Flylib.com
Index_P
Previous page
Table of content
Next page
P
Palm OS 88, 90
PAN 91
Patterns for e-business 3
Application patterns 5, 12
Best practices 5, 16
Business patterns 5, 7
Composite patterns 5, 10
Guidelines 5, 16
Integration patterns 5, 8
Product mappings 5, 16
Runtime patterns 5, 13
Web site 6
Performance 241
Personal Area Network 91
Personalization 141
Collaborative filtering 142
Rules-based 142
User profile-based 142
Personalization server node 43
Personalized Delivery application pattern 36
Pervasive
Fat client 162
Thin client 161
Pervasive application clients 112
Pervasive Clients 84
Pervasive Device Access application pattern 36
Pervasive Devices Services node 44
Pervasive Portal
Security 200
System management 231
Pervasive Portlet 127
Pervasive solution
Business strategies 23
Pervasive user node 40
POP3 106
Population-Multi Step application pattern 36
Portal
Portlet 98
Single Sign-On 144
Portal composite pattern 2122, 2728
Portal composite pattern variation for Pervasive solutions 52
Portal guidelines 138
Portal Server
Single Sign-On 216
Portal Server Toolkit 161
Portlet 98
ActionEvents 170
Communication 135
Configure Mode 169
Deploy 175
Deployment Descriptor 172
Development 168
Edit Mode 169
Help Mode 169
JSP 171
MessageEvents 170
MVC 126
Pervasive 127
Session 140
WindowEvents 170
primary business driver 30
Product mappings 5, 16
Production environment 232
Proxy pattern 133
Public Key Infrastructure 40, 102
Previous page
Table of content
Next page
Patterns: Pervasive Portals Patterns for E-Business Series
ISBN: 0738427772
EAN: 2147483647
Year: 2002
Pages: 83
Authors:
IBM Redbooks
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
A Brief History of Directory Services
Sorting Search Results
Binary Data Conversion
Discovering Schema Information at Runtime
Determining User Group Membership in Active Directory and ADAM
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Conclusion
The Complete Cisco VPN Configuration Guide
Keys
SSL VPNs
Cisco WebVPN Solution
PIX and ASA Feature and Product Overview
Summary
Java Concurrency in Practice
Reducing Context Switch Overhead
Summary
Summary
Atomic Variable Classes
The Java Memory Model
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
The Transport Network Infrastructure
Whats Next on the Internet
End-to-End Optical Networking
Wireless Bandwidth
5G: Enhanced Data Services
Digital Character Animation 3 (No. 3)
Conclusion
Creating Appealing Poses
Transitions
Four-Legged Mammals
Chapter Nine. Acting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies