Encode/Decode capability, 116
encoding documents, 89, 116
encryption, 60, 119
secret key vs. public key, 60
environments
avoiding frequent rebuilds, 14
choosing which to use, 10
directories. See directories
independence from specific technology, 10
integration hub, 8-9
monitoring. See system monitoring
monitoring/maintaining. See operational management
point-to-point, 7-8
requirements for, 10
security. See security
stability, ensuring, 67
escalation rules, 102
ETL (Extract, Transform, and Load), 12
event handling, 67
by Microsoft technologies, 93
passive vs. active, 122
Event Processing capability, 98
event processing, 79, 98
extensible directories, 68
Extract, Transform, and Load (ETL), 12