|
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] e-Platform 2nd EAI 2nd service enablement 2nd 3rd 4th 5th service repositories service stability 2nd 3rd 4th SOAs upgrade ability 2nd 3rd 4th EAI (Enterprise Application Integration) 2nd EBI asynchronous integration 2nd 3rd 4th EBI (Event Bus Infrastructure EBI (Event Bus Infrastructure) eCommerce EDMs (Enterprise Data Models) EJB (Enterprise Java Beans) containers EJBs availability 2nd 3rd 4th scalability 2nd 3rd 4th embedded messages [See payload semantics] encapsulation components Encina encryption 2nd 3rd enterprise applicatioin integration Enterprise Application Integration [See EAI] Enterprise Application Integration (EAI) Enterprise Data Models (EDMs) enterprise IT renovation roadmap 2nd 3rd 4th enterprise IT renovation roadmaps Enterprise Java Beans Enterprise Java Beans (EJB) enterprise layer Enterprise Resource Planning [See ERP] Enterprise Resource Planning (ERP) Enterprise Resources Planning [See ERP] Enterprise Service Bus enterprise software architecture versus standards 2nd 3rd architecture of 2nd 3rd requirements of 2nd 3rd 4th availability of characteristics of 2nd 3rd Enterprise Software Bus enterprise software systems lack of agility and inefficiency 2nd 3rd 4th enterprise-level software project management entity entity relationship models [See ER] entropy ER (entity relationship models) ERP (Enterprise Resource Planning) 2nd ERP (Enterprise Resources Planning error handling idempotent operations 2nd error reporting 2nd establishing project management methodologies 2nd 3rd 4th SOA-driven project management 2nd 3rd 4th Event Bus Infrastructure (EBI) 2nd evolution motivation for creating SOAs 2nd 3rd example scenarios travel itinerary management 2nd 3rd examples of optimistic concurrency control 2nd 3rd 4th 5th of pessimisstic concurrency control 2nd 3rd examples scenarios passenger check-in scenario 2nd 3rd exceptions out of stock exceptions execution containers cross-container integration 2nd 3rd logging message transformation security expansion stages fundamental SOA 2nd 3rd 4th networked SOA 2nd 3rd 4th 5th 6th 7th process-enabled SOAs 2nd 3rd 4th 5th 6th 7th exposing transaction logic to service clients Extreme Programming (s/b ital) |
|