Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Overview
Table 1-1: The four documented Business patterns
Table 1-2: The two documented Integration patterns
Table 1-3: Composite patterns
Chapter 3: A Recommended Approach to Architecting Portal Solutions
Table 3-1: Best practice process & its relationship to development methodology & large reusable assets
Table 3-2: e-Government Use Case descriptions
Table 3-3: Portal composite pattern generic use case descriptions
Table 3-4: Solution use cases that match Portal composite pattern generic use cases
Table 3-5: Functional blocks that were identified after grouping similar use cases
Table 3-6: Subsystems/Use Cases handled by the Composite pattern
Table 3-7: Excerpt of the Functional block table
Table 3-8: Excerpt of the Functional block table
Table 3-9: Validation of Application Patterns covered by Composite pattern for e-government case study
Table 3-10: Use cases for commerce case study
Table 3-11: Excerpt of the Architecture Decisions document
Table 3-12: The Business Drivers for the Extended Enterprise::Application patterns
Table 3-13: Side-by-side look at the pattern's business drivers as opposed to the case study's
Table 3-14: Highlighting the pattern's applicable business drivers
Table 3-15: Highlighting the pattern's applicable IT drivers
Table 3-16: Description of the various Application patterns
Table 3-17: Summary of Application patterns for delta Business and Integration patterns
Table 3-18: An excerpt of the Architecture Decisions document
Table 3-19: Description of how the deltas were addressed in the AOD (Logical Nodes)
Table 3-20: e-government case study components
Table 3-21: How scaling techniques relate to scaling objectives
Chapter 4: Architecting on Demand Workplace Solutions
Table 4-1: IFB use case descriptions
Table 4-2: Matching the IFB use cases to the generic PCP use cases
Table 4-3: Functional blocks for IFB AOD
Table 4-4: Subsystems/use cases covered by the PCP (in
red
)
Table 4-5: Summary of Application patterns for delta Business and Integration patterns
Table 4-6: Summary of decisions for additional logical nodes to support requirements
Table 4-7: Associate update personnel information use case flow
Table 4-8: Description of SSO walkthrough
Table 4-9: Matching case study use cases to ODW generic use cases
Chapter 5: Galaxia and the on Demand Workplace
Table 5-1: Generic use cases
Table 5-2: Applications and users involved in the scenario
Table 5-3: ECR process phase 1
Table 5-4: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-5: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-6: ECR Process Phase 2—Change Impact Analysis—Approval
Table 5-7: ECR Process Phase 3
Table 5-8: ECR Process Phase 4
Table 5-9: ePCM modules
Appendix B: Using WebSphere Portal
Table B-1: Portal Usage reports from Tivoli Web Site Analyzer
Table B-2: Collaborative portlets
Table B-3: Lotus Collaborative Components
< Day Day Up >
Previous page
Table of content
Next page
Architecting Portal Solutions: Applications Development
ISBN: 0738498645
EAN: 2147483647
Year: 2003
Pages: 82
Authors:
IBM Redbooks
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Mapping ORM Models to Logical Database Models
Conceptual Model Reports
Editing Logical Models”Intermediate Aspects
Reverse Engineering Physical Schemas to Logical Models
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Developing a Kanban Design
Training
Improving the Kanban
Appendix E EOQ vs. Kanban
Appendix I Case Study 2: Rubber Extrusion Plant
PMP Practice Questions Exam Cram 2
Project Initiation
Answers and Explanations
Project Control
Professional Responsibility
Answers and Explanations
Cultural Imperative: Global Trends in the 21st Century
Culture and Religion
Cross-Century Worldviews
Epilogue After September 11
Appendix A Cultural Categorization Characteristics
Appendix C National Traits
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Indirect Privilege Escalation
Attacking Oracle PL/SQL Web Applications
Accessing the File System
Accessing the Network
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Files and Directories
Multithreading
Printing and Drawing with GDI+
Windows Services
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies