1. Assessing the
Technology Landscape
Chapter 1: (Book) Enterprise Integration – An Architecture
for Enterprise Application & Systems Integration 1
Lecture 2
Lec2:SIA,BSIT-6th,UniversityofOkara
BSIT-6th
Inam Ul Haq
inam@ue.edu.pk, inam.bth@gmail.com
2. Table of Contents
• Legacy Systems
• Data Warehousing
• Enterprise Application Integration
• Electronics Commerce
• Web Enabled Applications
• Extensible Markup Language (XML)
• Workflow Management
• Distributed Objects
• Components
• Unified Modeling Language (UML)
• Digital Signatures
• Wireless Interface Devices
• Knowledge Management
• Agent Technology
• Interactive Voice
• Model Driven Architecture (MDA)
Lec2:SIA,BSIT-6th,Universityof
Okara
2
3. Legacy Systems
• We cannot understand the impact of new technology without considering it with respect to
legacy systems
• [old or previous systems].
• Systems built with older technology cannot simply be redeployed using the new
technology.
• Requires rework
• Business data are captured in different forms, given different names, and computed in
different ways.
• The rapid evolution of technology and products resulted in the definition of a new
architecture for each new client-server system.
• E.g. WordPress or Joomla needs new plugins (Akismet for spams)
• Enterprise-level analysis, planning, and decision making must gather data from many
independent local systems.
• These cross-enterprise functions often face both technical challenges and
inconsistencies in the data.
• Restructuring may come in a variety of forms such as outsourcing, acquisitions or the
creation of new business units to pursue business opportunities.
• Offshoring is the relocation of a business process from one country to another
(wikipedia).
• Read related terms: https://en.wikipedia.org/wiki/Category:Outsourcing
• An Acquisition organization is responsible for acquisition management of multiple software
development efforts (e.g. multiple programs).
• Top managers of major corporations are frustrated by their information systems
• They have difficulty getting information about how the business is running.
Lec2:SIA,BSIT-6th,Universityof
Okara
3
4. Data Warehousing (EnterpriseDataWarehousing)
• A system used for reporting and data analysis. DWs are central repositories of
integrated data from one or more disparate sources. Examples of reports could
range from annual and quarterly comparisons and trends to detailed daily sales
analysis. (wikipedia)
• See difference between DW & Data Mart: https://en.wikipedia.org/wiki/Data_warehouse
• Used in decision support because of multiple business functions.
• Online analytical processing (OLAP) tools provide much more sophisticated analyses of
relationships and trends. [explore a key challenge from the book]
Lec2:SIA,BSIT-6th,Universityof
Okara
4
5. EnterpriseApplicationIntegration
• Enterprise application integration (EAI) also involves the capture
and transformation of data, but for a different purpose.
• Integrates COTS applications. [commercial off the shelf]
Lec2:SIA,BSIT-6th,Universityof
Okara
5
6. Electronic Commerce
• The Internet opened the door for enterprises to communicate
directly with their end customers.
• Buyer-seller relationships can be established where they were not
even considered in the past.
B2B, B2C
Lec2:SIA,BSIT-6th,Universityof
Okara
6
7. Web-Enabled Applications
• Early efforts to provide Web access to applications were driven by the need to
provide access to customers.
• Making applications Web-enabled, as depicted in Figure 1.4, resolves a
significant portion of the difficulties involved in accessing information across
the enterprise.
Lec2:SIA,BSIT-6th,Universityof
Okara
7
8. Extensible Markup Language (XML)
• XML is a preferred medium for the exchange of data both
between enterprises and between systems within an enterprise.
• Human readable format, check: https://en.wikipedia.org/wiki/XML
• Refinement of HTML and compatible with it, passes through
firewalls, more supports e-commerce than EDI (electronic document
interchange)
Lec2:SIA,BSIT-6th,Universityof
Okara
8
9. Workflow Management
• (sometimes called business process management systems)
active for many years
• Used for automation of businesss process
• in small organizations for managing the flow of documents
between activities performed by humans.
• Fits in with the move from batch processing to event-based
processing, where business transactions are processed as they
occur.
Lec2:SIA,BSIT-6th,Universityof
Okara
9
10. Distributed Objects
• Distributed objects technology supports the development of systems with
distributed components that interact as objects exchanging messages over
a network. The objects may be shared services or objects of a business
application.
There are three primary distributed object technologies:
Common Object Request Broker Architecture (CORBA) from the OMG
Component Object Model (COM+) from Microsoft
Enterprise JavaBeans (EJB) from Sun Microsystems
Lec2:SIA,BSIT-6th,Universityof
Okara
10
11. Components
• Object technology for many years has held the promise of enabling the
development of reusable components.
• At the same time, considerable progress has been made in the development of
components that perform computational functions for user interfaces,
communications, and operating environments.
• Such products have greatly enhanced the ability of application developers
to implement sophisticated systems.
Lec2:SIA,BSIT-6th,Universityof
Okara
11
12. UML (Unified Modeling Language)
• A specification language adopted by the OMG Press.
• Provides a number of visualizations and diagramming
techniques.
• E.g. use cases, class diagrams etc.
Lec2:SIA,BSIT-6th,Universityof
Okara
12
13. Public Key Infrastructure (PKI)
• Security has become an increasingly critical element of enterprise
systems.
• This technology is used by Secure Sockets Layer (SSL)
communications over the Internet to provide security.
• Both the sender and the receiver can authenticate each other with their
digital certificates.
Lec2:SIA,BSIT-6th,Universityof
Okara
13
14. Digital Signatures
• A digital signature functions essentially the same as a handwritten
signature on a paper document, when attached to an eDocument.
• Digital signatures employ public key technology.
• The signature authenticates the document by validating the signer's
identity, and it prevents the signer from repudiating the document
because only the signer's public key can decrypt the signature.
Lec2:SIA,BSIT-6th,Universityof
Okara
14
15. Wireless Interface Devices
• Cellular phones have become commonplace.
• It enables new forms of Internet purchases, and it frees
employees to conduct business anywhere and at any time.
Lec2:SIA,BSIT-6th,Universityof
Okara
15
16. Knowledge Mangement
• Involves the capture, cataloging, retrieval, and application of
enterprise knowledge.
• In product design: ease of use, maintainability, reliability,
efficiency and so on are kept in mind.
Lec2:SIA,BSIT-6th,Universityof
Okara
16
17. Agent Technology
• A software agent is an autonomous program that senses and reacts to
its environment according to its own internal rules of operation.
• Its environment may include information about the actions of other
agents.
• Unlike a conventional application, the agent itself will determine if,
when, and how it will perform its function. (AI)
• Agent technology is still in its infancy.
Lec2:SIA,BSIT-6th,Universityof
Okara
17
18. Interactive Voice
• The widespread use of hand-held devices, particularly cell phones, is
likely to change this. Users do not want to carry around keyboards
and large displays.
• Voice input and output also enable hands- and eyes-free operation in
activities and environments that are not conducive to conventional
terminal interaction.
• Visit www.computingcage.com > tech for disable, tech for age
Lec2:SIA,BSIT-6th,Universityof
Okara
18
19. Model Driven Architecture
• MDA provides the ability to specify applications and standards
as Platform Independent Models (PIM) that can be mapped to
evolving technical platforms.
• Tools provide the ability to transform a PIM specification to
executable code.
• Standard mappings will enable independently developed
applications and components to be interoperable.
Lec2:SIA,BSIT-6th,Universityof
Okara
19