|
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] abstraction components functional decomposition access control lists (ACLs) access layers binding design rules ACID (atomicity, consistency, isolation, durability) ACID transactions limitations of integration of legacy systems and packaged applications lack of support for long-lived transactions organizational challenges performance ACLs (access control lists ADA ADA programming language adapters intermediary services adding service orientation to project management methodologies additional runtime features distribution techniques ADO DataSets ADO DiffGrams agility 2nd 3rd change requests IT application frontends SOAs 2nd application heterogeneity application landscape application level protocol distributed 2PC 2nd 3rd application servers 2nd applications multi-channel applications 2nd 3rd fundamental SOA 2nd process-enabled SOAs 2nd 3rd 4th 5th service facades 2nd 3rd architects perspective of SOAs SOA architects [See SOA architects] architectural roadmap fundamental SOA architecture 2nd 3rd BPM CSG asynchronous integration with EBI 2nd 3rd 4th Bulk Integration Infrastructure 2nd choreography 2nd contracts management 2nd repositories security 2nd service interfaces synchronous integration with CSIB 2nd 3rd Deutsche Post case study 2nd 3rd 4th enterprise architecture versus standards 2nd 3rd Intelligent Finance 2nd 3rd multichannel architecture of enterprise software 2nd 3rd requirements of 2nd 3rd 4th architecture board service repository architecture boards architecture roadmap fundamental SOA 2nd 3rd 4th 5th 6th 7th 8th networked SOA 2nd 3rd 4th 5th 6th 7th process-enabled SOAs 2nd 3rd 4th 5th 6th 7th archtectural roadmap networked SOA archtiectural roadmap process-enabled SOAs asynchronous communication 2nd coupling asynchronous integration with EBI 2nd 3rd 4th atomicity auditing authenticating against SOA authentication 2nd 3rd 4th 5th 6th and middleware 2nd 3rd 4th 5th 6th creating SOAP 2nd 3rd 4th authorization 2nd 3rd 4th 5th 6th dynamic authorization static authorization automated test tools automicity, consistency, isolation, durability [See ACID] availability 2nd 3rd 4th 5th 6th CICS 2nd CORBA EJBs 2nd 3rd 4th in a heterogeneous SOA 2nd of enterprise software Web Services 2nd 3rd wrapped legacy applications 2nd avoiding distributed 2PC 2nd client controlled transactions 2nd 3rd implicit application level protocols 2nd 3rd server controlled transactions 2nd 3rd exposing transaction logic to service clients |
|