|
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] teams success of SOAs technical failures technical integration technical roadmaps technical services technology complexity CSG architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th Deutsche Post architecture 2nd 3rd 4th contracts management repositories security service interfaces Intelligent Finance architecture 2nd contracts repositories service interfaces 2nd Winterthur 2nd 3rd 4th contracts 2nd 3rd management 2nd 3rd repositories 2nd 3rd security 2nd 3rd service interfaces 2nd 3rd technology gateways 2nd technology impact CSG 2nd 3rd 4th 5th Deutsche Post 2nd Intelligent Finance 2nd 3rd 4th 5th 6th Winterthur 2nd 3rd 4th 5th 6th technology whitepapers telnet test drivers test suites creating testing 2nd 3rd 4th 5th 6th 7th 8th functional testing regression test environments creating systematic testing test suites creating thin thread model 2nd 3rd 4th thin-thread approach Tibco Software Rendezvous tight coupling 2nd 3rd 4th 5th 6th timestamps optimistic concurrency control tokens session-tokens transaction-tokens tools automated test tools top-down code generation 2nd Total Quality Management TP monitors [See transaction monitors] TPMs [See transaction monitors] TPMs (Transaction Processing Monitors) tracing transaction boundaries logging 2nd 3rd transaction chains 2nd combining with compensating transactions transaction coordinator transaction logic exposing to service clients transaction logs transaction management execution containers transaction monitors 2nd 3rd 4th 5th 6th logging Transaction Processing Monitors [See TPMs] transaction-tokens transactional steps 2nd 3rd 4th 5th 6th 7th 8th 9th choosing granularity 2nd 3rd 4th semi-transactional steps 2nd 3rd 4th transactions ACID transactions 2nd 3rd client controlled transactions 2nd 3rd compensating transactions 2nd multilevel transactions nested transactions server controlled transactions 2nd 3rd Web services-based transaction protocols transport security 2nd 3rd tresource managers trust domains 2nd 3rd 4th Tuxedo 2nd Two-Phase Commit Protocol [See 2PC] TX monitors [See transaction monitors] |
|