Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Overview
Table 1-1: The four documented Business patterns
Table 1-2: The two documented Integration patterns
Table 1-3: Composite patterns
Chapter 3: A Recommended Approach to Architecting Portal Solutions
Table 3-1: Best practice process & its relationship to development methodology & large reusable assets
Table 3-2: e-Government Use Case descriptions
Table 3-3: Portal composite pattern generic use case descriptions
Table 3-4: Solution use cases that match Portal composite pattern generic use cases
Table 3-5: Functional blocks that were identified after grouping similar use cases
Table 3-6: Subsystems/Use Cases handled by the Composite pattern
Table 3-7: Excerpt of the Functional block table
Table 3-8: Excerpt of the Functional block table
Table 3-9: Validation of Application Patterns covered by Composite pattern for e-government case study
Table 3-10: Use cases for commerce case study
Table 3-11: Excerpt of the Architecture Decisions document
Table 3-12: The Business Drivers for the Extended Enterprise::Application patterns
Table 3-13: Side-by-side look at the pattern's business drivers as opposed to the case study's
Table 3-14: Highlighting the pattern's applicable business drivers
Table 3-15: Highlighting the pattern's applicable IT drivers
Table 3-16: Description of the various Application patterns
Table 3-17: Summary of Application patterns for delta Business and Integration patterns
Table 3-18: An excerpt of the Architecture Decisions document
Table 3-19: Description of how the deltas were addressed in the AOD (Logical Nodes)
Table 3-20: e-government case study components
Table 3-21: How scaling techniques relate to scaling objectives
Chapter 4: Architecting on Demand Workplace Solutions
Table 4-1: IFB use case descriptions
Table 4-2: Matching the IFB use cases to the generic PCP use cases
Table 4-3: Functional blocks for IFB AOD
Table 4-4: Subsystems/use cases covered by the PCP (in
red
)
Table 4-5: Summary of Application patterns for delta Business and Integration patterns
Table 4-6: Summary of decisions for additional logical nodes to support requirements
Table 4-7: Associate update personnel information use case flow
Table 4-8: Description of SSO walkthrough
Table 4-9: Matching case study use cases to ODW generic use cases
Chapter 5: Galaxia and the on Demand Workplace
Table 5-1: Generic use cases
Table 5-2: Applications and users involved in the scenario
Table 5-3: ECR process phase 1
Table 5-4: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-5: ECR Process Phase 2—Change Impact Analysis—Engineering
Table 5-6: ECR Process Phase 2—Change Impact Analysis—Approval
Table 5-7: ECR Process Phase 3
Table 5-8: ECR Process Phase 4
Table 5-9: ePCM modules
Appendix B: Using WebSphere Portal
Table B-1: Portal Usage reports from Tivoli Web Site Analyzer
Table B-2: Collaborative portlets
Table B-3: Lotus Collaborative Components
< Day Day Up >
Previous page
Table of content
Next page
Architecting Portal Solutions: Applications Development
ISBN: 0738498645
EAN: 2147483647
Year: 2003
Pages: 82
Authors:
IBM Redbooks
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 4.2 Passphrase Considerations
Step 4.5 How to use OpenSSH Passphrase Agents
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
Appendix D Problem Change Report
Appendix G Sample Inspection Plan
Appendix J Document Change Request (DCR)
Appendix P Project Statement of Work
Snort Cookbook
Logging to the Windows Event Viewer
Testing Rules
Optimizing Rules
Detecting Stateless Attacks and Stream Reassembly
Installing and Configuring SnortCenter
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Pairwise Testing
State-Transition Testing
Section II - White Box Testing Techniques
Scripted Testing
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 8. Generate Links to Google Maps in a Spreadsheet
Hack 27. Add Google Maps to Any Web Site
Hack 32. Locate a Phone Number
Hack 41. How Google Maps Got Me Out of a Traffic Ticket
Hack 66. Add Your Own Custom Map
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Exam Prep Questions
Project PlanningFacilitating Processes
Answers and Explanations
Answers and Explanations
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies