Figure 2-7: The most commonly reported IT priorities
Figure 2-8: Steps required to become an e-business on demand
Figure 2-9: The on demand enterprise
Chapter 3: A Recommended Approach to Architecting Portal Solutions
Figure 3-1: Work product dependencies
Figure 3-2: Portal composite pattern
Figure 3-3: Application patterns in the Portal composite pattern
Figure 3-4: e-Government characteristics and key initiatives
Figure 3-5: System Context Diagram for e-government
Figure 3-6: e-Government Use Case Model
Figure 3-7: Portal composite pattern generic use cases
Figure 3-8: Classifying delta use cases
Figure 3-9: The AOD (Subsystem) begins with a display of the major business functions
Figure 3-10: Architecture Overview Diagram (subsystem) after the Composite pattern is applied
Figure 3-11: The AOD (Subsystem) after Business patterns have been applied
Figure 3-12: AOD (Subsystem) after integration patterns have been applied
Figure 3-13: AOD (Subsystem) after the Composite pattern have been applied. Solid lines denote patterns which are not absorbed by the Composite pattern.
Figure 3-14: The AOD (Subsystem) after the chosen Composite pattern's Application patterns have been validated
Figure 3-15: Example of an AOD (Subsystem) that could be deceiving, leading you to select a Portal composite pattern instead of the Electronic Commerce composite pattern
Figure 3-16: AOD (Subsystem) after delta requirements have been highlighted
Figure 3-17: Illustration of the general problem addressed by the Extended Enterprise pattern
Figure 3-18: The five Extended Enterprise——Application patterns, highlighting the three that are applicable
Figure 3-19: Application patterns for delta requirements
Figure 3-20: The Portal composite pattern's Runtime pattern
Figure 3-21: The AOD (Logical Nodes) as seeded from the customized Portal composite pattern's Runtime pattern
Figure 3-22: Detail of the Exposed Business Services application pattern
Figure 3-23: Exposed Business Services application pattern—— Runtime pattern
Figure 3-24: AOD (logical nodes) after the Runtime patterns were updated for the delta "Assess Risk"
Figure 3-25: AOD (Logical Nodes) after all deltas have been addressed and the appropriate Runtime patterns incorporated
Figure 3-26: Mocked-up AOD (Logical Nodes) to be used in a technical walkthrough
Figure 3-27: e-government case study Component Model Relationship Diagram
Figure 3-28: e-government case study Component Interaction diagram—Scenario 1
Figure 3-29: e-government case study Component Interaction diagram—Scenario 2
Figure 3-30: e-government case study Component Interaction diagram—Scenario 3
Figure 3-31: e-government case study Component Interaction diagram—Scenario 4
Figure 3-32: Operational Model development process
Figure 3-33: AOD for the e-government case study
Figure 3-34: AOD for e-government case study with product mapping
Figure 3-35: e-government case study Operational Model
Figure 3-36: Operational Model with clustering
Figure 3-37: Where performance, scalability, and availability can be implemented
Figure 3-38: e-government case study Operational Model with high-availability NFR walkthrough
Chapter 4: Architecting on Demand Workplace Solutions
Figure A-10: Tivoli Identity Manager IBM Directory Integrator connectivity
Figure A-11: Weak Integration on the Application Web
Figure A-12: Improved integration on the service Web
Figure A-13: The new Web services economy
Figure A-14: How SOAP, WSDL, and UDDI are related
Figure A-15: The UDDI Business Registry Network
Figure A-16: WebSphere Studio desktop
Figure A-17: Web services for J2EE development flow
Figure A-18: Web services developer role
Figure A-19: Web services assembler role
Figure A-20: Web services deployer role
Figure A-21: Lifecycle of a servlet-based implementation bean
Figure A-22: Lifecycle of a session EJB
Figure A-23: Architecture of an IBM federated system
Figure A-24: Query planning for joins
Figure A-25: Compilation and runtime for non-relational sources
Figure A-26: Evolution of DBMS architecture
Figure A-27: Financial services scenario
Figure A-28: An information integration platform
Figure A-29: Components of self-managing systems
Figure A-30: The autonomic cycle
Figure A-31: The autonomic cycle
Figure A-32: Components of self-managing systems
Figure A-33: A typical process flow for incident management, problem management, and change management
Figure A-34: Structure of self-management technologies
Figure A-35: Self management within each level of the IT environment
Figure A-36: How an IT environment evolves towards a truly autonomic environment
Figure A-37: Five implementation levels for a self-configuring IT infrastructure
Figure A-38: Five implementation levels for self healing and availability management
Figure A-39: Five implementation levels for a self-optimizing IT infrastructure that can optimize workloads and transaction performance across multiple resources
Figure A-40: Five implementation levels for a self-protecting IT infrastructure
Appendix B: Using WebSphere Portal
Figure B-1: WebSphere Portal architecture
Figure B-2: A portal usage report from Web Site Analyzer