Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Overview
Table 1-1: The four documented Business patterns
Table 1-2: The two documented Integration patterns
Table 1-3: Composite patterns
Chapter 3: A Recommended Approach to Architecting Portal Solutions
Table 3-1: Best practice process & its relationship to development methodology & large reusable assets
Table 3-2: e-Government Use Case descriptions
Table 3-3: Portal composite pattern generic use case descriptions
Table 3-4: Solution use cases that match Portal composite pattern generic use cases
Table 3-5: Functional blocks that were identified after grouping similar use cases
Table 3-6: Subsystems/Use Cases handled by the Composite pattern
Table 3-7: Excerpt of the Functional block table
Table 3-8: Excerpt of the Functional block table
Table 3-9: Validation of Application Patterns covered by Composite pattern for e-government case study
Table 3-10: Use cases for commerce case study
Table 3-11: Excerpt of the Architecture Decisions document
Table 3-12: The Business Drivers for the Extended Enterprise::Application patterns
Table 3-13: Side-by-side look at the pattern's business drivers as opposed to the case study's
Table 3-14: Highlighting the pattern's applicable business drivers
Table 3-15: Highlighting the pattern's applicable IT drivers
Table 3-16: Description of the various Application patterns
Table 3-17: Summary of Application patterns for delta Business and Integration patterns
Table 3-18: An excerpt of the Architecture Decisions document
Table 3-19: Description of how the deltas were addressed in the AOD (Logical Nodes)
Table 3-20: e-government case study components
Table 3-21: How scaling techniques relate to scaling objectives
Chapter 4: Architecting on Demand Workplace Solutions
Table 4-1: IFB use case descriptions
Table 4-2: Matching the IFB use cases to the generic PCP use cases
Table 4-3: Functional blocks for IFB AOD
Table 4-4: Subsystems/use cases covered by the PCP (in
red
)
Table 4-5: Summary of Application patterns for delta Business and Integration patterns
Table 4-6: Summary of decisions for additional logical nodes to support requirements
Table 4-7: Associate update personnel information use case flow
Table 4-8: Description of SSO walkthrough
Table 4-9: Matching case study use cases to ODW generic use cases
Chapter 5: Galaxia and the on Demand Workplace
Table 5-1: Generic use cases
Table 5-2: Applications and users involved in the scenario
Table 5-3: ECR process phase 1
Table 5-4: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-5: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-6: ECR Process Phase 2—Change Impact Analysis—Approval
Table 5-7: ECR Process Phase 3
Table 5-8: ECR Process Phase 4
Table 5-9: ePCM modules
Appendix B: Using WebSphere Portal
Table B-1: Portal Usage reports from Tivoli Web Site Analyzer
Table B-2: Collaborative portlets
Table B-3: Lotus Collaborative Components
< Day Day Up >
Previous page
Table of content
Next page
Architecting Portal Solutions: Applications Development
ISBN: 0738498645
EAN: 2147483647
Year: 2003
Pages: 82
Authors:
IBM Redbooks
BUY ON AMAZON
Project Management JumpStart
Developing Project Management Skills
Planning and Acquiring Resources
Executing the Project
Controlling the Project Outcome
Closing the Books
Absolute Beginner[ap]s Guide to Project Management
Creating a Schedule
What Causes Unplanned Scope Changes?
Key Risk Management Principles
Principles of Managing Project Quality
Ending a Project
CISSP Exam Cram 2
About the Author
Telecommunications and Network Security
Major Legal Systems
Exam Prep Questions
Answers to Practice Exam Questions
Network Security Architectures
Applied Knowledge Questions
Attack Taxonomy
Network Security Technologies
Applications
DNS
Programming Microsoft ASP.NET 3.5
ASP.NET Iterative Controls
Configuration and Deployment
Working with Web Services
HTTP Handlers and Modules
Index
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies