• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 9
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 63
  • 63
  • 49
  • 30
  • 28
  • 19
  • 16
  • 15
  • 13
  • 12
  • 12
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Integrace aplikací SaaS do podnikového informačního systému / Integration of SaaS applications into business information systems

Randová, Libuše January 2009 (has links)
The thesis deals with an analysis of approach methods, that can be used in integration of SaaS model applications into business information systems. To this end it presents business information systems. Description of these was performed from a general viewpoint. A description of what business information systems are was provided as well as a description of their architecture and service-oriented architecture. Business information sysstems were then described from a development/operation point of view, particular phases of the corelation between business and ICT were summed up, as well as ICT service supply models and development and operation alternatives. At the end of the chapter, a description of business information system components was performed. Services were described in the next chapter - first generally, with special interest in service characteristics and categorization. Furthermore I explored the concept of 'Anything as a Service' (XaaS), providing a summary of what can be provided as a service. Then a distribution model for Software as a Service (SaaS) was described along with its characteristics, parameters, benefits and limitations. At the end of the chapter cloud computing, its characteristics and models of implementation were described and the most notable providers were presented. The next chapter contains a description of integration and is targetted mostly on the description of system integration, on the system integrator as a person, on a description of technological means, usable in the integration itself. The next chapter is dedicated to a description of integration scenarios of business IS using SaaS applications. In the next chapter, an approach to the analysis of integration scenarios is defined, based on various viewpoints. The last chapter contains an assesment of particular integration scenarios and a consequential evaluation performed along evaluation criteria.
52

Design for Addressing Data Privacy Issues in Legacy Enterprise Application Integration

Meddeoda Gedara, Kavindra Kulathilake January 2019 (has links)
Electronic message transfer is the key element in enterprise application integration (EAI) and the privacy of data transferred must be protected by the systems involved in the message transfer from origin to the destination. The recent data privacy regulation such as GDPR (General Data Protection Regulation) has enforced the organizations to ensure the privacy of the personal data handled with obligations to provide visibility and control over to the data owner. Privacy concerns with relevant to sensitive data embedded and transferred through business-to-business (B2B) middleware platforms in enterprise architecture are mostly at risk with the legacy nature of the products and the complexity of system integrations. This poses a great threat and challenge to organizations processing sensitive data over the interconnected systems in complying with regulatory requirements.  This research proposes a solution design to address the data privacy issues related to personal data handled in an enterprise application integration framework. Where electronic messages used to transfer personally identifiable information (PII). The proposal consisting of a design called “Safety Locker” to issue unique tokens related to encrypted PII elements stored in a persistence data storage based on Apache Ignite. While adding REST API interfaces to access the application functionality such as tokenization, de-tokenization, token management and accessing audit logs. The safety locker can run as a standalone application allowing clients to access its functionality remotely utilizing hypertext transfer protocol (HTTP). The design allows the data controllers to ensure the privacy of PII by embedding tokens generated from the application within the electronic messages transferred through interconnected systems. The solution design is evaluated through a proof of concept implementation, which can be adapted, enhanced to apply in EAI implementations.
53

Modelom vođena semantička integracija poslovnih aplikacija / Model based semantic enterprise application integration

Vuković Željko 21 December 2019 (has links)
<p>U sklopu doktorske disertacije izvršeno je istraživanje vezano za<br />automatizaciju integracije poslovnih aplikacija. Prikazani pristup<br />kombinuje model strukture interfejsa aplikacija koje se integrišu sa<br />formalnim opisom njihove semantike, datim u vidu ontologije. Na<br />osnovu ovih izvora, obavlja se automatsko mapiranje među elementima<br />interfejsa koji se integrišu, kao i detekcija i razrešavanje<br />semantičkih konflikata. Razvijena je praktična implementacija<br />predloženog pristupa, koja je korišćena za verifikaciju teorijskih<br />razmatranja, a uključuje adaptivan radni okvir i jezik specifičan za<br />domen. Predloženi pristup je verifikovan na dva realna<br />integraciona scenarija i jednim eksperimentom.</p> / <p>This thesis presents a research in the field of automation of enterprise<br />application integration. The approach combines structural models of<br />interfaces of the applications being integrated with a formal specification of<br />their semantics, given in form of an ontology. Using information from these<br />sources, automated interface mapping is performed, along with detection and<br />resolution of semantic conflicts. A practical implementation of the presented<br />approach was developed and used to verify theoretical considerations. The<br />implementation includes an adaptive framework and a domain specific<br />language. The proposed approach has been verified on two real-world<br />integration scenarios and one experiment.</p>
54

Model-Driven Development of Complex and Data-Intensive Integration Processes

Boehm, Matthias, Habich, Dirk, Lehner, Wolfgang, Wloka, Uwe 12 January 2023 (has links)
Due to the changing scope of data management from centrally stored data towards the management of distributed and heterogeneous systems, the integration takes place on different levels. The lack of standards for information integration as well as application integration resulted in a large number of different integration models and proprietary solutions. With the aim of a high degree of portability and the reduction of development efforts, the model-driven development—following the Model-Driven Architecture (MDA)—is advantageous in this context as well. Hence, in the GCIP project (Generation of Complex Integration Processes), we focus on the model-driven generation and optimization of integration tasks using a process-based approach. In this paper, we contribute detailed generation aspects and finally discuss open issues and further challenges.
55

Vacation system

Lee, Min-Wei 01 January 2005 (has links)
The purpose of this project was to explore the use of Web services to solve enterprise computing problems. XML-based Web services allow complex information systems to be subdivided. In order to explore this architectural paradigm, two systems were built: an employee records sytem, and a vacation system.
56

A pattern based approach for the architectural design of e-business applications

Dabous, Feras Taleb Abdel Rahman, School of Information Systems Technology & Management, UNSW January 2005 (has links)
With the widespread use of the Internet and its associated technologies, enterprises have to evolve in the way they are conducting business. 'e-business applications' refer to a new class of distributed applications that involves the Internet as a communication platform. Each e-business application supports the full automation of business processes that can span across multiple enterprises. For a given application domain that involves e-business application development, a number of design decisions that best fullfil stakeholders requirements have to be made. One important issue is the reuse of functionality which exists within legacy systems that can belong to one or more enterprises within the same domain. Most existing design approaches are inadequate in supporting the exploration of all design combinations. Moreover, there is little work on how to identify the best design decisions systematically for a given application domain. In this thesis we present a pattern-based approach that addresses the architectural design of e-business applications. We identify a number of architectural patterns whose instantiation on a given design problem correspond to different architectural design alternatives. We also identify models that enable the estimation of quality attributes for such alternatives. Then we investigate and utilise methods to select the best pattern for a given design problem. We also describe the process of generating the alternative architectures, estimating their qualities, and then ranking them with respect to any quality attribute or a combination of quality attributes. We validate this approach on a real life case study in the area of capital markets. The case study concerns realistic e-business applications that rely on existing legacy applications. The validation exercise has produced predictions which have been compared with actual design decisions that have been made. The thesis also proposes a framework for the systematic identification of architectural patterns. An additional set of architectural patterns and their impact on the case study are discussed. The main contribution of this thesis is in the identification of patterns and quality attributes models for the architectural design of e-business applications that aid in the systematic selection of the most appropriate architectural pattern for a given problem context.
57

透過ODS進行企業資訊系統整合之研究-以某企業為例 / Using ODS to integrate enterprise systems: A case study

黃琬婷, Huang,wan ting Unknown Date (has links)
由於科技快速進步,企業經營也隨著科技的進步而產生重大變化,不但需求變化快速,企業還要即時快速反應外在環境,於是企業對於資訊系統整合的議題越來越重視,希望將功能導向的系統轉變為流程導向的系統,將資訊有效的整合及標準化,讓企業能快速地與外在環境連結,進而提升整體營運績效。 整合的方法非常的多,大致上可分為四類。目前對於哪一種整合方法是最有效率、效益也無一定論。最主要的原因是不同的整合個案會有不同的整合需求,若只從理論方面來探討資訊系統整合所帶來的效用並無法具體地呈現其價值。 有鑑於此,本研究之目的是希望透過個案單位的作業模型,分析、建構出整合的資料模型。因此,本研究以階段性的方法設計資料整合模型及其運作方法。在第一、二階段當中,先針對個案單位的流程進行系統資料流程塑模及業務流程塑模,再從業務面及系統面找出資訊中斷的地方及因素,並將問題具體地描述出來。在第三階段中,本研究挑選了最適合此個案單位的整合方法,也就是使用資料層級(Data-Level)整合的方法,設計整合的資料模型將資訊流完整的串接起來以支援企業的決策需求。最後一階段則要利用ETL說明整合的系統運作模式,並說明此個案單位使用ETL時,可能會遇到的問題及初步的解決方法。 / Owing to rapid advances in technology, enterprises have a major change of the progress of science and technology. The enterprises not only change rapidly in demand, but also have to response to the external environment rapidly. Hence, enterprise information system integration issues get more attentions. Enterprises hope to improve their systems from function-oriented to process-oriented because the effective integration of information and standardization allows enterprises to quickly link with the external environment and to enhance the overall operating performance. However, there are many kinds of integrated approaches. At present, there is no substantive conclusion in approaches to integrate efficiently all systems in business. The main reason is that the integration of different cases has different integration requirements. Therefore, it cannot concretely show the value of system integration through the discussion of the theoretical aspects. In this thesis, this study aims to enhance the operation of a case to model, analyze, and construct an integrated data model. This research has 4 phases to construct integrated data model. In phase 1 and 2, this study builds the case data flow modeling and business process modeling and discovers information gap. In phase 3, the study selects the most suitable method for this case, that is, to use the data level integrated approach to design integrated data model. Finally, using ETL illustrates system operation mode and describes the case which may encounter problems and initial solutions follow in phase 4.
58

Risk-based proactive availability management - attaining high performance and resilience with dynamic self-management in Enterprise Distributed Systems

Cai, Zhongtang 10 January 2008 (has links)
Complex distributed systems such as distributed information flows systems which continuously acquire manipulate and disseminate information across an enterprise's distributed sites and machines, and distributed server applications co-deployed in one or multiple shared data centers, with each of them having different performance/availability requirements that vary over time and competing with each other for the shared resources, have been playing a more serious role in industry and society now. Consequently, it becomes more important for enterprise scale IT infrastructure to provide timely and sustained/reliable delivery and processing of service requests. This hasn't become easier, despite more than 30 years of progress in distributed computer connectivity, availability and reliability, if not more difficult~cite{ReliableDistributedSys}, because of many reasons. Some of them are, the increasing complexity of enterprise scale computing infrastructure; the distributed nature of these systems which make them prone to failures, e.g., because of inevitable Heisenbugs in these complex distributed systems; the need to consider diverse and complex business objectives and policies including risk preference and attitudes in enterprise computing; the issues of performance and availability conflicts, varying importance of sub-systems in an enterprise's distributed infrastructure which compete for resource in currently typical shared environment; and the best effort nature of resources such as network resources, which implies resource availability itself an issue, etc. This thesis proposes a novel business policy-driven risk-based automated availability management which uses an automated decision engine to make various availability decisions and meet business policies while optimizing overall system utility, uses utility theory to capture users' risk attitudes, and address the potentially conflicting business goals and resource demands in enterprise scale distributed systems. For the critical and complex enterprise applications, since a key contributor to application utility is the time taken to recover from failures, we develop a novel proactive fault tolerance approach, which uses online methods for failure prediction to dynamically determine the acceptable amounts of additional processing and communication resources to be used (i.e., costs) to attain certain levels of utility and acceptable delays in failure recovery. Since resource availability itself is often not guaranteed in typical shared enterprise IT environments, this thesis provides IQ-Paths with probabilistic service guarantee, to address the dynamic network behavior in realistic enterprise computing environment. The risk-based formulation is used as an effective way to link the operational guarantees expressed by utility and enforced by the PGOS algorithm with the higher level business objectives sought by end users. Together, this thesis proposes novel availability management framework and methods for large-scale enterprise applications and systems, with the goal to provide different levels of performance/availability guarantees for multiple applications and sub-systems in a complex shared distributed computing infrastructure. More specifically, this thesis addresses the following problems. For data center environments, (1) how to provide availability management for applications and systems that vary in both resource requirements and in their importance to the enterprise, based both on operational level quantities and on business level objectives; (2) how to deal with managerial policies such as risk attitude; and (3) how to deal with the tradeoff between performance and availability, given limited resources in a typical data center. Since realistic business settings extend beyond single data centers, a second set of problems addressed in this thesis concerns predictable and reliable operation in wide area settings. For such systems, we explore (4) how to provide high availability in widely distributed operational systems with low cost fault tolerance mechanisms, and (5) how to provide probabilistic service guarantees given best effort network resources.
59

Proposta de critérios para seleção das tecnologias de enterprise application integration: baseado em revisão da literatura

Vicente, Manassés 07 November 2015 (has links)
Submitted by Marcia Silva (marcia@latec.uff.br) on 2016-02-03T20:52:22Z No. of bitstreams: 1 DISSERT MANASSES VICENTE.pdf: 2610789 bytes, checksum: 11b7e25414d7db496b0844456246caf4 (MD5) / Made available in DSpace on 2016-02-03T20:52:22Z (GMT). No. of bitstreams: 1 DISSERT MANASSES VICENTE.pdf: 2610789 bytes, checksum: 11b7e25414d7db496b0844456246caf4 (MD5) Previous issue date: 2015-11-07 / Existem duas abordagens para integração de sistemas de informação: ERP (Enterprise Resource Planning) e EAI (Enterprise Application Integration), sendo a mais conhecida a primeira delas. A integração fornecida pelo ERP não é por si só suficiente visto que falhou em atender a todas as áreas funcionais, deixando uma lacuna preenchida por softwares especialistas ou sistemas legados, principalmente em verticais de mercado não atendidas pelo ERP. É através da integração dos vários tipos de aplicações empresariais – EAI – que se atinge a integração ou inter-relacionamento dos processos de negócios e/ou estruturas de negócios. Portanto, ela é tanto estratégica quanto operacional, pois afeta os resultados das organizações, conferindo-lhes competitividade e sustentabilidade nos negócios. Entretanto, as dificuldades do EAI começam na escolha / seleção das tecnologias existentes ainda no processo de aquisição, tornando a tomada de decisão na aquisição de tecnologias ou soluções de EAI uma tarefa complexa e difícil devido aos critérios não apenas quantitativos, mas também qualitativos. O objetivo desta pesquisa é definir critérios para seleção de tecnologias de EAI. O método de pesquisa consiste na revisão da literatura para mapear os critérios usados na seleção de softwares, principalmente EAI e ERP, e na análise do conteúdo da norma ISO/IEC 25010:2011 sobre os critérios de qualidade de software e do Guia de Aquisições do Modelo de Referência para Melhoria de Processo do Software Brasileiro (MPS-BR) baseado na Norma Internacional ISO/IEC 12207:2008 que descreve o processo de aquisição de software e serviços correlatos. Este estudo apresentou como contribuição, além da quantidade expressiva de critérios identificados na literatura possíveis de serem usados no processo de aquisição de softwares, um conjunto de critérios provenientes da literatura científica e técnica, categorizados em três níveis, que possibilita aos profissionais de EAI poderem atuar de modo proativo desde a escolha da solução de EAI. / There are two approaches for the information systems integration: ERP (Enterprise Resource Planning) which is well-known, and EAI (Enterprise Application Integration). The ERP integration is not totally satisfactory as it has failed in supplying all functional areas, providing space to be filled by specialized softwares or legacy systems, mainly in market verticals where ERP could not meet. By the integration with the several types of business applications – EAI – it is possible to reach an integration or interrelationship of the business processes and/or structures; therefore, it is as strategic as operational since it affects the organizational results, providing the organizations business competitiveness and sustainability. However, the EAI’s difficulties lie in choosing/selecting the existing technologies in the acquisition process, turning the decision-making of technologies or EAI solutions acquisition a hard and complex task due to the criteria not only quantitative but also qualitative. The purpose of this research is to define criteria for EAI technologies selection. The method of research consists of literature revision to map the criteria used in softwares selection, mainly the EAI and ERP, and analysis of ISO/IEC 25010:2011 standard content on the software quality criteria and Guia de Aquisições do Modelo de Referência para Melhoria de Processo do Software Brasileiro (MPS-BR) based on ISO/IEC 12207:2008 International Standard, which describes the acquisition process of software and associated services. This study has presented as contribution, aside from the significant amount of the identified criteria in the literature and their possibility of being used in software acquisition process, a set of criteria derived from scientific and technical literature, categorized in three levels, enabling EAI’s professionals to act proactively from the choice of EAI solution.
60

Analyzing Service Oriented Architecture (SOA) in Open Source Products

Gohar, Adnan January 2010 (has links)
Service Oriented Architecture (SOA) is an architectural paradigm that allows building of infrastructures for diverse application interaction and integration via services across different platforms, domains of technology and locations. SOA differs from traditional architectures, as it focuses on integrating capabilities that are distributed and implemented using a mixture of technologies. SOA provides a set of methodologies and strategies to accomplish interoperability and integration among different technology stacks.   Vattenfall is the fifth the largest energy supplier within Europe. Having operational systems in different countries brings the challenge of integrating all these distributed systems and this integration is a vital requirement for Vattenfall. The company is currently using Microsoft proprietary products to achieve integration across different technological platform, but requires a better integration infrastructure which is easily extensible and cost effective.   This thesis investigates the impact of implementing Service Oriented Architecture (SOA) using open source or proprietary software products within Vattenfall, from technological and financial perspectives. For this purpose, different technical and non-technical function blocks are identified which are essential for the implementation of SOA. These function blocks are mapped with SOA solutions provided by Red Hat’s JBoss Open Source SOA Platform and Microsoft’s SOA Platform. After mapping, a vendor specific technical and non-technical comparative analysis is carried out based on the function blocks, highlighting the strengths and weaknesses of each vendor.   Finally, an evaluation scheme is purposed based on the technical comparative analysis of vendors, SOA solution cost and SOA competence required. The results from this evaluation scheme are used to recommend the best solution vendor for Vattenfall Nordic. Moreover, this evaluation scheme can also be used to facilitate management in arriving at an appropriate decision about implementation of SOA, while remaining within their requirements and constraints.

Page generated in 0.2509 seconds