BUSINESS RULES MANIPULATION MODEL 1
|
|
|
- Alaina Fisher
- 10 years ago
- Views:
Transcription
1 ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2007, Vol.36, No.3 BUSINESS RULES MANIPULATION MODEL 1 Liudas Motiejūnas, Rimantas Butleris Kaunas University of Technology Studentų St. 50, LT51368 Kaunas, Lithuania Abstract. Business rules approach is quite new and oriented at software systems in which the rules are separated, logically and physically, from other aspects of the system. In this paper some of the methods for description of the business are discussed. Business rules activation from database triggers is presented. Implemented prototype and algorithms are discussed. 1. Introduction Other way is to implement business rules as database triggers. There is no united opinion about using Business rules are precise statements that describe, the data base triggers for the implementation of the constrain and control the structure, operations and the business rules. Some authors state that database triggers are used to implement certain types of business strategy of a business. They can be found everywhere in a raw, unstructured form. The business rules are the rules, such as facts, constraints, actions, enablers and most changing part of the business. We can describe a derivations [8]. Other opinions declare that business business rule as "a statement that defines or constrains rules have absolutely nothing to do with programming, database triggers or expert systems [2]. In our some aspect of the business. It is intended to assert business structure or to control or influence the behavior of the business" [9]. opinion, business rules should not be implemented as database triggers and must be kept in business rules repository separately in a declarative form Describing business rules There are a few main ways for describing business rules. One of them is to store rules in objects. Five design principles for checking business rules in objects are presented below [12]: 1. Business rule checking occurs when objects change state. 2. The object changing its state invokes business rule checking. 3. Business rule checking invokes logic that may or may not reside in the affected object s implementation. 4. Business rule checking must be flexible enough to allow selective bypassing by trusted services. 5. Business rule checking is separate from logic rule checking. However, business rules are not independent and they belong to objects. Business rules should be associated to entities and events. Business rules should be kept in separate business rules repository and managed separately from applications code. Another way of describing business rules is OCL. Often simple rules in plain English require several lines of OCL code to represent [1]. Trying to use OCL to describe a business rule written in several paragraphs of plain English text would be extremely complex. OCL is based on first-order predicate logic [18]. Business people would hardly understand this kind of language. Anyway, OCL can be used for both: writing assertions and describing business rules. However, for OCL to act as a language for writing business rules, it would have to be the perfect syntax for all the business situations, but we cannot unambiguously say that this is true. OCL should concentrate on the primary purpose, and get that right, before trying to be general-purpose business rule syntax. Rule mark-up languages will be the vehicles for using rules on the Web and in distributed systems. They allow deploying, executing, publishing and communicating rules on the Web [17]. They are also converging towards a lingua franca for exchanging rules between different systems and tools. In a narrow sense, a rule mark-up language is concrete (XMLbased) rule syntax for the Web. In a broader sense, it 1 The work is supported by Lithuanian State Science and Studies Foundation according to High Technology Development Program Project "VeTIS" (Reg. No. B-07042) 295
2 L. Motiejūnas, R. Butleris should have an abstract syntax as a common basis for defining various concrete sublanguages that serve different purposes. The goal of RuleML is to permit reusability and interchange at a higher level. Anyway, RuleML raises similar problems like XML: it requires an investment from the rule engine vendors to implement, and it requires an additional investment from the software developers and architects to add disambiguating information in the condition of the rules to guarantee the expected behavior Business rules repository Physically, rule repository is an autonomic business rule collection which can be altered at any time using relatively easy tools [4]. These are two solutions to storing rules: 1. Parameter driven approach. In this case rules are stored in the database where they are characterized by the values of various attributes. It has been shown by different researchers that rule repository could be designed as an independent database [14] or as a part of the main logical model [13]. However, the first solution offers more flexibility and more options for the storage of complicated business rules. 2. Independent process-driven approach. This approach is similar to the traditional methodologies where rules are implemented directly in the program code, only in this case the code, representing rules, is stored independently from other layers of the IS and therefore rules are expressed only once in the system. Business rules repository is a database that stores all the data about business rules and all the necessary metadata about entities, attributes and relationships that are included in the data model. Probably it is impossible to create an universally accepted business rules repository structure, because various organizations or business rules researchers define different types of business rules and ways that the rules are described [3, 10, 15]. In our case we use the first solution to store business rules Business rules engines The system-wide enforcement of stored rules is managed by the special rule interpretation mechanism called business rules engine. Such an engine is considered as a monolithic mechanism [11], however, the task of enforcing or implementing rules can be carried out by more or less independent services. The business rules engine calls business rules from business rules repository and performs actions described by the rule. Business rules engine can be implemented in various ways [16, 19], the same as business rules repository, because its architecture depends on business rules repository (the form that business rules are stored in it). A wider overview of the business rules engines is presented in [7]. It doesn t matter in which way the business rules engine is implemented - it must ensure that business rules are performed correctly. 2. Business Rules Repository model We used business rules repository which is based on repository model introduced by Plotkin [14]. This business rules repository is flexible and easily extendable; it gives a possibility to store various types of the business rules. The main improvement of Plotkin s repository is metadata about logical data structure incorporation with repository. Connecting business rules with data through metadata makes rules more independent. Next improvement of the repository is possibility to store functions which are performed by the business rules. Actions that are needed to perform these functions are also stored in the repository. This business rules repository is presented in [5, 6]. 3. Activation of Business Rules Because business rules are kept in the business rules repository separate from the program code, they are declarative and implicate no control logic, they have to be called and executed by business rules engine. Every rule rejects, produces or projects some type of actions or data. Also each rule is associated with particular data. Until the user does not take any action, business rules are not called from the business rules repository. But when some action occurs, the business rules engine must verify business rules and evaluate that action. Generally, the business rules engine starts working on the three basic events INSERT, DELETE and UPDATE. Business rules that respond these events are similar to data base triggers; however they are kept separately from the database. Either way when the user makes an attempt to insert, delete or update data, the business rules engine must fire business rules that are associated with data that the user wants to change. It is like a monitoring process business rules engine is inactive and comes to action only when some changes in data are noticed. Business rules of this type must be fired at least on two separate events. But there can be other kinds of business rules in a system. That means, business rules are fired in other situations, not only when the user attempts to change data. This kind of rules is not associated with the data control; they can create data themselves. As an example, business rules of SELECT or CALCULA- TION type could be pointed out. The result of such business rules is derivative data that can be stored in a file, shown on the screen or printed in a report. These rules usually are called by specific events, which can depend on user's actions (button click) or simply on the timer. Business rules of this type do not have to be fired at least on two events, because they do not ensure the consistency of data, they can create data themselves. 296
3 Business Rules Manipulation Model 4. Invoking Business Rules from Database Triggers One of the main problems in business rules systems is to activate business rules and bring them to life. Data control business rules serve the same purpose as database triggers. These rules are responsible for data that are kept in the database. They even react to the same events as database triggers. Business rules differ from database triggers, because they reside in business rules repository and they must be activated by some particular action. Usually it is difficult to capture different events that can activate business rule. In the following example database triggers are used because reaction to events INSERT, DELETE and UPDATE is already implemented. We only need to extend a database trigger with appropriate line that activates business rules engine: CREATE TRIGGER [Trigger_Name] ON Table_Name FOR {[INSERT] [,] [UPDATE] [,] [DELETE]} AS BEGIN int, call Event(tablename, rowsaffected, nullrows, validrows, rowcount ) End Call callengine(temp_table) GO 5. Invoking Business Rules by Specific Events Some business rules can be activated by specific situations in business systems. These situations depend on user s actions and are not related with data control. Such business rules cannot be activated from database triggers, but by appropriate events occurring in a business application (Click(), ValueChange(), etc.). Specific code line is needed which activates business rules engine in the application: CallEngineSE(Event, F_Action_ID) Formally we can describe requirements for the business rules activating as follows: 1. Each rule must have an event that activates it: x ( Rule( x ) ) z (Event( z ) Activates( z, x )) 2. Each rule must have a related function of action: x ( Rule( x ) ) y (F_Action_ID( y ) Related( y, x )) The third requirement is mandatory only for data control business rules that are activated by the database triggers. 3. Each rule that is activated from database triggers must have a related table: x ( Rule( x ) ) z (Table( z ) Related(z,x)) 6. Business Rule Processing A number of actions is performed in the business rules system when some user-defined action occurs. Actions have to be performed in an appropriate priority. The sequence diagram showing these actions is presented in Figure 1. Figure 1. Sequence diagram of business rule processing When a user attempts to change the data, database trigger detects an event and calls a business rules engine. The Business rules engine defines what kind of event it was. For event INSERT existing data is not 297
4 L. Motiejūnas, R. Butleris made copied, for other two events (DELETE, UPDATE) data must be copied. Then user-defined actions (changes to existing data) are accepted and business rules engine selects appropriate business rule from business rule repository according to given parameters. The test described by the rule is performed. If the test fails, the initial data are restored, otherwise changes to data are accepted. 7. Business rules engine implementation analyze data specification. Abstract service ordering process was implemented for testing described algorithms. The set consisting of 15 business rules was entered into business rules repository in order to check possibility to enter different types of rules. The fullness of the business rules repository was checked using rules classification presented by GUIDE Project. All implemented functions and procedures are shown in Figure 2. The structure of the code matches diagram hierarchy shown in this figure. During research we assume that business rule set used for experiment is logically correct and we do not Figure 2. Function hierarchy diagram Figure 3. Architecture of the developed prototype integration into information system 298
5 Business Rules Manipulation Model Functions and procedures are executed according to the hierarchical structure of the given diagram. Two procedures and five functions were implemented during experiment. A detailed architecture of the developed prototype integration into an information system is shown in Figure 3. Algorithms of the two main procedures in the business rules engine are shown in Figure 4 and Figure 5. Figure 4. Algorithm of the procedure Event() After invoking procedure Event() from database trigger in the first step the values of variables are determined: Table Column Figure 5. Algorithm of the procedure CallEngine() Event ID Insert, Update, Delete; Changed Changed record count of elements In the second step temporal table TEMP_TABLE is created, which consists of the following columns: Row_ID, Change (mark is set if the field was changed), Event_ID (common for all fields), Range_Nr (matches predicted number of cycles). In the next step appropriate data are set by the given fields and table TEMP_TABLE is populated. If this table was populated succsesfully, then value TRUE is returned. The algorithm of the procedure CallEngine() is shown in Figure 5. In the next step of the experiment abstract service ordering process was implemented, but only in a traditional way business rules were buried in the code. Table 1 shows the difference between numbers of code lines, when business rules are implemented in traditional way and using the proposed business rules engine model. As the table shows, number of code lines needed for different rules can vary a lot. However, storing business rules in the repository and using proposed business rules engine, there is significant reduction of work that is needed to accomplish the same tasks. But it has to mentioned that the designer or programmer will have to enter business rules into rules repository, therefore reduction of work won t be as significant as it is shown in table Conclusions Metadata are already used in different DBMS. Resumptive metadata storage model is independent of particular database management system. Metadata allow navigating in the logical database without any additional programmed operations and identifying data elements that are impacted by particular business rules. Relating business rules with data not directly, but through metadata, better business rules independence is achieved. 299
6 L. Motiejūnas, R. Butleris Table 1. Difference between numbers of code lines Business rule Number of code lines Coding Using BR Client must have last name, first name, address and age 11 Client type must be only one of the following: Golden, Silver, Usual 4 Age of the client must be greater than 18 2 Additional actions 16 Order can be entered only by manager 6 7 If client ordered services for more than 7.000lt, then client type is Golden 19 6 Additional actions 2 Total number: The proposed business rules engine model gives us several advantages. Here are the main ones: 1. Differently from systems where rules are implemented as database triggers, in this work triggers are used only to invoke business rules. That s why during business rules implementation there is no need to have specific programming skills. 2. There is no need to indicate particular business rules, which have to be managed, because according to passed parameters needed business rule or rules set is invoked depending on situation. A big part of design and development process is automated using business rules, especially developing transactions and applications logic coding. Data structure is created using traditional DBMS; however, some of the restrictions and constraints can be described by business rules, connecting them with metadata about logical database. This gives to a programmer a possibility to enter needed changes without changing data structure. Instead of rewriting transactions or recoding application code, appropriate business rules can be implemented and automatically executed. Programmer needs only once to relate business rules with data, that are impacted by the rule and this rule will be always invoked when appropriate data are changed. Business rules are invoked from database triggers; therefore there is no need to write additional code for this task. Business rules repository acts as a common point of communication for both users and IT professionals. The advantages of developing systems using business rules are as follows: Rules are represented in a format that is understandable by users. Users can help enter and manipulate the rules. Rules are represented in a format that can be used by IT professionals as a system design document. Entered business rules can be immediately verified in the system. A key difference between the traditional communication process and the business rules-based communication process is that the information in the repository can be understood and used by users. The only potential communication breakdown in this environment is during entering business rules into the repository. Since it is possible verify entered rules almost immediately, users can quickly interact with the system and evaluate whether or not the business rules have been accurately represented. In the future work business rules editing interface will be improved in order to have business rules debugging features and business rules engine will be expanded with clear and thorough messages shown to user when business rule is violated. References [1] T. Beale. OCL 2.0 Review. 2003, [2] Blaze Advisor. Ruling a self-service world, 2001, vice.pdf. [3] Business Rules Group. Response to MDC/Microsoft Business Rules Metamodel. 1999, businessrulesgroup.org/brg-mdc/brg-mdc.pdf. [4] R. Butleris, K. Kapocius. The Business Rules Repository for Information Systems Design. 6th East- European Conference ADBIS'2002", Research Communications, Bratislava: STU, 2002, Vol.2,
7 Business Rules Manipulation Model [5] R. Butleris, L. Motiejūnas. A Framework for Business Rules Storing and Activating. 7th International Baltic Conference on Databases&Information Systems 2006, [6] R. Butleris, L. Motiejūnas. Metadata for business rules integration with database schema. IADIS Virtual Multi Conference on Computer Science and Information Systems (MCCSIS 2005), [7] R. Butleris, L. Motiejūnas. Veiklos taisyklių manipuliavimo mechanizmų analizė. Informacinės technologijos 2003, XIV-82 XIV-90. [8] E. Gottesdiener. Business Rules. Show Power, Promise. Application Development Trends, Vol.4, No , RulesShowPowerPromise-Gottesdiener.pdf. [9] Guide Business Rules Project, Final Report, 95/11. [10] P. Kardasis, P. Loucopoulos. Expressing and organising business rules. Information and Software Technology, 2004, Vol.4, No.11, [11] C. Mariano C. Bornhövd, A. P. Buchmann. Moving Active Functionality from Centralized to Open Distributed Heterogeneous Environments. Lecture Notes in Computer Science, 2001, Vol. 2172, [12] J. Nicola, M. Mayfield, M. Abney. Putting business rules into business objects. 2007, streamlinedmodeling.com/papers/business_rules.pdf. [13] A. Perkins. Business Rules Are Meta Data. Business Rules Journal, 2002, Vol., No.1, [14] D. Plotkin. Business Rules Everywhere. Intelligent Enterprise Magazine, 1999, 2 4, [15] R.G. Ross. The business Rule Book (2nd ed.). Business Rule Solutions, [16] R.G. Ross. Principles of the Business Rule Approach [17] G. Wagner, S. Tabet, H. Boley. MOF-RuleML: The Abstract Syntax of RuleML as a MOF Model. OMG's INTEGRATE Boston, Massachusettss 2003, [18] J.B. Warmer, K. Anneke. The object constraint language: precise modelling with UML, [19] K.D. Wilson. Business Rules, Platforms, and Inferencing. Business Rules Journal, 2003, Vol. 4, No Received July 2007.
Analysis of the Specifics for a Business Rules Engine Based Projects
Analysis of the Specifics for a Business Rules Engine Based Projects By Dmitri Ilkaev and Dan Meenan Introduction In recent years business rules engines (BRE) have become a key component in almost every
Business Rules in User Interfaces
1 of 9 BUSINESS RULES COMMUNITY : The World's Most Trusted Resource For Business Rule Professionals http://www.brcommunity.com Print this Page Business Rules in User Interfaces by Kamlesh Pandey The business
Oracle Data Integrator: Administration and Development
Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps
Triggers & Packages. {INSERT [OR] UPDATE [OR] DELETE}: This specifies the DML operation.
Triggers & Packages An SQL trigger is a mechanism that automatically executes a specified PL/SQL block (referred to as the triggered action) when a triggering event occurs on the table. The triggering
Rules and Business Rules
OCEB White Paper on Business Rules, Decisions, and PRR Version 1.1, December 2008 Paul Vincent, co-chair OMG PRR FTF TIBCO Software Abstract The Object Management Group s work on standards for business
Complex Information Management Using a Framework Supported by ECA Rules in XML
Complex Information Management Using a Framework Supported by ECA Rules in XML Bing Wu, Essam Mansour and Kudakwashe Dube School of Computing, Dublin Institute of Technology Kevin Street, Dublin 8, Ireland
Information Management Metamodel
ISO/IEC JTC1/SC32/WG2 N1527 Information Management Metamodel Pete Rivett, CTO Adaptive OMG Architecture Board [email protected] 2011-05-11 1 The Information Management Conundrum We all have Data
Common Warehouse Metamodel (CWM): Extending UML for Data Warehousing and Business Intelligence
Common Warehouse Metamodel (CWM): Extending UML for Data Warehousing and Business Intelligence OMG First Workshop on UML in the.com Enterprise: Modeling CORBA, Components, XML/XMI and Metadata November
A Tool Suite for the Generation and Validation of Configurations for Software Availability
A Tool Suite for the Generation and Validation of Configurations for Software Availability A. Gherbi 1, A. Kanso 1, F. Khendek 1, M. Toeroe 2 and A. Hamou-Lhadj 1 1 Concordia University, Montréal, Canada
All you need are models Anneke Kleppe, Klasse Objecten
Model Driven Architecture All you need are models Anneke Kleppe, Klasse Objecten Contents Limited Vision on MDA Modeling Maturity Levels Models Model Driven Development Model Driven Architecture MDA in
Business Rule Standards -- Interoperability and Portability
Rule Standards -- Interoperability and Portability April 2005 Mark H. Linehan Senior Technical Staff Member IBM Software Group Emerging Technology [email protected] Donald F. Ferguson IBM Fellow Software
Demystified CONTENTS Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals CHAPTER 2 Exploring Relational Database Components
Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals 1 Properties of a Database 1 The Database Management System (DBMS) 2 Layers of Data Abstraction 3 Physical Data Independence 5 Logical
The Concept of Automated Process Control
Scientific Papers, University of Latvia, 2010. Vol. 756 Computer Science and Information Technologies 193 203 P. The Concept of Automated Process Control Ivo Oditis 1, Janis Bicevskis 2 1 Bank of Latvia,
A Model-based Software Architecture for XML Data and Metadata Integration in Data Warehouse Systems
Proceedings of the Postgraduate Annual Research Seminar 2005 68 A Model-based Software Architecture for XML and Metadata Integration in Warehouse Systems Abstract Wan Mohd Haffiz Mohd Nasir, Shamsul Sahibuddin
Chapter 1: Introduction
Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases
Open Source egovernment Reference Architecture Osera.modeldriven.org. Copyright 2006 Data Access Technologies, Inc. Slide 1
Open Source egovernment Reference Architecture Osera.modeldriven.org Slide 1 Caveat OsEra and the Semantic Core is work in progress, not a ready to use capability Slide 2 OsEra What we will cover OsEra
BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4
International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.
USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT
TOTAL LOGISTIC MANAGEMENT No. 2 2009 PP. 5 13 Bartłomiej GAWEŁ, Anna PILCH USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT Abstract: The growth of efficiency in supply chain management depends on the
irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire [email protected] 25th
irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire [email protected] Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...
II. PREVIOUS RELATED WORK
An extended rule framework for web forms: adding to metadata with custom rules to control appearance Atia M. Albhbah and Mick J. Ridley Abstract This paper proposes the use of rules that involve code to
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
Tool Support for Model Checking of Web application designs *
Tool Support for Model Checking of Web application designs * Marco Brambilla 1, Jordi Cabot 2 and Nathalie Moreno 3 1 Dipartimento di Elettronica e Informazione, Politecnico di Milano Piazza L. Da Vinci,
MDA and Analysis of Web Applications
MDA and Analysis of Web Applications Behzad Bordbar and Kyriakos Anastasakis School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK {B.Bordbar,K.Anastasakis}@cs.bham.ac.uk Abstract.
FIPA agent based network distributed control system
FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine
Semantic Business Process Management
Arbeitsgruppe Lecture Semantic Business Process Management Prof. Dr. Adrian Paschke Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universitaet Berlin [email protected] http://www.inf.fu-berlin.de/groups/ag-csw/
What is Enterprise Architect? Enterprise Architect is a visual platform for designing and constructing software systems, for business process
1 2 3 What is Enterprise Architect? Enterprise Architect is a visual platform for designing and constructing software systems, for business process modeling, and for more generalized modeling purposes.
Organization of DSLE part. Overview of DSLE. Model driven software engineering. Engineering. Tooling. Topics:
Organization of DSLE part Domain Specific Language Engineering Tooling Eclipse plus EMF Xtext, Xtend, Xpand, QVTo and ATL Prof.dr. Mark van den Brand GLT 2010/11 Topics: Meta-modeling Model transformations
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische
Designing a Semantic Repository
Designing a Semantic Repository Integrating architectures for reuse and integration Overview Cory Casanave Cory-c (at) modeldriven.org ModelDriven.org May 2007 The Semantic Metadata infrastructure will
SEARCH The National Consortium for Justice Information and Statistics. Model-driven Development of NIEM Information Exchange Package Documentation
Technical Brief April 2011 The National Consortium for Justice Information and Statistics Model-driven Development of NIEM Information Exchange Package Documentation By Andrew Owen and Scott Came Since
Generating Enterprise Applications from Models
Generating Enterprise Applications from Models Vinay Kulkarni, R Venkatesh, Sreedhar Reddy Tata Research Development and Design Centre, 54, Industrial estate, Hadapsar, Pune, 411 013, INDIA { vinayk, rvenky,
Database Management System
ISSN: 2349-7637 (Online) RESEARCH HUB International Multidisciplinary Research Journal Research Paper Available online at: www.rhimrj.com Database Management System Viral R. Dagli Lecturer, Computer Science
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
KS3 Computing Group 1 Programme of Study 2015 2016 2 hours per week
1 07/09/15 2 14/09/15 3 21/09/15 4 28/09/15 Communication and Networks esafety Obtains content from the World Wide Web using a web browser. Understands the importance of communicating safely and respectfully
Data Discovery & Documentation PROCEDURE
Data Discovery & Documentation PROCEDURE Document Version: 1.0 Date of Issue: June 28, 2013 Table of Contents 1. Introduction... 3 1.1 Purpose... 3 1.2 Scope... 3 2. Option 1: Current Process No metadata
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University
SOA Success is Not a Matter of Luck
by Prasad Jayakumar, Technology Lead at Enterprise Solutions, Infosys Technologies Ltd SERVICE TECHNOLOGY MAGAZINE Issue L May 2011 Introduction There is nothing either good or bad, but thinking makes
Integration of Application Business Logic and Business Rules with DSL and AOP
e-informatica Software Engineering Journal, Volume 4, Issue, 200 Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska, Krzysztof Kasprzyk Faculty of Computer
Development of Tool Extensions with MOFLON
Development of Tool Extensions with MOFLON Ingo Weisemöller, Felix Klar, and Andy Schürr Fachgebiet Echtzeitsysteme Technische Universität Darmstadt D-64283 Darmstadt, Germany {weisemoeller klar schuerr}@es.tu-darmstadt.de
Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect
Oracle Data Integrator 11g New Features & OBIEE Integration Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect Agenda 01. Overview & The Architecture 02. New Features Productivity,
Databases in Organizations
The following is an excerpt from a draft chapter of a new enterprise architecture text book that is currently under development entitled Enterprise Architecture: Principles and Practice by Brian Cameron
D83167 Oracle Data Integrator 12c: Integration and Administration
D83167 Oracle Data Integrator 12c: Integration and Administration Learn To: Use Oracle Data Integrator to perform transformation of data among various platforms. Design ODI Mappings, Procedures, and Packages
MODULE FRAMEWORK : Dip: Information Technology Network Integration Specialist (ITNIS) (Articulate to Edexcel: Adv. Dip Network Information Specialist)
Year: 2011 (2 nd year) Term: 3 Class group: Blue Facilitator: C. Du Toit Description: Learn how to install, configure and administer a Microsoft SQL Server. Learn how to manage a SQL database hosted on
Data Integration using Semantic Technology: A use case
Data Integration using Semantic Technology: A use case Jürgen Angele, ontoprise GmbH, Germany Michael Gesmann, Software AG, Germany Abstract For the integration of data that resides in autonomous data
THE OPEN UNIVERSITY OF TANZANIA FACULTY OF SCIENCE TECHNOLOGY AND ENVIRONMENTAL STUDIES BACHELOR OF SIENCE IN INFORMATION AND COMMUNICATION TECHNOLOGY
THE OPEN UNIVERSITY OF TANZANIA FACULTY OF SCIENCE TECHNOLOGY AND ENVIRONMENTAL STUDIES BACHELOR OF SIENCE IN INFORMATION AND COMMUNICATION TECHNOLOGY OIT 217.DATABASE CONCEPTS AND DESIGN COURSE OUTLINE
Automating Rich Internet Application Development for Enterprise Web 2.0 and SOA
Automating Rich Internet Application Development for Enterprise Web 2.0 and SOA Enterprise Web 2.0 >>> FAST White Paper November 2006 Abstract Modern Rich Internet Applications for SOA have to cope with
ProGUM-Web: Tool Support for Model-Based Development of Web Applications
ProGUM-Web: Tool Support for Model-Based Development of Web Applications Marc Lohmann 1, Stefan Sauer 1, and Tim Schattkowsky 2 1 University of Paderborn, Computer Science, D 33095 Paderborn, Germany {mlohmann,sauer}@upb.de
Introduction to XML Applications
EMC White Paper Introduction to XML Applications Umair Nauman Abstract: This document provides an overview of XML Applications. This is not a comprehensive guide to XML Applications and is intended for
Model-Driven Data Warehousing
Model-Driven Data Warehousing Integrate.2003, Burlingame, CA Wednesday, January 29, 16:30-18:00 John Poole Hyperion Solutions Corporation Why Model-Driven Data Warehousing? Problem statement: Data warehousing
Integration of Application Business Logic and Business Rules with DSL and AOP
Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska and Krzysztof Kasprzyk Wroclaw University of Technology, Wyb. Wyspianskiego 27 50-370 Wroclaw, Poland [email protected]
Repository-Centric Enterprise Architecture
Repository-Centric Enterprise Architecture Copyright 2005, Enterprise Elements, Inc. Abstract - Enterprise Architecture modeling tools are used to capture complex knowledge about organizations and technology.
QTP Open Source Test Automation Framework Introduction
Version 1.0 April 2009 D ISCLAIMER Verbatim copying and distribution of this entire article are permitted worldwide, without royalty, in any medium, provided this notice is preserved. Table of Contents
SERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
SQL Server. 2012 for developers. murach's TRAINING & REFERENCE. Bryan Syverson. Mike Murach & Associates, Inc. Joel Murach
TRAINING & REFERENCE murach's SQL Server 2012 for developers Bryan Syverson Joel Murach Mike Murach & Associates, Inc. 4340 N. Knoll Ave. Fresno, CA 93722 www.murach.com [email protected] Expanded
Customer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
How To Write A Diagram
Data Model ing Essentials Third Edition Graeme C. Simsion and Graham C. Witt MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF ELSEVIER AMSTERDAM BOSTON LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
BUILDING OLAP TOOLS OVER LARGE DATABASES
BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,
BUSINESS RULES MANAGEMENT AND BPM
KINGSTON & CROYDON BRANCH BUSINESS RULES MANAGEMENT AND BPM WHO'S MANAGING YOUR RULES? Paul Vincent Rules Specialist and Product Management Fair Isaac October 12, 2005 Agenda Business Rules Approach a
A methodology for secure software design
A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 [email protected] 1. Introduction A good percentage of the
BUSINESS RULES AND GAP ANALYSIS
Leading the Evolution WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Discovery and management of business rules avoids business disruptions WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Business Situation More
Model Driven Interoperability through Semantic Annotations using SoaML and ODM
Model Driven Interoperability through Semantic Annotations using SoaML and ODM JiuCheng Xu*, ZhaoYang Bai*, Arne J.Berre*, Odd Christer Brovig** *SINTEF, Pb. 124 Blindern, NO-0314 Oslo, Norway (e-mail:
Practical meta data solutions for the large data warehouse
K N I G H T S B R I D G E Practical meta data solutions for the large data warehouse PERFORMANCE that empowers August 21, 2002 ACS Boston National Meeting Chemical Information Division www.knightsbridge.com
Clarifying a vision on certification of MDA tools
SCIENTIFIC PAPERS, UNIVERSITY OF LATVIA, 2010. Vol. 757 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES 23 29 P. Clarifying a vision on certification of MDA tools Antons Cernickins Riga Technical University,
Chapter 10 Practical Database Design Methodology and Use of UML Diagrams
Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10 Outline The Role of Information Systems in
Module 1: Getting Started with Databases and Transact-SQL in SQL Server 2008
Course 2778A: Writing Queries Using Microsoft SQL Server 2008 Transact-SQL About this Course This 3-day instructor led course provides students with the technical skills required to write basic Transact-
Making Business Rules operational. Knut Hinkelmann
Making Business Rules operational Knut Hinkelmann Levels of Expression For expressing rules there is a trade-off between acessibility of business meaning and desirable automation Rules can be expressed
ORACLE 9I / 10G / 11G / PL/SQL COURSE CONTENT
ORACLE 9I / 10G / 11G / PL/SQL COURSE CONTENT INTRODUCTION: Course Objectives I-2 About PL/SQL I-3 PL/SQL Environment I-4 Benefits of PL/SQL I-5 Benefits of Subprograms I-10 Invoking Stored Procedures
Talend Metadata Manager. Reduce Risk and Friction in your Information Supply Chain
Talend Metadata Manager Reduce Risk and Friction in your Information Supply Chain Talend Metadata Manager Talend Metadata Manager provides a comprehensive set of capabilities for all facets of metadata
Process Modeling using BPMN 2.0
Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes
Using UML to Construct a Model Driven Solution for Unified Access to Disparate Data
Using UML to Construct a Model Driven Solution for Unified Access to Disparate Data Randall M. Hauch VP Development, Chief Architect Metadata Management OMG's Second Workshop on UML for Enterprise Applications:
Chapter 8 Approaches to System Development
Systems Analysis and Design in a Changing World, sixth edition 8-1 Chapter 8 Approaches to System Development Table of Contents Chapter Overview Learning Objectives Notes on Opening Case and EOC Cases
Fast and Easy Delivery of Data Mining Insights to Reporting Systems
Fast and Easy Delivery of Data Mining Insights to Reporting Systems Ruben Pulido, Christoph Sieb [email protected], [email protected] Abstract: During the last decade data mining and predictive
WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT
WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT CONTENTS 1. THE NEED FOR DATA GOVERNANCE... 2 2. DATA GOVERNANCE... 2 2.1. Definition... 2 2.2. Responsibilities... 3 3. ACTIVITIES... 6 4. THE
Writing Queries Using Microsoft SQL Server 2008 Transact-SQL
Course 2778A: Writing Queries Using Microsoft SQL Server 2008 Transact-SQL Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Microsoft SQL Server 2008 Type: Course
Generating Aspect Code from UML Models
Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany [email protected] Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5. No. 8, November-December 2006 Requirements Engineering Tasks Donald Firesmith,
Requirements Management
REQUIREMENTS By Harold Halbleib Requirements Management Identify, Specify, Track and Control Requirements Using a Standard Process About the author... Harold Halbleib has a degree in Electrical Engineering
University Data Warehouse Design Issues: A Case Study
Session 2358 University Data Warehouse Design Issues: A Case Study Melissa C. Lin Chief Information Office, University of Florida Abstract A discussion of the design and modeling issues associated with
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
HP Quality Center. Upgrade Preparation Guide
HP Quality Center Upgrade Preparation Guide Document Release Date: November 2008 Software Release Date: November 2008 Legal Notices Warranty The only warranties for HP products and services are set forth
Chapter 2 Database System Concepts and Architecture
Chapter 2 Database System Concepts and Architecture Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Outline Data Models, Schemas, and Instances Three-Schema Architecture
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
Introduction to Database Systems. Chapter 1 Introduction. Chapter 1 Introduction
Introduction to Database Systems Winter term 2013/2014 Melanie Herschel [email protected] Université Paris Sud, LRI 1 Chapter 1 Introduction After completing this chapter, you should be able to:
20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA
International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.
