing Data Summary Looking for a collaboration platform to easily create and manage custom manufacturing and business intelligence

More information

(51) Int Cl.: G06F 11/14 (2006.01)

(51) Int Cl.: G06F 11/14 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 08 414 B1 (4) Date of publication and mention of the grant of the patent: 04.03.09 Bulletin 09/ (1) Int Cl.: G06F 11/14 (06.01) (21) Application number:

More information

Distributed Network Management Using SNMP, Java, WWW and CORBA

Distributed Network Management Using SNMP, Java, WWW and CORBA Distributed Network Management Using SNMP, Java, WWW and CORBA André Marcheto Augusto Hack Augusto Pacheco Augusto Verzbickas ADMINISTRATION AND MANAGEMENT OF COMPUTER NETWORKS - INE5619 Federal University

More information

Security Audit Log (BC-SEC)

Security Audit Log (BC-SEC) HELP.BCSECAUDLOG Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express

More information

Development of an After-sales Support System for a Multi-vendor Manufacturing System using Inter-enterprise Collaboration

Development of an After-sales Support System for a Multi-vendor Manufacturing System using Inter-enterprise Collaboration Development of an After-sales Support System for a Multi-vendor Manufacturing System using Inter-enterprise Collaboration Toshiaki KIMURA Japan Society for the Promotion of Machine Industry, Japan (email:

More information

SequeLink Server for ODBC Socket

SequeLink Server for ODBC Socket P RODUCT O VERVIEW Server for ODBC Socket Overview DataDirect is highly scalable, server-based middleware that gives you a complete platform for data connectivity. Common Servers offer the performance

More information

Operation, Monitoring, and Linkage Guide

Operation, Monitoring, and Linkage Guide ucosminexus Application Server Operation, Monitoring, and Linkage Guide 3020-3-Y10-10(E) Relevant program products See the manual ucosminexus Application Server Overview. Export restrictions If you export

More information

Using Oracle Real Application Clusters (RAC)

Using Oracle Real Application Clusters (RAC) Using Oracle Real Application Clusters (RAC) DataDirect Connect for ODBC Introduction In today's e-business on-demand environment, more companies are turning to a Grid computing infrastructure for distributed

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information

MD Link Integration. 2013 2015 MDI Solutions Limited

MD Link Integration. 2013 2015 MDI Solutions Limited MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY

More information

JP1 Version 11: Example Configurations

JP1 Version 11: Example Configurations JP1 Version 11: Example Configurations Performance Management January 2016 List of s for performance management (1/3) Service Level Management SLM - 01 Configuration for real-time monitoring of web system

More information

Java-technology based projects

Java-technology based projects Java-technology based projects TietoEnator Corporation Oyj Simo Vuorinen simo.vuorinen@tietoenator.com 1 TietoEnator 2000 Agenda Java: language, architecture, platform? Javan promises and problems Enterprise-APIs

More information

i.sight ecommerce system

i.sight ecommerce system i.sight ecommerce system Product Brochure open your eyes on the Internet i.sight ecommerce system is presented to you by IPOS Computer Systems Ltd. For Inquiry, please go to our web site http://www.iposcsl.com

More information

JP1 Version 11: Example Configurations

JP1 Version 11: Example Configurations JP1 Version 11: Example Configurations Network Management January 2016 Hitachi, Ltd. 2016. All rights reserved. List of example configurations for network management Network node manager, and system resource

More information

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011 DBMS Infrastructures and IT Career Recommendations Jeff Fineberg November 21, 2011 Topics Importance of Databases Security Computing Environments / Infrastructures Methodologies for Data access Database

More information

Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1

Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1 Introducing FUJITSU Software Centric Manager V15.1.1 < Version 1.0 > May 2015 FUJITSU LIMITED 0 Contents Integrated Monitoring Required in Virtualization/Server Integration Characteristics of Centric Manager

More information

The World Wide Web: History

The World Wide Web: History The World Wide Web: History - March, 1989, Tim Berners-Lee of Geneva s European Particle Physics Laboratory (CERN) circulated a proposal to develop a hypertext system for global information sharing in

More information

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Internet Engineering: Web Application Architecture Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Centralized Architecture mainframe terminals terminals 2 Two Tier Application

More information

Construction of SaaS-Based e-learning System in Japan

Construction of SaaS-Based e-learning System in Japan Construction of SaaS-Based e-learning System in Japan Norihiko Sakamoto (Manuscript received January 30, 2009) Fujitsu s electronic learning (e-learning) application began to be offered in Japan in the

More information

IT Infrastructure and Emerging Technologies

IT Infrastructure and Emerging Technologies IT Infrastructure and Emerging Technologies Content IT Infrastructure Infrastructure Components Contemporary Hardware Platform Trends Contemporary Software Platform Trends Management Issues 2 IT infrastructure

More information

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker

More information

The Enterprise Java Internet Provider

The Enterprise Java Internet Provider The Enterprise Java Internet Provider JavaCon Java Hosting Presentation Java and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries.

More information

Distributed Objects and Components

Distributed Objects and Components Distributed Objects and Components Introduction This essay will identify the differences between objects and components and what it means for a component to be distributed. It will also examine the Java

More information

ActiveXperts Network Monitor. White Paper

ActiveXperts Network Monitor. White Paper ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Release Bulletin EDI Products 5.2

Release Bulletin EDI Products 5.2 Release Bulletin EDI Products 5.2 Document ID: DC00191-01-0520-01 Last revised: December, 2009 Copyright 1992-2009 by Sybase, Inc. All rights reserved. Sybase trademarks can be viewed at the Sybase trademarks

More information

RESPONSES TO QUESTIONS AND REQUESTS FOR CLARIFICATION Updated 7/1/15 (Question 53 and 54)

RESPONSES TO QUESTIONS AND REQUESTS FOR CLARIFICATION Updated 7/1/15 (Question 53 and 54) RESPONSES TO QUESTIONS AND REQUESTS FOR CLARIFICATION Updated 7/1/15 (Question 53 and 54) COLORADO HOUSING AND FINANCE AUTHORITY 1981 BLAKE STREET DENVER, CO 80202 REQUEST FOR PROPOSAL Intranet Replacement

More information

I/A Series Software EDM Electronic Document Management

I/A Series Software EDM Electronic Document Management PSS 21S-2C1 B3 I/A Series Software EDM Electronic Document Management The I/A Series EDM system lowers the total cost of plant documentation such as operating procedures, MSDS sheets and CAD drawings.

More information

SEM and Budget Preparation. David Reifschneider Sr. Consultant, SAP SI America

SEM and Budget Preparation. David Reifschneider Sr. Consultant, SAP SI America SEM and Budget Preparation David Reifschneider Sr. Consultant, SAP SI America Agenda: SAP s Higher Education Budgeting Solution 1 Introduction: Budget Requirements 2 BW Structure and Content 3 SEM-BPS

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

Elements of Advanced Java Programming

Elements of Advanced Java Programming Appendix A Elements of Advanced Java Programming Objectives At the end of this appendix, you should be able to: Understand two-tier and three-tier architectures for distributed computing Understand the

More information

FROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS

FROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS FROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS V. CHRISTOPHIDES Department of Computer Science & Engineering University of California, San Diego ICS - FORTH, Heraklion, Crete 1 I) INTRODUCTION 2

More information

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit) Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information

More information

The Enterprise Service Bus

The Enterprise Service Bus 1 ESBs: Essential Infrastructure for a Successful SOA March 2005 2 at a glance Customers include world s largest firms! 80% of Global Telecom! 70% of Financial Services in Global 100! Blue Chip System

More information

C/S Basic Concepts. The Gartner Model. Gartner Group Model. GM: distributed presentation. GM: distributed logic. GM: remote presentation

C/S Basic Concepts. The Gartner Model. Gartner Group Model. GM: distributed presentation. GM: distributed logic. GM: remote presentation C/S Basic Concepts The Gartner Model Contents: 2-tier Gartner Model Winsberg s Model / Balance Example 3-tier n-tier Became de facto reference model Recognizes 5 possible modes of distribution: distributed

More information

Finding the Leak Access Logging for Sensitive Data. SAP Product Management Security

Finding the Leak Access Logging for Sensitive Data. SAP Product Management Security Finding the Leak Access Logging for Sensitive Data SAP Product Management Security Disclaimer This document does not constitute a legally binding proposal, offer, quotation or bid on the part of SAP. SAP

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 SAP WebAS 6.40 Version 1.0 1.0 1 Copyright Copyright 2004 SAP AG. All rights reserved. No part of this documentation may

More information

Increasing Driver Performance

Increasing Driver Performance Increasing Driver Performance DataDirect Connect Series ODBC Drivers Introduction One of the advantages of DataDirect Connect Series ODBC drivers (DataDirect Connect for ODBC and DataDirect Connect64 for

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

IBM Tivoli Netcool/Impact

IBM Tivoli Netcool/Impact IBM Netcool/Impact Streamline event and alert management, and incident and problem management processes Highlights Leverage context-driven correlation to reduce symptomatic events and incident tickets,

More information

Oracle Application Server 4.0: The Integration Platform for Oracle Products and the Internet. An Oracle White Paper August 1998

Oracle Application Server 4.0: The Integration Platform for Oracle Products and the Internet. An Oracle White Paper August 1998 Oracle Application Server 4.0: The Integration Platform for Oracle Products and the Internet An Oracle White Paper August 1998 The Integration Platform for Oracle Products and the Internet INTRODUCTION

More information

Secospace elog. Secospace elog

Secospace elog. Secospace elog Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page

More information

BC480 PDF-Based Print Forms

BC480 PDF-Based Print Forms PDF-Based Print Forms SAP NetWeaver Course Version: 99 Course Duration: 3 Day(s) Publication Date: 2014 Publication Time: Copyright Copyright SAP AG. All rights reserved. No part of this publication may

More information

IBM WebSphere Business Integration Monitor, Version 4.2.4

IBM WebSphere Business Integration Monitor, Version 4.2.4 View business results in real time to accelerate informed decision making and help improve business effectiveness IBM WebSphere Business Integration Monitor, Version 4.2.4 Highlights Tracks business process,

More information

Middleware and Applications for Mobile Computers

Middleware and Applications for Mobile Computers Hitachi Review Vol. 48 (1999), No. 1 21 Middleware and Applications for Mobile Computers Taro Saito Yahei Murakata Masatoshi Nakaya Naoko Taniguchi OVERVIEW: In the mobile computing environment for business

More information

PATROL From a Database Administrator s Perspective

PATROL From a Database Administrator s Perspective PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks

More information

Real-time Data Replication

Real-time Data Replication Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different

More information

SOA Platform Cosminexus Content Management

SOA Platform Cosminexus Content Management SOA Platform Cosminexus Content Management Increasing business value by sharing and applying company documents All Rights Reserved. Copyright 2009, Hitachi, Ltd. Manage company documents both properly

More information

Lecture 2. Internet: who talks with whom?

Lecture 2. Internet: who talks with whom? Lecture 2. Internet: who talks with whom? An application layer view, with particular attention to the World Wide Web Basic scenario Internet Client (local PC) Server (remote host) Client wants to retrieve

More information

Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8

Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Module 12: Microsoft Windows 2000 Clustering Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Information in this document is subject to change without notice.

More information

Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED

Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED Introducing Systemwalker Operation Manager V13.3 July 2008 FUJITSU LIMITED Contents I. Market Requirements II. Product Overview a. Planning Execution/Operation b. Operation Visualization c. Operational

More information

An Oracle White Paper May 2011. Distributed Development Using Oracle Secure Global Desktop

An Oracle White Paper May 2011. Distributed Development Using Oracle Secure Global Desktop An Oracle White Paper May 2011 Distributed Development Using Oracle Secure Global Desktop Introduction One of the biggest challenges software development organizations face today is how to provide software

More information

25 May 11.30 Code 3C3 Peeling the Layers of the 'Performance Onion John Murphy, Andrew Lee and Liam Murphy

25 May 11.30 Code 3C3 Peeling the Layers of the 'Performance Onion John Murphy, Andrew Lee and Liam Murphy UK CMG Presentation 25 May 11.30 Code 3C3 Peeling the Layers of the 'Performance Onion John Murphy, Andrew Lee and Liam Murphy Is Performance a Problem? Not using appropriate performance tools will cause

More information

Using DataDirect Connect for JDBC with Oracle Real Application Clusters (RAC)

Using DataDirect Connect for JDBC with Oracle Real Application Clusters (RAC) Using DataDirect Connect for JDBC with Oracle Real Application Clusters (RAC) Introduction In today's e-business on-demand environment, more companies are turning to a Grid computing infrastructure for

More information

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable

More information

Heterogeneous Replication Guide. Replication Server 15.5

Heterogeneous Replication Guide. Replication Server 15.5 Heterogeneous Replication Guide Replication Server 15.5 DOCUMENT ID: DC36924-01-1550-01 LAST REVISED: March 2010 Copyright 2010 by Sybase, Inc. All rights reserved. This publication pertains to Sybase

More information

Oracle SQL Developer Migration

Oracle SQL Developer Migration An Oracle White Paper May 2010 Oracle SQL Developer Migration Overview... 3 Introduction... 3 Oracle SQL Developer: Architecture and Supported Platforms... 3 Supported Platforms... 4 Supported Databases...

More information

Borland Silk Performer Synthetic Transaction Monitoring for BMC Software

Borland Silk Performer Synthetic Transaction Monitoring for BMC Software DATASHEET Borland Silk Performer Synthetic Transaction Monitoring for BMC Software Proactively detect and quickly solve user-impacting business transactions issues before they negatively impact business

More information

Distributed Systems. Outline. What is a Distributed System?

Distributed Systems. Outline. What is a Distributed System? Distributed Systems 1-1 Outline What is a Distributed System? Examples of Distributed Systems Distributed System Requirements in Distributed System 1-2 What is a Distributed System? 1-3 1 What is a Distributed

More information

Integrated Authentication

Integrated Authentication Integrated Authentication Information Security Introduction Information security has become an increasingly visible and important topic to companies. Driven by a number of highly publicized security breaches

More information

PE Training and Event Management. SAP ERP Central Component

PE Training and Event Management. SAP ERP Central Component PE Training and Event Management SAP ERP Central Component Release 5.0 Release Notes Copyright 2004 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form

More information

Mobile Devices: Server and Management Lesson 03 Application Servers Part 2

Mobile Devices: Server and Management Lesson 03 Application Servers Part 2 Mobile Devices: Server and Management Lesson 03 Application Servers Part 2 Oxford University Press 2007. All rights reserved. 1 Sun Java System Web Server 6 For large business applications Compatible with

More information

IBM Tivoli Composite Application Manager for Response Time Tracking

IBM Tivoli Composite Application Manager for Response Time Tracking Track transactions end to end across your enterprise to drive fast response times and help maintain high customer satisfaction IBM Tivoli Composite Application Manager for Response Time Tracking Highlights

More information