Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Overview
Table 1-1: The four documented Business patterns
Table 1-2: The two documented Integration patterns
Table 1-3: Composite patterns
Chapter 3: A Recommended Approach to Architecting Portal Solutions
Table 3-1: Best practice process & its relationship to development methodology & large reusable assets
Table 3-2: e-Government Use Case descriptions
Table 3-3: Portal composite pattern generic use case descriptions
Table 3-4: Solution use cases that match Portal composite pattern generic use cases
Table 3-5: Functional blocks that were identified after grouping similar use cases
Table 3-6: Subsystems/Use Cases handled by the Composite pattern
Table 3-7: Excerpt of the Functional block table
Table 3-8: Excerpt of the Functional block table
Table 3-9: Validation of Application Patterns covered by Composite pattern for e-government case study
Table 3-10: Use cases for commerce case study
Table 3-11: Excerpt of the Architecture Decisions document
Table 3-12: The Business Drivers for the Extended Enterprise::Application patterns
Table 3-13: Side-by-side look at the pattern's business drivers as opposed to the case study's
Table 3-14: Highlighting the pattern's applicable business drivers
Table 3-15: Highlighting the pattern's applicable IT drivers
Table 3-16: Description of the various Application patterns
Table 3-17: Summary of Application patterns for delta Business and Integration patterns
Table 3-18: An excerpt of the Architecture Decisions document
Table 3-19: Description of how the deltas were addressed in the AOD (Logical Nodes)
Table 3-20: e-government case study components
Table 3-21: How scaling techniques relate to scaling objectives
Chapter 4: Architecting on Demand Workplace Solutions
Table 4-1: IFB use case descriptions
Table 4-2: Matching the IFB use cases to the generic PCP use cases
Table 4-3: Functional blocks for IFB AOD
Table 4-4: Subsystems/use cases covered by the PCP (in
red
)
Table 4-5: Summary of Application patterns for delta Business and Integration patterns
Table 4-6: Summary of decisions for additional logical nodes to support requirements
Table 4-7: Associate update personnel information use case flow
Table 4-8: Description of SSO walkthrough
Table 4-9: Matching case study use cases to ODW generic use cases
Chapter 5: Galaxia and the on Demand Workplace
Table 5-1: Generic use cases
Table 5-2: Applications and users involved in the scenario
Table 5-3: ECR process phase 1
Table 5-4: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-5: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-6: ECR Process Phase 2—Change Impact Analysis—Approval
Table 5-7: ECR Process Phase 3
Table 5-8: ECR Process Phase 4
Table 5-9: ePCM modules
Appendix B: Using WebSphere Portal
Table B-1: Portal Usage reports from Tivoli Web Site Analyzer
Table B-2: Collaborative portlets
Table B-3: Lotus Collaborative Components
< Day Day Up >
Previous page
Table of content
Next page
Architecting Portal Solutions: Applications Development
ISBN: 0738498645
EAN: 2147483647
Year: 2003
Pages: 82
Authors:
IBM Redbooks
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Criteria for Model Evaluation
In-Process Metrics and Quality Management
Recommendations and Risk Mitigation
Measuring Process Maturity
Keep It Simple or Face Decomplexification
Adobe After Effects 7.0 Studio Techniques
Alpha Channels and Premultiplication
Effective Motion Tracking
Conclusion
Muting Keyframes
Wind
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Cluster Redundancy Designs
Call Display Restrictions
PKI Enrollment
C++ GUI Programming with Qt 3
Getting Started
Scroll Views
Handling Files and Directories
XML
Reading XML with SAX
SQL Hacks
Hack 18. Sort Your Email
Hack 23. Second Tuesday of the Month
Hack 46. Store Images in a Database
Hack 51. Display Rows As Columns
Hack 72. Extract a Subset of the Results
DNS & BIND Cookbook
Introduction
Configuring a Name Server to Listen Only on Certain Network Interfaces
Delegating a Subdomain
Delegating Reverse-Mapping for Networks with Non-Octet Masks
Setting Up a Hidden Primary Master Name Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies