Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture.

Slides:



Advertisements
Similar presentations
3 Copyright © 2005, Oracle. All rights reserved. Designing J2EE Applications.
Advertisements

Enterprise Java and Data Services Designing for Broadly Available Grid Data Access Services.
Chapter 13 Review Questions
J2EE Design patterns Sharath Sahadevan August 8, 2002 St Louis Java SIG.
An architecture for webb applications, J2EE
Introduction to Java 2 Enterprise Edition About myself –Neutrinos, Cancer Research, IT Applications Today’s topic: J2EE –Context –Advantages –Components.
George Blank University Lecturer. CS 602 Java and the Web Object Oriented Software Development Using Java Chapter 10.
02/12/00 E-Business Architecture
Enterprise Applications & Java/J2EE Technologies Dr. Douglas C. Schmidt Professor of EECS.
Java 2 Platform, Enterprise Edition (J2EE). Source: Computer, August 2000 J2EE and Other Java 2 Platform Editions.
J2EE Java 2 Enterprise Edition. Relevant Topics in The Java Tutorial Topic Web Page JDBC orial/jdbc
Enterprise Programming By J Pearce. Enterprise Software Sales HR Inventory Customer Support Shipping.
E-business Architecture.NET vs J2EE Judith Molka-Danielsen Feb.27, 2004.
ORACLE APPLICATION SERVER BY PHANINDER SURAPANENI CIS 764.
Understanding and Managing WebSphere V5
Product Offering Overview CONFIDENTIAL AND PROPRIETARY Copyright ©2004 Universal Business Matrix, LLC All Rights Reserved The duplication in printed or.
Software Architecture April-10Confidential Proprietary Master Data Management mainly inspired from Enterprise Master Data Management – An SOA approach.
Data Integration in Service Oriented Architectures Rahul Patel Sr. Director R & D, BEA Systems Liquid Data – XML-based data access and integration for.
Component Software: A New Software Engineering Course H. Conrad Cunningham, Yi Liu, Pallavi Tadepalli, and Mingxian Fu Software Architecture Research Group.
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
Copyright © 2012 Accenture All Rights Reserved.Copyright © 2012 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are.
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
What's all going around ?!? Hamed Shayan
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
第十四章 J2EE 入门 Introduction What is J2EE ?
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 07. Review Architectural Representation – Using UML – Using ADL.
 Chapter 6 Architecture 1. What is Architecture?  Overall Structure of system  First Stage in Design process 2.
101 User Interface Patterns and its applications Tonya Groover Department of Computer Science.
CHEF II / Sakai Architecture. CHEF II Changes uPortal replaces Jetspeed –jsr 168 portlet, servlet compliant Spring replaces Turbine component framework.
C O R P O R A T E T E C H N O L O G Y Siemens AG Software & Engineering Usage of Enterprise OSGi inside Siemens:  Siemens Communications, Enterprise Systems.
Source: Peter Eeles, Kelli Houston, and Wojtek Kozaczynsky, Building J2EE Applicationa with the Rational Unified Process, Addison Wesley, 2003 Prepared.
Statistics New Zealand’s End-to-End Metadata Life-Cycle ”Creating a New Business Model for a National Statistical Office if the 21 st Century” Gary Dunnet.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Construction Planning and Prerequisite
Enterprise Java Beans. Model 1 J2EE – Web View Model/View/Controller Model View Control Data base Web Server Model One Architecture HTTP Request HTTP.
Rational Unified Process Fundamentals Module 7: Process for e-Business Development Rational Unified Process Fundamentals Module 7: Process for e-Business.
Imagining a Community Source Student Services System Leo Fernig Richard Spencer SOA Workshop Vancouver March 24, 2006.
Consultant Effective Patterns and Practices in J2EE George de la Torre.
Java EE Patterns Dan Bugariu.  What is Java EE ?  What is a Pattern ?
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 7 1COMP9321, 15s2, Week.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
1 Copyright © 2004, Oracle. All rights reserved. Oracle Application Development Framework.
25 April Unified Cryptologic Architecture: A Framework for a Service Based Architecture Unified Cryptologic Architecture: A Framework for a Service.
1 Distributed System using J2EE. 2 What is J2EE?  J2EE (Java2 Enterprise Edition) offers a suite of software specification to design, develop, assemble.
Java Programming: Advanced Topics 1 Enterprise JavaBeans Chapter 14.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level 1 CustomerSoft ESP Contact Operations.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
April 20023CSG1DE2 1 Electronic Commerce Design (2) John Wordsworth Department of Computer Science The University of Reading Room.
Building J2EE Applications Based on Design Patterns with Business Components for Java Olivier LE DIOURIS Principal Product Manager Oracle Corporation.
5/29/2001Y. D. Wu & M. Liu1 Content Management for Digital Library May 29, 2001.
Headline sample style Intro sample style Click to edit Master text styles –Second level Third level –Fourth level o Fifth level.
J2EE Platform Overview (Application Architecture)
COMP9321 Web Application Engineering Semester 2, 2016
Structure of a web application
Click to Add Title Click to Add Subtitle.
Click to edit Master text styles
Author names here Author association names here
Click to edit Master text styles
Technology Landscape and Enterprise Objectives
Click to edit Master text styles
Web Application Server 2001/3/27 Kang, Seungwoo. Web Application Server A class of middleware Speeding application development Strategic platform for.
Slide Title Edit Master text styles Second level Third level
ОПШТЕСТВО ТЕМА: МЕСТОТО ВО КОЕ ЖИВЕАМ Скопје
Author names here Author associations here
Author names here Author associations here
Click to edit Master text styles
Author names here Author associations here
Click to edit Master text styles
Presentation transcript:

Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture April-10 Click to edit Master text styles Second level Third level Fourth level Fifth level 1 Application Standard Development

Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

Confidential Proprietary What’s Pattern in Computer Science? Each pattern is a three-part rule, which expresses a relation between a certain context, a problem, and a solution. —Christopher Alexander Each pattern is a three-part rule, which expresses a relation between a certain context, a certain system of forces which occurs repeatedly in that context, and a certain software configuration which allows these forces to resolve themselves. —Richard Gabriel A pattern is an idea that has been useful in one practical context and will probably be useful in others. —Martin Fowler

Confidential Proprietary Pattern in nutshell

Confidential Proprietary Categorizing Patterns

Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

Confidential Proprietary Tiered Approach Client Tier Application clients, applets, applications and other GUIs Presentation Tier JSP, Servlets and other UI elements Business Tier EJBs and other business objects Integration Tier JMS, JDBC, Connectors, and Legacy Resource Tier Databases, external systems, and legacy resources User interactions, UI presentation, devices SSO, session management, content creation, format and delivery Business logic, transactions, data, and services Resource adapters, legacy, External systems, rules Engines, workflow Resources, data and external services

Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

Concept Traceability Confidential Proprietary Continuous Integration logging Business Management Message Queue Concepts Architectural Goals and Constraints reliability performanc e extensibility scalability Security Web DevelopmentData ManagementEnterprise Service Bus Degree of Support LowHigh Search reusability Portability/ distribution Controlvisibility Source Control Management Repository Management Build System

Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

Confidential Proprietary Software Development Automation

Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

Confidential Proprietary Development Pattern Primary Tier Framework Tier Services Tier Application Tier database users

Confidential Proprietary Primary Tier Source Control Repository Manager Build System and Dependency ManagerTest Driven DevelopmentContinuous IntegrationWeb Content Management System Control ProjectIssue tracking Software Team Enterprise Web Portal

Confidential Proprietary Primary Tier Roadmap steps priority Best usage of source control Test Driven Development Build System / Dependancy Mgmnt. Control Project / Software Methodology Repository Management Web Content Management Software Portal Continuous Integration Keys To Success  Clear and Agreed Vision  Developers Integrity  Change Management

Confidential Proprietary Primary Tier Source Control Management

Confidential Proprietary Primary Tier Repository Management

Confidential Proprietary Development Style

Confidential Proprietary Framework Tier

Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

Confidential Proprietary Enterprise Web Portal database users Business Services People and organization SSOAll Web ApplicationsReports Product Models Bill of Material InventoryOrders Firma Mass Enrollment InvoicingAccountingBudgeting Human Resource Business Manager Facade Service Command Presentation Tier Business Tier Generic Data Access Object OLTP ObjectsOLAP Objects Enterprise Service Bus Plug ability Data Tier Integration Tier Architecture Approach Logging Authentication and Authorization Exception Handling SOI (BPEL/ESB) Lifecycle Management Metadata Managmnt Event Managmnt Data Quality Managmnt Framework Tier search

Software Architecture April-10Confidential Proprietary Life creates questions. Together our world can write the answers. -- Josh January 2011