Middleware and Management Concepts, Characteristics, and Integration
- 格式:pdf
- 大小:256.96 KB
- 文档页数:16
ArtixVersion 5.6.4 Using the Artix Library: C++Micro FocusThe Lawn22-30 Old Bath RoadNewbury, Berkshire RG14 1QNUKCopyright © Micro Focus 2017. All rights reserved.MICRO FOCUS, the Micro Focus logo, and Micro Focus product names are trademarks or registered trademarks of Micro Focus Development Limited or its subsidiaries or affiliated companies in the United States, United Kingdom, and other countries. All other marks are the property of their respective owners.2017-02-20iiContentsArtix Library Overview (1)Artix Documentation Library (1)Documentation Conventions (3)Suggested Reading Paths (7)SOA Architects (7)Administrators (8)All Service Developers (9)Integration Use Case (10)New Development Use Cases (11)Using the Artix Library: C++ iiiiv Using the Artix Library: C++Artix Library OverviewThis chapter describes the contents of the Artix Library, how to getadditional information, and the documentation conventions used. Artix Documentation LibraryThe Artix documentation library is organized into the followingsections:•Getting Started•Designing Artix Solutions•Developing Artix Applications•Deploying and Managing Artix Solutions•Using Artix Services•Integrating Artix Solutions•Reference Material•Getting the Latest Version•Additional ResourcesGetting StartedThe books in this section provide you with a background forworking with Artix. They describe many of the concepts andtechnologies used by Artix. They include:•Release Notes contains release-specific information aboutArtix.•Installation Guide describes the prerequisites for installingArtix and the procedures for installing Artix on supportedsystems.•Using the Artix Library (this book) introduces the Artixdocumentation library, explains its conventions, and providessuggested reading paths.•Getting Started with Artix describes basic Artix and WSDLconcepts, and shows a simple example application.Using the Artix Library: C++ 1Designing Artix SolutionsThe books in this section discuss how to use Artix to solvereal-world problems. They describe how to build service-orientedarchitectures with Artix and how Artix uses WSDL to defineservices:•Building SOAs with Artix provides an overview ofservice-oriented architectures and describes how they can beimplemented using Artix.•Writing Artix Contracts describes the components of anArtix WSDL contract. Special attention is paid to Artix-specificWSDL extensions.•Artix Bindings and Transports, C++ Runtime describesthe WSDL extensions used to define payload formats andtransports for Artix services written in C++.Developing Artix ApplicationsThe books in this section describe how to use the Artix APIs tobuild new services:•Developing Artix Applications in C++ explains how toimplement services using the Artix C++ API.•Developing Advanced Artix Plug-ins in C++ explains howto implement advanced Artix plug-ins (for example,interceptors) using the Artix C++ API.•WSDLGen Guide explains how to generate C++ code usingthe Artix scripting tools.Deploying and Managing Artix SolutionsThe books in this section describe how to configure, deploy, andmanage Artix applications and services in your environment:•Configuring and Deploying Artix Solutions, C++Runtime explains how to set up your Artix environment andhow to configure and deploy Artix services written in C++.•Artix Management Guide, C++ Runtime explains how tomonitor and manage Artix services using Java ManagementExtensions. It also describes how to integrate Artix solutionswith a range of third-party enterprise and SOA managementsystems.Using Artix ServicesThe books in this section describe how to use the servicesprovided with Artix:•Artix Router Guide, C++ Runtime explains how tointegrate and manage services using the Artix C++ router.•Artix Locator Guide explains how clients can find servicesusing the Artix locator.2 Using the Artix Library: C++•Artix Session Manager Guide explains how to manageclient sessions using the Artix session manager.•Artix C++ Transactions Guide explains how to enable Artixapplications written in C++ to participate in transactedoperations.•Artix Security Guide, C++ Runtime explains how toconfigure and develop secure Artix applications.Integrating Artix SolutionsThe books in this section describe how to integrate Artix solutionswith other middleware technologies:•Artix for CORBA provides information on using Artix in aCORBA environment.Reference MaterialThese books provide detailed reference information about specificArtix APIs, WSDL extensions, configuration variables, andcommand-line tools. The reference documentation includes:•Artix Command Line Reference•Artix Configuration Reference, C++ Runtime•Artix WSDL Extension ReferenceGetting the Latest VersionThe latest updates to the Artix documentation library can be foundonline.Compare the version dates on the web page for your productversion with the date printed on the copyright page of the PDFedition of the book you are reading.Additional ResourcesEnter in your browser to go to theMicro Focus home page.The Micro Focus Community site contains helpful articles writtenby company experts about Artix and other products.If you need help with this or any other Artix product, go to MicroFocus SupportLine.Documentation ConventionsThis section shows the typographical and keying conventions usedby the Artix documentation library.Using the Artix Library: C++ 34 Using the Artix Library: C++Typographical conventionsThe Artix library uses the following typographical conventions:Keying ConventionsThe Artix library uses the following keying conventions:Fixed width Fixed width (Courier font) in normal textrepresents portions of code and literalnames of items such as classes, functions, variables, and data structures. Forexample, text might refer to theIT_Bus::AnyType class.Constant width paragraphs represent codeexamples or information a system displays on the screen. For example:#include <stdio.h>Fixed width italic Fixed width italic words or characters in code and commands represent variablevalues you must supply, such asarguments to commands or path namesfor your particular system. For example:% cd /users/YourUserNameItalic Italic words in normal text representemphasis and introduce new terms .Bold Bold words in normal text representgraphical user interface components such as menu commands and dialog boxes. Forexample: the User Preferences dialog.No prompt When a command’s format is the same formultiple platforms, the command prompt is not shown.% A percent sign represents the UNIXcommand shell prompt for a commandthat does not require root privileges.# A number sign represents the UNIXcommand shell prompt for a commandthat requires root privileges.>The notation > represents the MS-DOS orWindows command prompt.... . . .Horizontal or vertical ellipses in format and syntax descriptions indicate that material has been eliminated to simplify a discussion.[]Brackets enclose optional items in formatand syntax descriptions.{}Braces enclose a list from which you mustchoose an item in format and syntaxdescriptions.|In format and syntax descriptions, avertical bar separates items in a list ofchoices enclosed in {} (braces).In graphical user interface descriptions, avertical bar separates menu commands(for example, select File|Open).Using the Artix Library: C++ 56 Using the Artix Library: C++Suggested ReadingPathsThis chapter describes suggested reading paths for different types of Artixusers.SOA ArchitectsThis section describes a suggested reading path for SOAarchitects, and includes suggestions for background reading.SOA architect pathSOA architects should start with the following:1.Building Service Oriented Architectures with Artixpresents an overview of SOA and ESBs, of how Artix fits intoSOA, and of how Artix works.2.Installation Guide. You must read the following sectionsabout supported environments:i.Supported Platforms, C++ Compilers, JREs, and JDKsii.C++ Compiler Requirements3.Writing Artix Contracts includes the following informationabout basic WSDL concepts and how to write a serviceinterface:i.Introduction. Overview of WSDL, the structure of acontract, and the steps involved in writing a servicecontract.ii.Designing Logical Data Units. How to create data typesusing XML Schema.iii.Defining Logical Messages Used by a Service. How to buildthe data types into the messages that a service will use toimplement its operations.iv.Defining Your Logical Interfaces: How to create a serviceinterface using the logical messages.4.Artix Bindings and Transports, C++ Runtime describesthe Artix WSDL extensions used to define payload formats andtransports for Artix services written in C++:i.Read the relevant binding chapter that applies to yoursystem (for example, SOAP, Fixed, or XML).ii.Read the relevant transport chapter that applies to yoursystem (for example, HTTP, Tuxedo, or JMS).Background readingIn addition, the following publications provide useful backgroundinformation on Web services, XML, and WSDL:•Understanding Web Services: XML, WSDL, SOAP, and UDDI,by Eric Newcomer•Understanding SOA with Web Services, by Eric Newcomer andGreg Lomow•W3Schools online tutorials(see )♦XML tutorial(/xml/default.asp)♦XSD tutorial(/schema/default.asp)♦XSLT tutorial(/xsl/default.asp)•The W3C XML schema page(see /XML/Schema)•The W3C WSDL specification(see /TR/wsdl)AdministratorsThis section describes a suggested reading path for Artixadministrators in the C++ runtime environment.All Artix administratorsAdministrators can approach the Artix library as follows:1.Installation Guide describes all the prerequisites andprocedures for installing Artix on supported systems. Youmust read the following:i.Supported Systems and Compilersii.Java, Compiler, and Artix Designer Requirementsiii.Installing ArtixC++ runtime administratorsAdministrators working with applications written in C++ shouldread the following:1.Configuring and Deploying Artix Solutions, C++Runtime explains how to configure and deploy Artix serviceswritten in C++. It explains Artix configuration, how to findcontracts that control your Artix services, and how to deployArtix applications. You should start with the followingchapters:i.Getting Started explains how to set up an Artixenvironment using the artix_env script, and Artix systemenvironment variables.ii.Artix Configuration explains concepts such as Artix .cfgconfiguration files, scopes, namespaces, and variables.iii.Artix Logging explains how to configure Artix logging forservices and Artix subsystems.iv.Deploying Services in an Artix Container explains how todeploy and manage C++ services using an Artixcontainer.v.Deploying High Availability explains how to configure anddeploy high availability in Artix, which is based onBerkeley DB.vi.Deploying Reliable Messaging explains how to configureand deploy WS-RM and WS-Addressing for services in anArtix runtime environment.vii.Publishing WSDL Contracts explains how to publish WSDLfiles that correspond to specific Web services, and enableclients to access the WSDL file and invoke on the service.viii.Accessing Contracts and References shows how to specifythe location of WSDL contracts and references in aconfiguration file and on the command line.2.Artix Configuration Reference, C++ Runtime provides acomprehensive reference for the all configuration variables inan Artix configuration domain.Security and managementSecurity administrators and administrators using managementconsoles should read the following:1.Artix Security Guide, C++ Runtime provides detailedinformation on Artix security configuration and management.2.Artix Management Guide, C++ Runtime explains how tomonitor and manage Artix services using Java ManagementExtensions. It also provides information on how to integrateArtix with various third-party enterprise and SOAmanagement systems, such as Aurea Actional® ApplicationPerformance Monitoring, AmberPoint, and BMC Patrol.Background readingFor background information on Web services, XML, and WSDL, see“Background reading” on page3.All Service DevelopersThis section describes an initial reading path for all types ofservice development use case. You should follow this path beforewriting any code.All developersAll service developers should read the following path:1.Building Service Oriented Architectures with Artixpresents an overview of SOA and ESBs, of how Artix fits intoSOA, and of how Artix works.2.Artix Installation Guide. You must read the followingsections about supported environments:i.Supported Systems and Compilersii.Java, Compiler, and Artix Designer Requirements3.Writing Artix Contracts includes information about basicWSDL concepts and how to write a service interface.i.Introduction. Overview of WSDL, the structure of acontract, and the steps involved in writing a servicecontract.ii.Designing Logical Data Units. How to create data typesusing XML Schemaiii.Defining Logical Messages Used by a Service. How to buildthe data types into the messages that a service will use toimplement its operations.iv.Defining Your Logical Interfaces: How to create a serviceinterface using the logical messages.4.Configuring and Deploying Artix Solutions, C++Runtime explains how to configure and deploy Artix serviceswritten in C++. You must read the following chapters:i.Getting Started explains how to set up an Artixenvironment using the artix_env script, and systemenvironment variables.ii.Artix Configuration explains concepts such as Artixconfiguration files, scopes, namespaces, and variables.iii.Artix Logging explains how to configure Artix logging forservices and Artix subsystems.Integration Use CaseThis section describes the reading path for developing a service asa front-end for existing functionality.Service integrationService integrators should read the following books:1.Artix Router Guide, C++ Runtime. Read the followinginformation about the C++ router service and how to makeroutes.i.Introduction. Overview of the C++ router and how it isused.patibility of Ports and Operations. Explains therequirements for routing between interfaces.iii.Creating Routes Using Artix Tools. Introduces the GUI andcommand line tools that can be used to create routes.2.Artix Bindings and Transports, C++ Runtime includesinformation about creating bindings and endpoints for Artixservices written in C++:i.Read the relevant binding chapter that applies to yoursystem (for example, SOAP, Fixed, or XML).ii.Read the relevant transport chapter that applies to yoursystem (for example, HTTP, Tuxedo, or JMS).3.Artix Router Guide, C++ Runtime. Read the followinginformation about how to define routes between endpoints:i.Creating a Basic Route. This is required reading. Itdescribes the minimum needed to create a route in Artix.ii.Adding Operation-Based Rules to a Route: This isoptional. It expands on basic route design.iii.Adding Attribute-Based Rules to a Route. This is optional.It expands on basic route design.iv.Adding Content-Based Rules to a Route. This is optional.It describes how to create content based routes.v.Linking Routes. This is optional. It expands on previouschapters.ing Advanced Routing Features. This is optional. Itdescribes how to create routes for various advanced usecases such as load balancing and service fail-over.vii.Deploying an Artix Router. This is required reading. Itdescribes how to deploy the router in an Artix runtimeenvironment.Advanced integration topicsIn addition, you may wish to read the following:•Artix for CORBA contains detailed information about usingArtix to integrate with CORBA applications.New Development Use CasesThis section describes reading paths for the following newdevelopment use cases:•“Service consumer”•“C++ development”Service consumerRead the following if you are developing a new service consumer:•Artix Bindings and Transports, C++ Runtime includesinformation about creating bindings and endpoints for Artixservices written in C++:♦Read the relevant binding chapter that applies to yoursystem (for example, SOAP, Fixed, or XML).♦Read the relevant transport chapter that applies to yoursystem (for example, HTTP, Tuxedo, or JMS).C++ developmentFor detailed information on developing a new C++ service provider or consumer, read the following:1.Developing Artix Applications in C++:i.Getting Started with Artix Programming. An overview ofhow a developer works in the Artix C++ developmentenvironment.ii.Artix Programming Considerations: Operations and Parameters section. An overview of how WSDL is mappedinto C++.iii.Server Programming. The basics of developing an Artix C++ service.iv.Client Programming. The basics of developing an Artix C++ consumer.v.Artix Programming Considerations: Compiling and Linking an Artix Application section. What is needed to build ArtixC++ applications.vi.Artix Programming Considerations: Building Artix Stub Libraries on Windows section. How to build Artix stub codeinto a Windows DLL.vii.Artix Data Types. Overview of how WSDL types are mapped into C++.viii.Artix Programming Considerations: Exceptions section.Overview of how to create and handle exceptions in ArtixC++.ix.Artix Programming Considerations: Locating Services with UDDI section. How to use the UDDI interface as analternate method of finding services.x.Endpoint References and Callbacks. Overview of EPRs and how to use them in implementing callbacks.xi.Artix Contexts. How to get information from the binding and transport layers of the runtime.xii.Working with Transport Attributes. How to extract a default set of transport information from the runtime.xiii.Persistent Maps. How to use persistent data for high availability.xiv.Reflection. How to determine the structure of an Artix data type without advance knowledge.xv.Default Servants. How to write a scalable factory pattern.xvi.Artix Programming Considerations: Multi-Threading section. Describes issues for multi-threaded Artix clientsand servers.Advanced C++ developmentFor detailed information on developing new advanced C++plug-ins, read the following:2.Developing Advanced Artix Plug-Ins with C++. How towrite custom interceptors and transport plug-ins.Background readingFor background information on Web services, XML, and WSDL, see “Background reading” on page3.。
a more:更abnormal:异常above:上面的access privilege:存取特权access privilege:访问权限access: 入口;出口acknowledgement:确认act as:充当;起什么作用activity:活动addition:增进;附加additionally:此外;又;加之advance:先进版after that:在此之后alert:提醒;警报alphanumeric:文字;数字alternative:另一种;交替的alternatively:或者an alternative:另一个方法,一个替代;另一种and:并;和announcement :公告;宣告;发表;通告ansa:柄applicable:适当的apply to:适用于;应用于approache:途径approprate:适当的approval hierarchy:审批层次approval:批准;同意;赞成approve:批准approver:批准者;承认者assistance:援助;帮助attlist:属性audience:观众auditing:审计auditing:审计authenticate:认证authentication:认证automatically:自动autopay:自动转账backend scheduler:后台调度程序background services:后台服务backup old data:备份旧数据backup server:备份服务器based on:以什么为基础be composed of:由...组成be embedded in:潜入be embedded:嵌入be from:来自于be granted to:授予be identified:被认为be identified:被认为;认同be incorporated into :使...成为一部分;纳入be incorporated into:使成为…的一部分;被纳入be long:很长事件才能到达be long:长期be overdue:过期below:列出bill alert:账单提示break down:分解business need:业务需求business process:业务流程business:商务call:呼唤;调用;叫来;命令carry out:实行;执行;完成categorize:分类category:种类checklist:清单checklist:清单choice:选择common function:常见函数common:常见到;普通的;通俗的;公共的common:常见的compensation:补偿方法completeness:完整;完全complexity:复杂的composed:由什么组成computed:计算;估算concepts:概念condition:条件consideration:考虑;原因;报酬;关心consist of:由...组成;包含;由contract no:合同号control file:控制文件corporate:企业credit balance:贷方余额customization:定制customized:自定义data files:数据文件data source:数据源decision:决定;决心declare:申报;声明delivery:分娩;传送;交付;演讲department admin:部门行政department head:部门主管depending on:根据;取决于describe:描述;说明design issues:设计上的问题design phase:设计阶段designated:指定的;特指的detail file:说明文件determining:确定;决定device:装置diagrame:图表;示意图diition:版本discusstion:讨论dissect:切细;仔细分析distribution:分配documented:记录dynamically:动态的effective:有效的;起作用的;实际的end-to-end:端到端enhancement:增强;加强;改善enquiry:询问enterprise:企业;计划;事业entity:实体establish:建立;创办eventually:最终,终于except:除了,反对exceptional case:例外事件;特殊情况expect duration:预期持续时间experimental:实验的expire:期满;文件、协议等(因到期而)失效;断气;逝世explicitly:明确的;明白的explicitly:明确地;显示地exposed:暴露extensive:广泛地external interfaces:外部接口external system:外部系统external:外表的;外部的;外面的extra offer:额外的facilitate:促进feature highlights:功能亮点for the sake of:为了;为了…的利益forming:形成frequency:频率;频繁fulfill:履行;实现funtctional requirement:功能需求generate:引起;形成;产生geteway:网关grant :授予grant privilege:授权guidance:指导;引导;领导handing:处理;管理;操纵hierarchical structure:层次结构high available function:高可用功能high-level:高级的however:但是;然而immediately:立即;马上;直接地in addition to:除了in case:假如in conjunction with:连同;共同;与…协力in order to:为了in parallel:并行的;并联的in sequence:逐一;依次in summary:总之in summary:总之;incoming message:传入的信息incoming:收到indicate:表明;指出inhertied:继承inquiry:查询instead of:代替;而不是integration:集成版integration:综合;集成;发展intelligence:智能intend to:打算做...intended audience:读者对象intended:目标interpreted:解释introduction:引言invalid:无效的;不成立的investigation:调查investigation:调查invoice date:发票日期invoke:调用invole:包含isolaction:隔离it is essential that:必须;是必不可少得it is necessary to:必须legacy:遗产;遗赠;遗留let:指导;领导logic:逻辑lowermost:最低maint:维护mandatory:强制的;命令的;受委托的manual input:人工输入mention:提到migration:迁移more than one:不只一个motivation:动机;积极性multiple task:多任务namely:即;也就是;换句话说normally:正常地;通常地;一般地not identify:不确定OBIEE:Oracle Business Intelligence Enterprise Edtion oracle商务智能企业版objective:目标obtain:获得occur:出现;发生on leaving:正休假operation:操作;作用;行动order:秩序;规则;制度;订单originate:引起;创始;开始;发生;发明;起源于out once and only once:一次性outgoing:对人友好的;外向的;送出outstanding:杰出的;显著的outstanding:杰出的;显著的overdue reminder-final notice sms:逾期通知·overdue:过期overdue:逾期的;延误的overview:概述;简介parse:从语法上描述或分析participates:参加,分享particular:特别的;详细的;独有的;挑剔的;特色pass to:转到pending :待定pending:直到;在等待…期间;待定的;未定的performance expectation:业绩预期performance requirement:性能要求period:时期;句号;学时please note:请注意polymorphic:多态pre-defined:预定义pre-requisite:必要pre-requisite:首要primary role:主角色prioritized:优先priority:优先privilege:权限process owner:业务主process:流程promotion:促进;增进;提升;发展;升级promptly:迅速地、立即地proof:证明;校样;考验properly:适当地;正确地propose:提议;建议;打算;计划;推荐provide:捕捉,提供provision:条款;规定;准备;供给publisher:出版者;发布者;办报者purpose:目的;意志;作用rather than:而不是;宁可…也不愿receive status:接受状态recipient:收件人;接受者;容器;容纳者recommend:推荐;建议redemption:赎回;偿还;补救reference:引用reject:拒绝relevant party:关系人relevant:关系人remedy:补救remind:提醒remind:提醒reminder email:提示邮件reply to:回答report:报表;报告;报到reporting tool :报表工具(如:OBIEE)repository:仓库represent:代表reprint:转载request status:要求状态;请求状态require:需求;要求;命令requisite:需要的;responsible party:责任方responsible person:负责人retrieve from:从...得到retrieve:取回;恢复;重新得到re-user:重用review:评审;revise:修正route to:…的方法Schedule date is later than the expire date(if any)of the scheduled date:预订的日期section leader:组长section:部;部门;部分;节selected Alphanumeric Sender Address.附表日期晚于选定的字母数字发件人地址的到期日期(如果有的话)。
we knowthey knowS p e n d m a n a g e m e nt e-b u s i n e s sESM solutions put spend visibility in focus, giving your company the abilityto better identify trends, track expendi-tures and forecast for strategic planning. At the same time, you gain the abilityto standardize procurement processes and improve supplier connectivity and relationships. By helping to reduce pro-cess costs and maximize the value of every transaction, the benefi ts of ESM go straight to the bottom line.IBM and Ariba have joined forces to bring you a comprehensive solution designed from the ground up to manage and optimize enterprisewide spend.The IBM-Ariba alliance provides a suite of integrated offerings, leveraging IBMe-business expertise and the Ariba®Spend Management™ Suite, which enable you to manage, control and leverage the entire spend lifecycle.Pinpoint spending leaks. Plug them. Save. With ESM, chief fi nancial offi cers and procurement professionals fi nally have access to a single, centralized solution that puts them in control of spend.At the heart of the IBM-Ariba ESM solution is the Ariba Spend Management Suite, which integrates analysis, sourcing and procurement solutions to give youa straightforward approach to managing spend. Our solution will help you fi nd where you can save money, get the most savings possible and keep those savings on an ongoing basis. Analysis—fi nd savingsTo fi nd potential savings, your companymust scrutinize every spend processcategory.• Ariba® Analysis™ is an application thatenables you to collect and analyze com-plex spend data so you can understandcurrent spending patterns and identifyopportunities for improvement. AribaAnalysis provides a single repository ofaccurate spend data and easy-to-usetools to analyze that data, whichcan help your company identify sourc-ing opportunities, consolidate demandacross divisions and spot emergingtrends. Buyers are able to negotiatebetter pricing terms, and identifyingmaverick users who are not buying withcontracted suppliers becomes easier.Sourcing—get savingsThe ability to automate the sourcingprocess, negotiate better contracts withsuppliers and improve sourcing pro-ductivity is essential to reducing andcontrolling costs, and increasing savings.• Ariba® Enterprise Sourcing™ helps youachieve greater competitive advan-tage and profi tability by moving fromtraditional, event-based sourcing toenterprise sourcing. Ariba EnterpriseSourcing streamlines and automatesthe entire sourcing process, fromdefi nition and aggregation of spendingrequirements to supplier manage-ment, negotiation and establishmentof optimal contracts with suppliers.Buyers and suppliers can capturepurchasing trade-offs and optimizesourcing activities with fl exible biddingoptions and decision support tools.Procurement—keep savingsDriving widespread compliance withnegotiated contracts enables you to keepand sustain savings. The Ariba Procure-ment Solution provides plan-to-payfunctionality and requisitioning capabilityto help drive enterprisewide compliancewith negotiated contracts. Ariba Procure-ment Solution applications include:• Ariba® Buyer™—an integral part of theAriba Spend Management Suite andhub of the Ariba Procurement Solution.It provides requisition managementand online purchasing capabilities forall users and commodities. Ariba Buyersecurely automates the full buying cycle for improved management and tracking of spend. In addition to restricting maverick buying and other uncontrolled spending by driving com-pliance with negotiated contracts, Ariba Buyer delivers rapid cost savingsby increasing the effi ciency of the entire procurement process from requi-sition to payment—slashing transaction expenses, decreasing cycle times and leveraging supplier relationships.• Ariba® Contracts™—a new application that helps your procurement profes-sionals manage contract usage and compliance, and eliminate contract leakage. Ariba Contracts provides com-prehensive enterprisewide management of the entire contract lifecycle and pro-vides buyers access to a centralized repository of contracted products and services. From Ariba Contracts’ central-ized contract management tool, buyers can launch purchasing transactions, extend contracts, renegotiate service terms and monitor the compliance levels of suppliers. • Ariba® Invoice™—a new applicationthat automates and streamlines everystep in the invoicing process to helpyour company reduce reconciliationcycle times and improve exceptionhandling. Ariba Invoice replacesmanual and paper-intensive activitieswith effi cient electronic invoicing. AribaInvoice provides an intuitive user inter-face, robust workfl ow-based exceptionhandling and realtime supplier commu-nication for greater time, resource andcost effi ciencies.• Ariba® Workforce™—extends thebenefi ts and cost savings of ESM tothe procurement of temporary staffi ng,contractors and consulting services.By automating the complete workforceprocurement lifecycle, Ariba Workforceenables you to dramatically improveprocess effi ciency, cut costs, enhancesupplier collaboration and interaction,reduce billing and payment errors, andbetter understand and manage yourcontingent worker spend.The Ariba Spend Management Suite alsoincludes Ariba® Supplier Network™ (AribaSN), the most widely adopted globalcommerce network for transparent col-laboration between buyers, suppliers anddistribution channels, with over 32,000enabled vendors. Ariba SN providescompanies and their suppliers with asingle point of connection to facilitate allspend management processes.Industry-leading e-business know-how,infrastructure and support servicesIBM and Ariba provide advancedtechnology solutions and services tohelp businesses reap the greatestpossible benefi ts from ESM. Together,we can help your business rapidly inte-grate ESM solutions and cutting-edgetechnologies into your infrastructure tomaximize business opportunities.IBM offers a single point-of-contact,including hardware, software,services, support and fi nancing forquick implementation and dynamicexecution. IBM has built valuechains—using proven, comprehensivesolutions and services—for every indus-try. IBM capabilities encompass businesstransformation consulting, implementationand support services, middleware,hardware and outsourcing.“The IBM team expertly integrated Ariba Buyer withour backend enterprise systems and deployed thesolution in just 67 days—enabling an even fasterreturn on investment.”—Dan Olsen, director of Supply Management Services, Hydro OneIBM service professionals have the knowledge and skills to quickly deploy and adapt processes and applications worldwide. Based on experience work-ing with a wide range of information technology systems—including complex, heterogeneous environments—IBM can leverage your infrastructure to help auto-mate end-to-end ESM processes.IBM technology and capabilities include:Services—IBM offers a variety of stra-tegic consulting services to help your company determine its ESM strategy, then implement it using our knowledge of e-business and industry best prac-tices and leading methodologies. IBM can also host and manage your ESM solution so your information technology team can focus on core competencies.Software—IBM has combined databasestrengths in IBM DB2®, security strengthsin Tivoli® systems and e-business inte-gration solutions with powerful offeringssuch as IBM WebSphere MQ and theIBM WebSphere® business integrationsolutions, so that IBM can help youintegrate existing systems (legacy, ERPand more) with new ESM applicationsfrom Ariba.Hardware—IBM robust solutions powere-commerce around the world. Forexample, the IBM ^ line, fromIntel-based servers to mainframes, isdesigned to provide the best scalability,availability and dependability to fi t yourbusiness requirements.IBM also has an extensive system-and solution-testing infrastructure, sup-ported by a team of several thousandprofessionals at more than 100 sitesworldwide. Research and developmentexperts test product interoperability,scalability, proof of concepts and perfor-mance to drive ultimate benefi ts for you.Becoming spend-wise with help from IBMand AribaIBM and Ariba have merged advancedtechnology, high-level e-businessinfrastructure and swift implementationcapabilities to help you gain enterprise-wide spend visibility quickly and easily.IBM, with our e-business expertise andglobal implementation and consultingservices, is ready to power your businesswith a comprehensive, world-class ESMsolution. And the integrated and auto-mated Ariba Spend Management Suitefor analysis, sourcing and procurementprovides effective management solu-tions for the full spend lifecycle. Supplierconnectivity and relationships take onwhole new meanings. As does processcontrol. The money that was once lostto unobserved processes, poor com-munication and loose relationships cannow be found, captured and kept. Andthe savings goes straight to where youneed it most—the bottom line.For more informationTo learn more about IBM and Ariba ESMsolutions, please call 1 866 426-6010or visit:Ariba spend management:• Signifi cant reductions in spend•Enterprisewide visibility and control•Spend lifecycle solution—analysis, sourcing and procurement© Copyright IBM Corporation 2002IBM Corporation1133 Westchester AvenueWhite Plains, NY 10604U.S.A.IBM, the IBM logo, the e(logo), the e-business logo,DB2, Tivoli and WebSphere are trademarks or registered trademarks of International Business MachinesCorporation in the United States, other countries, or both.References in this publication to IBM products orservices do not imply that IBM intends to make them available in all countries in which IBM operates.© 2002 Ariba, Inc.Ariba, Inc.1565 Charleston RoadMountain View, CA 94043U.S.A.Ariba and the Ariba logo are trademarks, or registered trademarks of Ariba, Inc. Ariba Spend Management, Ariba Analysis, Ariba Buyer, Ariba Contracts, AribaEnterprise Sourcing, Ariba Invoice, Ariba SupplierNetwork and Ariba Workforce are trademarks orservice marks of Ariba, Inc.Other company, product and service names may be trademarks or service marks of others.Printed in the United States of America04-02All Rights ReservedG580-3384-01。
英语面试笔试题电商英语面试笔试题针对电商实掌握根底知识最重要,注重学习方法和应试技巧,以下是电商英语面试笔试题练习。
1.flight nieen from new york and washington is now arriving at .a. the two gateb. gate twoc. the gate twod. second gate2.since 1971 there have been two in this city.a. woman mayorsb. woman mayorc. women mayord. women mayors3.it rains in shanghai in beijing.a. as often; thanb. more often; thanc. as oftener; asd. much often; as4.it for two days and the field were all under water.a. rainedb. had been rainingc. was rainingd. would have rained5.a new type of puter is going to next year.a. turn outb. being turned outc. have turned outd. turned out6.having the highest marks in his class,.a. the college offered him a scholarshipb. a scholarship was offered him by the collegec. he was offered a scholarship by the colleged. a college scholarship was offered to him7.he in london by eleven o'clock, but he started too late.a. should beb. must have beenc. ought to have beend. might have been8.if you that late movie last night, you wouldn't be sleepy now.a. hadn't watchedb. didn't watchc. haven't watchedd. wouldn't have watched9.it is because english is useful .a. why we study it hardb. which we study hardc. what we study hardd .that we study it hard10.we do not believe their nice words intimidated by their bluster.a. so aren't web. neither we arec. we are notd. nor are we11.there are benefits in the new system.a. conciseb. precisec. tangibled. metal12.the time has e for the pany to after years of rapid expansion.a. consistb. considerc. consolidated. bine13.it is important for university to keep with the changes in science and technology.a. stepb. stagec. spaced. pace14.critics the writer with a lack of originality.a. criticizedb. chargedc. condemnedd. scolded15.they have themselves as dedicated social workers.a. distinguishedb. seenc. definedd. differed16.the plane is to take off at 4.a. enlistedb. enrolledc. promptedd. scheduled17.people will not believe a person who always .a. magnifiesb. enlargesc. broadensd. exaggerates18.you should sign a contract to make your job situation .a. normalb. monc. regulard. usual19.all citizens in this nation are to the law.a. subjectb. objectc. exposedd. dependent20.let's fix a date for the next meeting.a. infiniteb. plainc. distinctd. definitehuman beings act in a different way from that ofanimals just because they can speak while animals cannot.21 the cleverest animals cannot do things which to us seemvery 22 and which small children, as soon as they learn to talk, would be able to do.a german scientist, who performed experiments for many years with big apes, found that his apes could 23 hissticks as stools to pull down bananas which they could not reach. but they only used the stick to get a banana when both the banana and the stick were 24 view at the same time. if the banana was in front of them and the stick was behind them, they could not use the stick. they could not keep the banana 25 enough in mind to look around and then pick upthe stick and use it.the 26 for this is clear. we have words for banana and stick which help us to think about these things when they are not in 27.even a small child knowing the words "banana" and "stick" has an idea of their relationship and is able to think "stick" together with "banana" and to rememberthis long enough to pick the stick 28 behind and use it on the banana.unable to speak, animals cannot keep their knowledge of things 29 long. that's why they often interrupt one line of action to do something else and later forget it pletely. human beings, on the other hand, use 30 and are able to do one thing continuously.21.a.if b. even c. though d. when22.a.honest b. foolish c. simple d. evident23.a.take b. hold c. regard d. use24.a.in b. beyond c. for d. with25.a.close b. alive c. long d. plete26.a.reason b. answer c. truth d. thought27.a.mind b. thought c. sight d. brain28.a.in b. at c. around d. from29.a.before b. for c. after d. since30.a.knowledge b. language c. mind d. memory阅读下面的短文,从a、b、c、d四个选择项中选出一个最正确答案填空。
第一章1.1管理者对组织很重要原因(1)在这个复杂、混乱和不确定的时代,组织需要他们的管理技能和能力(2)管理者对工作的顺利完成至关重要(3)有助于提高员工的生产率和忠诚度(4)对创造组织价值观很重要1.2管理者协调和监督其他人工作,以实现组织目标。
在传统结构的组织中,管理者可以被划分为基层、中层和高层管理者。
组织的三个特征:一个明确的目标;由人员组成;一种精细的结构1.3 广义上,管理就是管理者所从事的工作。
管理者协调和监管其他人以有效率、有效果的方式完成他们的工作或任务。
效率是以正确的方式做事;效果是做正确的事管理的四种只能:计划(定义目标、制定战略、制定计划);组织(对工作作出安排);领导(与其他人共事并且通过他们完成目标);控制(对工作绩效进行监控、比较或纠正)明茨伯格的管理角色(Mintzberg’s managerial roles)包括(1)人际关系角色(Interpersonal):挂名首脑figurehead领导者leader联络者liaison,这涉及与人打交道以及其他仪式性/象征性ceremonial/symbolic的活动(2)信息传递角色informational:监听者monitor传播者dissemination发言人spokesperson,指的是收集collecting、接受receiving和传播disseminating信息;(3)决策定制者decisional:企业家entrepreneur、混乱驾驭者disturbance handler、资源配置者resource allocator和谈判者negotiator,即制定决策管理者以三种方式来影响行为:通过对行为进行直接管理;通过对采取行动的人员进行管理;通过对推动人们采取行动的信息进行管理managing information that impels people to take action。
卡茨认为,管理技能包括katz’s managerial skills:技术技能technical(与具体工作相关的知识和技术)、人际技能human skill(与他人和谐共事的能力)和概念能力conceptual(思考和表达创意的能力)。
ibm mq 术语IBM MQ, or Message Queuing, is a middleware technology that enables the secure and reliable exchange of messages between applications and systems, regardless of their platforms or locations. It ensures the integrity and delivery of messages even in the face of network failures or system downtimes.IBM MQ的核心组件之一是队列(Queue),它充当消息的暂存区,允许发送方和接收方在不同的时间点和速率上操作。
发送方将消息放入队列中,而接收方则从队列中获取消息。
这种方式实现了应用程序之间的解耦,使得它们可以异步通信,从而提高系统的可扩展性和可靠性。
Another key term in IBM MQ is the queue manager, which manages the queues and handles the routing of messages. It ensures that messages are delivered to the correct destination and maintains the integrity of the message data. Queue managers can be configured to communicate with each other, enabling distributed systems to exchange messages securely and efficiently.在IBM MQ中,消息(Message)是信息的基本单位。
Oracle® Fusion MiddlewareMonitoring and Managing With the Java EE Management APIs for Oracle WebLogic Server11g Release 1 (10.3.6)E13736-06November 2011This document describes the Java EE Management APIs which enable a softwaredeveloper to create a single Java program that can discover and browse resources,such as JDBC connection pools and deployed applications, on any Java EE Webapplication server.1Introduction and RoadmapThe Java EE Management specification describes a standard data model formonitoring and managing the run-time state of any Java EE Web application serverand its resources. It includes standard mappings of the model through a Java EEManagement EJB Component (MEJB).The following sections describe the contents and organization of thisguide—Monitoring and Managing With the Java EE Management APIs for Oracle WebLogicServer:■Section1.1, "Document Scope and Audience"■Section1.2, "Guide to This Document"■Section1.3, "Related Documentation"1.1Document Scope and AudienceThis document is a resource for software developers who develop managementservices for Java EE applications and for software vendors who developJMX-compatible management systems. It also contains information that is useful forbusiness analysts and system architects who are evaluating WebLogic Server orconsidering the use of JMX for a particular application.The information in this document is relevant during the design and developmentphases of a software project. The document does not address production phaseadministration, monitoring, or performance tuning topics. For links to WebLogicServer documentation and resources for these topics, see Section1.3, "RelatedDocumentation".It is assumed that the reader is familiar with Java EE and general applicationmanagement concepts. This document emphasizes a hands-on approach to developinga limited but useful set of JMX management services. For information on applyingJMX to a broader set of management problems, refer to the JMX specification or otherdocuments listed in Section1.3, "Related Documentation".1.2Guide to This DocumentThis document is organized as follows:■This section, Section1, "Introduction and Roadmap," describes the scope and organization of this guide.■Section2, "Using the Java EE Management APIs on WebLogic Server," introduces JMX and describes common ways to use it in conjunction with other WebLogic Server management features.■Section3, "WebLogic Server Extensions," describes WebLogic-specific extensions to JSR 77.1.3Related DocumentationThe Sun Developer Network includes a Web site that provides links to books, white papers, and additional information on JMX:/technetwork/java/javase/tech/javamanagemen t-140525.html.To view the JMX 1.2 specification and API documentation, download it from/aboutJava/communityprocess/final/jsr003/index3.ht ml.To view the JMX Remote API 1.0 specification and API documentation, download it from/aboutJava/communityprocess/final/jsr160/index.htm l.For guidelines on developing other types of management services for WebLogic Server applications, see the following documents:■Using WebLogic Logging Services for Application Logging describes WebLogic support for internationalization and localization of log messages, and shows you how to use the templates and tools provided with WebLogic Server to create or editmessage catalogs that are locale-specific.■Configuring and Using the WebLogic Diagnostic Framework describes how system administrators can collect application monitoring data that has not been exposed through JMX, logging, or other management facilities.For guidelines on developing and tuning WebLogic Server applications, see the following documents:■Developing Applications with WebLogic Server is a guide to developing WebLogic Server applications.■Developing Manageable Applications with JMX describes how to create and register custom MBeans.2Using the Java EE Management APIs on WebLogic ServerThe Java EE Management APIs enable a software developer to create a single Java program that can discover and browse resources, such as JDBC connection pools and deployed applications, on any Java EE Web application server. The APIs are part of the Java EE Management Specification, which requires all Java EE Web application servers to describe their resources in a standard data model.The following sections describe how to use the Java EE Management APIs on WebLogic Server:■Section2.1, "Understanding the Java EE Management Model and APIs"■Section2.2, "The Java EE Management Model on WebLogic Server"■Section2.3, "Accessing the MEJB on WebLogic Server"2.1Understanding the Java EE Management Model and APIsIn the Java EE Management data model, each instance of a Web application server resource type is represented by a Java EE Managed Object (JMO). The Java EE Management Specification describes exactly which types of resources must be represented by a JMO. JMOs themselves contain only a limited set of attributes, which are used to describe the location of the object in the data model.Download the Java EE Management Specification from/aboutJava/communityprocess/final/jsr077/index.htm l.2.1.1JMO HierarchyThe data model organizes JMOs hierarchically in a tree structure. The root JMO isJ2EEDomain, which represents a collection of Web application server instances that are logically related. J2EEDomain contains the object names for all instances of theJ2EEServer JMO, each of which represents a server instance in the collection.Java applications can browse the hierarchy of JMOs, recursively querying for object names and looking up the JMOs that are named by the query results.2.1.2JMO Object NamesEach JMO instance is identified by a unique object name of typejavax.management.ObjectName. The names follow this pattern:domain:name=j2eeType=value,name=value,parent-j2eeType[,property=value]*For example, mydomain:J2EEtype=J2EEDomain,name=mydomainThe Java EE Management Specification describes exactly which name/value pairs must be in the object names for each JMO type.The object name for each child JMO contains name/value pairs from its parent JMO's object name. For example, if the JMO for a server instance is namedmydomain:j2eeType=J2EEServer,name=myserverthen the JMO for a servlet that is part of an application deployed on that server instance would be named:mydomain:J2EEApplication=myapplication,J2EEServer=myserver,WebModule=myapp_ mywebmodule,j2eeType=Servlet,name=myservlet_nameThe name/value pairs can appear in any order.2.1.3Optional Features of JMOsThe Java EE Management Specification, version 1.0, requires only that Web application servers implement JMOs and provide API access to the JMOs.Optionally, you can implement the JMOs to provide performance statistics, management operations, and to emit notifications when specified events occur.2.1.4Accessing JMOsA Java application accesses the JMOs throughjavax.management.j2ee.Management, which is the remote interface for the Management Enterprise Java Bean (MEJB).The Java EE Management Specification requires that the MEJB's home interface be registered in a server's JNIDI tree as ejb.mgmt.MEJB.See the API Reference for the javax.management.j2ee package:/javaee/5/api/javax/management/j2ee/pa ckage-summary.html.2.2The Java EE Management Model on WebLogic ServerWebLogic Server implements only the required features of the Java EE Management Specification, version 1.1. Therefore, the following limitations are in place:■None of the JMOs provide performance statistics, management operations, or emit notifications.■There are no mappings to the Common Information Model (CIM).■There are no mappings to an SNMP Management Information Base (MIB).The MEJB and JMOs are available only on the Administration Server. This is consistent with the Java EE Management Model, which assumes that most Java EE Web servers exist within some logically connected collection and that there is a central point within the collection for accessing or managing the server instances. From the Administration Server, a Java application can browse to the JMO that represents any resource on any server instance in the WebLogic Server domain.Because WebLogic Server implements its JMOs as a wrapper for its MBeans, any changes in a WebLogic Server MBean that corresponds to a JMO is immediately available through the Java EE Management APIs.For all JMO object names on WebLogic Server, the domain: portion of the object name corresponds to the name of the WebLogic Server domain.2.3Accessing the MEJB on WebLogic ServerTo retrieve monitoring data through the MEJB:1.Look up the javax.management.j2ee.ManagementHome interface throughthe Administration Servers JNDI tree under the name ejb.mgmt.MEJB.e ManagementHome to construct an instance ofjavax.management.j2ee.Management, which is the MEJB's remote interface.2.3.1Example: Querying Names of JMOsThe example class in Example1 accesses the MEJB for a WebLogic Server domain and invokes javax.management.j2ee.Management.queryNames method. This method returns the object name for all JMOs in the domain.Example 1Querying Names of JMOsimport java.io.IOException;import .MalformedURLException;import java.util.Iterator;import java.util.Set;import java.util.Properties;import javax.management.j2ee.Management;import javax.management.j2ee.ManagementHome;import javax.management.AttributeNotFoundException;import javax.management.InstanceNotFoundException;import javax.management.ObjectName;import javax.management.QueryExp;import javax.naming.Context;import javax.naming.InitialContext;import javax.naming.NamingException;import javax.ejb.CreateException;public class GetJMONames {static String url = "t3://localhost:7001";static String user = "weblogic";static String password = "weblogic";public static void main(String[] args) {try {getAllJMONames();}catch(Exception e){System.out.println(e);}}public static Management getMEJBRemote()throws IOException, MalformedURLException,NamingException,CreateException{Context context = getInitialContext();ManagementHome home = (ManagementHome)context.lookup("ejb.mgmt.MEJB");Management bean = home.create();return bean;}public static Context getInitialContext()throws NamingException{Properties p = new Properties();p.put(Context.INITIAL_CONTEXT_FACTORY,"weblogic.jndi.WLInitialContextFactory");p.put(Context.PROVIDER_URL, url);if (user != null) {p.put(Context.SECURITY_PRINCIPAL, user);if (password == null)password = "";p.put(Context.SECURITY_CREDENTIALS, password); }return new InitialContext(p);}public static void getAllJMONames(){try {Management rhome = getMEJBRemote();String string = "";ObjectName name = new ObjectName(string);QueryExp query = null;Set allNames = rhome.queryNames(name, query);Iterator nameIterator = allNames.iterator();while(nameIterator.hasNext()) {ObjectName on = (ObjectName)nameIterator.next();System.out.println(on.getCanonicalName() + "\n");}} catch (Exception ex) {ex.printStackTrace();}}}3WebLogic Server ExtensionsWebLogic Server implements an extension to JSR 77 that gives you access toWebLogic-specific deployment descriptors using the MEJB, just like the standard Java EE deployment descriptors. The productSpecificDeploymentDescriptorattribute returns the XML contents of the WebLogic-specific descriptor file. Example 2 illustrates calling the method.Example 2productSpecificDeploymentDescriptor// Get the WLS specific deployment descriptor.// This is similar to the call for the standard descriptor// (i.e., the "deploymentDescriptor" attribute)//dd = (String) managementBean.getAttribute(objName,"productSpecificDeploymentDescriptor");// It returns a string containing the contents of the WLS specific deployment // descriptor. This is the XML file contents as a string.4ConventionsThe following text conventions are used in this document:5Documentation AccessibilityFor information about Oracle's commitment to accessibility, visit the OracleAccessibility Program website at/pls/topic/lookup?ctx=acc&id=docacc .Access to Oracle SupportOracle customers have access to electronic support through My Oracle Support. For information, visit/pls/topic/lookup?ctx=acc&id=info or visitConventionMeaning boldfaceBoldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.italicItalic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.monospace Monospace type indicates commands within a paragraph, URLs, codein examples, text that appears on the screen, or text that you enter./pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.Oracle Fusion Middleware Monitoring and Managing With the Java EE Management APIs for Oracle WebLogic Server, 11g Release 1 (10.3.6) E13736-06Copyright © 2007, 2011, Oracle and/or its affiliates. All rights reserved.This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.This software and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.。
xxxx学院期中测试课程:电子商务专业英语姓名:学号:班级:一、单词/词组英汉互译(本大题共30小题,每小题1分,共30分)。
transaction: 交易供应商:supplier wholesaler:批发商commission: 佣金原材料:raw material value chain:价值链specification: 规格虚拟的: virtual enrich:使丰富ultimate:最终的诈骗:fraud 排名:rankingsolution: 解决方案使命:mission considerable:相当大的stocking trading:股票交易盈利模式:revenue model 志愿者:volunteerunique: 唯一的购物车:shopping cart conversion rate:转化率boost: 提高执行: execute 开始生效:kick inbear with: 忍受目标市场:targeted market comprehensive: 综合的two-way interaction:双向互动努力、尽力: endeavor 宽带:broadband二、名词解释,请对以下名词/短句用英文进行解释说明(本题共6道,每个5分,共30分)。
1、electronic businessElectronic Business, commonly referred to as "e-commerce" or "e-business",may be defined as the utilization of information and communication technologies(ICT) in support of all the activities of business.2、B2BBusiness-to-Business (B2B)is a term commonly used to describe commerce transactions between businesses like the one between a manufactuer and a wholesaler or a wholesaler and a retailer,i.e.,and both the buyer and the seller are business entity.3、advantages of internet auctionConvenience flexibility economical to operate increased reach4、domain nameA unique address on the Internet, like .my, where clients or potential customers can find your business.5、affiliate marketingAffiliate marketing is one of the oldest forms of marketing, and Internet has brought new life to this old standby(备用品). With affiliate marketing, influencers promote other people's products and get a commission every time a sale is made or a lead is introduced.6、SEMSearch engine marketing (SEM) is a form of Internet marketing that involves the promotion of websites by increasing their visibility in search engine results pages (SERPs) primarily through paid advertising.三、段落翻译,请把下面的英文段落翻译成中文(本题共1道,共10分)。
SAP全套课程/标准教材/培训教材之编号和名称及下载地址(将陆续补上)Course Code课程编号 Solution Type所属模块 Course Title课程名称AC010 Financials Business Processes in Financial Accounting (includes e-learning SAP125 SAP Navigation )下载地址:ShowPost.asp?ThreadID=1305AC020 Financials Processes in Investment ManagementAC040 Financials Business Processes in Management Accounting (includes e-learningSAP125 SAP Navigation)AC050 Financials Business Processes in Financial and Management Accounting with the New Gene ral Ledger(includes e-learningSAP125 SAP Navigation)AC200 Financials Financial Accounting Customizing I: General Ledger, Accounts Payable, Accou nts ReceivableAC201 Financials Payment and Dunning Program, Correspondence, Interest CalculationAC202 Financials Financial Accounting Customizing II: Special G/L Transactions, Document Par king, Validation and SubstitutionAC205 Financials Financial ClosingAC206 Financials Parallel Valuation and Financial Reporting: Local Law – IAS (IFRS) / US- G AAPAC210 Financials New General LedgerAC212 Financials Migration to the New General LedgerAC220 Financials Special Purpose LedgerAC270 Financials Travel Management - Travel ExpensesAC280 Financials Analytics & Reporting in Financial AccountingAC290 Financials Real Estate ManagementAC295 Financials Flexible Real Estate ManagementAC305 Financials Asset AccountingAC350 Financials System Configuration for Investment ManagementAC400 Financials Programming in FinancialsAC405 Financials Cost Center and Internal Order AccountingAC412 Financials Cost Centre Accounting: Extended FunctionalityAC420 Financials Template Allocation Procedure for Processes and ActivitiesAC505 Financials Product Cost PlanningAC520 Financials Controlling for Make to Order / Stock ProductionAC530 Financials Actual Costing/Material LedgerAC605 Financials Profitability AnalysisAC610 Financials Profit Centre AccountingAC650 Financials Transfer PricesAC660 Financials EC-CS Consolidation FunctionsAC665 Financials EC-CS Integrated ConsolidationAC680 Financials Analytics & Reporting in Management AccountingAC805 Financials Cash ManagementAC990 Financials Tips and Tricks in Management Accounting (from SAP R/3 4.6 to ECC 6.0)ADM100 NetWeaver - Sys Admin SAP Web AS Administration IADM102 NetWeaver - Sys Admin SAP Web AS Administration IIADM106 NetWeaver - Sys Admin SAP System Monitoring Using CCMS IADM107 NetWeaver - Sys Admin Advanced SAP System Monitoring using CCMS IIADM110 NetWeaver - Sys Admin SAP ECC 5.0 InstallationADM200 NetWeaver - Sys Admin SAP Web Application Server Java Administration (Note: This cour se covers the content of TADMD5)ADM225 NetWeaver - Sys Admin SAP Software Logistics for JavaADM315 NetWeaver - Sys Admin Workload AnalysisADM325 NetWeaver - Sys Admin Software LogisticsADM326 NetWeaver - Sys Admin SAP ECC UpgradeADM505 NetWeaver - Sys Admin Oracle Database Administration IADM506 NetWeaver - Sys Admin Oracle Database Administration IIADM515 NetWeaver - Sys Admin SAP DB Database AdministrationADM520 NetWeaver - Sys Admin Database Administration MS SQL ServerADM535 NetWeaver - Sys Admin DB2 UDB (UNIX and Windows) Database AdministrationADM940 NetWeaver - Sys Admin SAP R/3 Authorization ConceptADM950 NetWeaver - Sys Admin Secure SAP System ManagementADM960 NetWeaver - Sys Admin Security in SAP System EnvironmentsANA10 NetWeaver - BI SAP xApp Analytics using SAP NetWeaver Visual ComposerBC400 NetWeaver - Programming ABAP Workbench FoundationsBC401 NetWeaver - Programming ABAP ObjectsBC402 NetWeaver - Programming Advanced ABAPBC405 NetWeaver - Programming ABAP ReportingBC407 NetWeaver - Programming Reporting: QuickViewes, InfoSet Query and SAP QueryBC408 NetWeaver - Programming ABAP lists: Processing data using Extracts (eLearning)BC410 NetWeaver - Programming Programming User DialogsBC412 NetWeaver - Programming ABAP Dialogs Programming using Enjoy SAP ControlsBC414 NetWeaver - Programming Programming Database ChangesBC415 NetWeaver - Programming Remote Function Calls in ABAPBC416 NetWeaver - Programming ABAP Web ServicesBC417 NetWeaver - Programming BAPI Development for Accessing SAPBC420 NetWeaver - Programming Data TransferBC425 NetWeaver - Programming Enhancements and ModificationsBC430 NetWeaver - Programming ABAP DictionaryBC460 NetWeaver - Programming SAPscript: Forms Design and Text ManagementBC470 NetWeaver - Programming Form Printing with SAP Smart FormsBC480 NetWeaver - Programming PDF-Based Print FormsBIT100 NetWeaver - BIT SAP NetWeaver Process Integration – Overview (includes e-learning co urse SAP125 SAP Navigation)BIT140 NetWeaver - BIT XML IntroductionBIT300 NetWeaver - BIT Integration Technology ALEBIT350 NetWeaver - BIT Application Link Enabling (ALE) EnhancementsBIT400 NetWeaver - XI SAP Exchange InfrastructureBIT402 NetWeaver - XI XI - Adapter Concepts (File, JDBC, JMS, Mail) - eLearningBIT403 NetWeaver - XI XI - Adapter Concepts (Plain HTTP, IDoc, RFC, SOAP, PCK) - eLearning BIT430 NetWeaver - XI SAP XI Business Process ManagementBIT450 NetWeaver - XI SAP Exchange Infrastructure DevelopmentBIT460 NetWeaver - XI SAP Exchange Infrastructure MappingBIT526 NetWeaver - BIT Developing BAPI-Enabled Web Applications with JavaBIT528 NetWeaver - BIT SAP .NET Connector ProgrammingBIT530 NetWeaver - BIT SAP Business Connector: IntroductionBIT531 NetWeaver - BIT SAP Business Connector IntegrationBIT600 NetWeaver - BIT SAP Business Workflow - Concepts, Inboxes, Reporting and Template Usa ge (Normally offered as a 2 day course, Australia offering it as 1.5 days)See also workshop WAUBIT (both BIT600 and BIT601)BIT601 NetWeaver - BIT SAP Business Workflow - Build and Use (Normally offered as 5 days cou rse, Australia offering it as 3.5 days)See also workshop WAUBIT (both BIT600 and BIT601)BIT603 NetWeaver - BIT SAP Business Workflow and Web ScenariosBIT610 NetWeaver - BIT SAP Business Workflow - ProgrammingBIT615 NetWeaver - BIT SAP Archive Link Document Management with SAP Archive LinkBIT640 NetWeaver - BIT SAP NetWeaver - SAP Records Management in DetailBIT660 NetWeaver - BIT Data ArchivingBIT670 NetWeaver - BIT ADK - Retrieval ProgrammingBPERP All-in-One SAP Best Practices - Integrated business processes based on SAP R/3 Enterpr iseBPTAA All-in-One SAP Best Practices Tools and AcceleratorsBPTAQ All-in-One SAP Best Practices Tools and Accelerators (Lean Baseline)BW001 NetWeaver - BI SAP NetWeaver Business IntelligenceBW305 NetWeaver - BI BI - Enterprise Reporting, Query & Analysis (Part I)BW306 NetWeaver - BI BI - Enterprise Reporting, Query & Analysis (Part II)BW310 NetWeaver - BI BI - Enterprise Data Warehousing ( includes e-learning courses SAP125 & SAP130)BW330 NetWeaver - BI BI - Modelling & ImplamentationBW350 NetWeaver - BI BI - Data AcquisitionBW360 NetWeaver - BI BI - Performance & AdministrationBW365 NetWeaver - BI BI - User Management & AuthorizationBW370 NetWeaver - BI BI - Integrated PlanningBW380 NetWeaver - BI BI - Analysis Processes & Data MiningCA500 HCM Cross Application Time SheetCA611 NetWeaver - Web AS Test Management with eCATTCA705 Financials Basics of the Report Painter/Report WriterCA710 Financials Advanced Functions of the Report WriterCR100 CRM CRM Customising FundamentalsCR300 CRM CRM SalesCR310 CRM SAP Mobile Application StudioCR400 CRM CRM Interaction Centre WinClientCR410 CRM CRM Interaction Centre WebClientCR500 CRM CRM MiddlewareCR600 CRM CRM MarketingCR700 CRM CRM ServiceCR800 CRM CRM E-CommerceCR900 CRM Analytical CRMCRM001 CRM Empower Sales, Services, and Marketing with SAPCRM SolutionD30BW NetWeaver - BI Business Information Warehouse (BW) - SAP BW Delta 3.0D346AW NetWeaver - Programming ABAP Workbench Delta Course 3.x to 4.6D620AW NetWeaver - Programming Delta ABAP Workbench SAP R/3 4.6C-SAP Web Application Server 6.2DBITWF NetWeaver - BIT SAP Workflow - Delta R/3 Enterprise on SAP NetWeaver 2004sDBW70E NetWeaver - BI BI - Delta Enterprise Data Warehousing SAP NetWeaver 2004sDBW70P NetWeaver - BI BI - Delta Planning SAP NetWeaver 2004sDBW70R NetWeaver - BI BI - Delta Reporting SAP NetWeaver 2004sDERPAA Financials Delta SAP System in Asset AccountingDERPFA SCM Delta SAP Enterprise in Production OrdersDERPFI Financials Delta SAP System in Financial AccountingDERPHR HCM Delta in SAPERP Human Capital ManagementDERPLD Life-Cycle Data Management Delta ERP 2004 Life-Cycle Data ManagementDERPLE SCM DERPLE Delta Warehouse Management / TransportationDERPMM SCM Delta SAP R/3 3.1 — ERP2004 Materials ManagementDERPOM Financials Delta SAP System in CO-OMDERPPA Financials Delta SAP System in Profitability AnalysisDERPPC Financials Delta SAP System in Product Cost ControllingDERPPL SCM Delta Production PlanningDERPPM Life-Cycle Data Management Delta SAP R/3 Enterprise in Plant Maintenance/Customer Ser viceDERPPS Life-Cycle Data Management Delta SAP R/3 Enterprise in PSDERPQM Life-Cycle Data Management Delta ERP 2004 in Quality ManagementDERPRM Life-Cycle Data Management Delta Repetitive ManufacturingDERPSP SCM Delta Sales Order ManagementDUT010 Duet Installation and Administration of DuetEH101 Life-Cycle Data Management EH&S OverviewEH102 Life-Cycle Data Management Basic Data and Tools (BAS)EH102a Life-Cycle Data Management BAS ProfessionalEH202 Life-Cycle Data Management Product SafetyEH202a Life-Cycle Data Management PS ProfessionalEH252 Life-Cycle Data Management Global Label Management (GLM)EH252a Life-Cycle Data Management GLM ProfessionalEH302 Life-Cycle Data Management Dangerous GoodsEH302a Life-Cycle Data Management DG ProfessionalEH402 Life-Cycle Data Management Industrial Hygiene/SafetyEH402a Life-Cycle Data Management HIS ProfessionalEH502 Life-Cycle Data Management Occupational HealthEH602 Life-Cycle Data Management Waste ManagementEH602a Life-Cycle Data Management WA ProfessionalEH702 Life-Cycle Data Management Hazardous Substance Management (HSM)EH912 Life-Cycle Data Management WWI Layout (WWI)EH912a Life-Cycle Data Management WWI ProfessionalEH920 Life-Cycle Data Management Customising Product Safety/Dangerous Goods Management EH930 Life-Cycle Data Management EH&S ExpertEP120 NetWeaver - EP SAP NetWeaver Portal DevelopmentEP130 NetWeaver - EP SAP Knowledge Management and Collaboration DevelopmentEP150 NetWeaver - EP SAP Enterprise Portal and KMC DevelopmentEP200 NetWeaver - EP SAP Enterprise Portal System AdministrationEP300 NetWeaver - EP Configuration of Knowledge Management and CollaborationEP600 NetWeaver - EP Configuration of the Universal WorklistERP001 Overview Management Empowered by SAPERPERP020 Overview Management Empowered by SAPERP FinancialsERP030 Overview Management Empowered by SAPERP Human Capital ManagementERP040 Overview Management Empowered by SAPERP Logistics & OperationsERP200 Role Based E-Learning CO OverviewERP201 Role Based E-Learning Controlling Master DataERP202 Role Based E-Learning Cost Center Planning and PostingsERP203 Role Based E-Learning Cost Center Period-end Closing and ReportsERP204 Role Based E-Learning Internal OrderERP205 Role Based E-Learning Product CostERP206 Role Based E-Learning Control Order-Production OrderERP207 Role Based E-Learning Profit CenterERP250 Role Based E-Learning FI OverviewERP251 Role Based E-Learning General Ledger Overview and Master DataERP252 Role Based E-Learning General LedgerERP253 Role Based E-Learning Billing OverviewERP254 Role Based E-Learning Accounts ReceivableERP255 Role Based E-Learning Financial Master DataERP256 Role Based E-Learning Accounts PayableERP257 Role Based E-Learning Cash ManagementERP258 Role Based E-Learning Financial ReportsERP259 Role Based E-Learning Asset Accounting OverviewERP260 Role Based E-Learning Asset Accounting Master DataERP261 Role Based E-Learning Asset Accounting DetailsERP262 Role Based E-Learning Asset Accounting ClosingERP270 Role Based E-Learning Travel Management OverviewERP271 Role Based E-Learning Travel ManagementERP280 Role Based E-Learning Funds Management (Funds Manager)ERP400 Role Based E-Learning MM OverviewERP401 Role Based E-Learning Material and Service Master DataERP402 Role Based E-Learning Purchasing OverviewERP403 Role Based E-Learning Vendor and Purchasing Information Master Data and Source List ERP404 Role Based E-Learning Purchasing Requisitions, Quotations & ContractsERP405 Role Based E-Learning MM ReportsERP406 Role Based E-Learning Inventory ManagementERP407 Role Based E-Learning MRP and Physical InventoryERP408 Role Based E-Learning Logistics Invoice VerificationERP450 Role Based E-Learning SD OverviewERP451 Role Based E-Learning Sales Order ProcessingERP452 Role Based E-Learning Customer Master DataERP453 Role Based E-Learning Quotation ManagementERP454 Role Based E-Learning Scheduling Agreements and ContractsERP455 Role Based E-Learning SD ReportsERP456 Role Based E-Learning Pricing Condition RecordsERP457 Role Based E-Learning Sales AgreementsERP458 Role Based E-Learning Backorder ProcessingERP459 Role Based E-Learning Outbound ProcessingERP460 Role Based E-Learning Billing ProcessERP461 Role Based E-Learning A/R and Credit ManagementERP462 Role Based E-Learning Credit and Risk ManagementERP463 Role Based E-Learning Credit ReportingERP900 Role Based E-Learning Order to Cash Overview IERP901 Role Based E-Learning Sales PersonERP902 Role Based E-Learning Sales Administrator IERP903 Role Based E-Learning Sales Administrator IIERP904 Role Based E-Learning Outbound Shipping ClerkERP905 Role Based E-Learning Billing EmployeeERP906 Role Based E-Learning Credit Analyst IERP907 Role Based E-Learning Credit Analyst IIERP910 Role Based E-Learning Procure to Pay Overview IERP912 Role Based E-Learning Requisition Clerk & Invoice Verification Clerk IERP913 Role Based E-Learning Invoice Verification Clerk IIERP914 Role Based E-Learning BuyerERP915 Role Based E-Learning Receiving ClerkERP920 Role Based E-Learning Controlling Process Overview IERP921 Role Based E-Learning Cost Center Analyst and Controller IERP922 Role Based E-Learning Internal Order AnalystERP923 Role Based E-Learning Product Cost Analyst IERP924 Role Based E-Learning Profitability AnalystERP925 Role Based E-Learning Product Cost Analyst II and Controller IIERP926 Role Based E-Learning Controller IIIERP930 Role Based E-Learning Financial Process Overview IERP931 Role Based E-Learning Accounting AnalystERP932 Role Based E-Learning Accounts Receivable and Accounts Payable Clerk IERP933 Role Based E-Learning Travel ManagerERP934 Role Based E-Learning Asset Manager IERP935 Role Based E-Learning Asset Manager IIERP936 Role Based E-Learning Accounts Receivable Clerk IIERP937 Role Based E-Learning Accounts Payable Clerk IIESA100 NetWeaver - ESA Enterprise Services Architecture (ESA) FundamentalsE2E050 Solution Manager E2E Solution Scope and DocumentationE2E300 Solution Manager E2E Solution Support - Integration & AutomationE2E400 Solution Manager E2E Technical Upgrade ManagementFIN009 Financials Corporate Governance Overview (Auditing and Sarbanes-Oxley Act)FIN090 Financials SAP Solution Overview for Auditing and the Sarbanes-Oxley ActFIN900 Financials Auditing of Financial Business Process in SAPFIN910 Financials Management of Internal ControlsFIN930 Financials Auditing with SAP Business Warehouse & Strategic Enterprise Management (BW /SEM)FS200 Industry SAP Banking OverviewFS210 Industry Loans Management for Financial ServicesFS220 Industry Credit Risk AnalyserFS225 Industry Collateral ManagementFS230 Industry Bank Customer AccountsFS240 Industry Profit AnalyserFS250 Industry Market Risk AnalyserFS251 Industry Asset Liability ManagementFS290 Industry Financial DatabaseFS291 Industry SAP Accounting for Financial InstrumentsFS300 Industry SAP for Insurance - OverviewFS310 Industry SAP Collections and Disbursements: OverviewFS315 Industry SAP Collections and Disbursements CustomizingFS320 Industry Incentive & Commission ManagementFS330 Industry SAP Claims Management - OverviewFS335 Industry SAP Claims Management - CustomisingFSC010 Financials Business Processes in Treasury and Risk ManagementFSC020 Financials Business Processes in SAP Credit Management, SAP Biller Direct, SAP Disput e and SAP Collections ManagementFSC120 Financials SAP In-House CashGRC200 Financials Manage Compliance with SAP E-Learning: Introduction to Virsa Compliance Ca librator v5.1GRC220 Financials Compliant Provisioning with SAP E-Learning: Introduction to Virsa Access E nforcer v5.1GTS100 SCM SAP Global Trade Services OverviewHR050 HCM Business Processes in Human Capital ManagementHR110 HCM Essentials of PayrollHR130 HCM Essentials of SAP Enterprise Portal in HCMHR250 HCM Employee Self-ServiceHR260 HCM Manager Self-ServiceHR270 HCM SAP Learning Solution OverviewHR275 HCM eLearning with SAP TutorHR290 HCM System Configuration for ESS/MSSHR305 HCM Configuration of Master DataHR306 HCM Configuration of Time RecordingHR310 HCM Time Evaluation with Clock TimesHR311 HCM Time Evaluation Without Clock TimesHR315 HCM RecruitmentHR316 HCM E-RecruitingHR325 HCM Benefits AdministrationHR350 HCM Programming in Human Capital ManagementHR400 HCM Payroll ConfigurationHR413 HCM Australian PayrollHR505 HCM Organiational ManagementHR506 HCM Advanced Organizational ManagementHR510 HCM Personnel DevelopmentHR515 HCM Training and Event ManagementHR540 HCM Enterprise Compensation ManagementHR550 HCM Personnel Cost Planning and SimulationHR580 HCM Analytics and Reporting in HCMHR940 HCM Authorisations in HCMHR990 HCM Technical Tips and Tricks in HCMIAU210 Industry SAPAutomotive: Processes in the Supplier IndustryIAU240 Industry SAPAutomotive: JIT ProcessesIAU260 Industry SAP for Automotive: Operational Procurement and Material Flow IAU290 Industry SAP for Automotive: Dealer Business ManagementICP310 Industry Sales & DistributionICP320 Industry Materials Management and Production PlanningICP500 Industry Beverage ProcessesIEG110 Industry Workshop: E-Government - Web RequestsIHE102 Industry SAP Campus Management: Managing a Student Life CycleIHE103 Industry Campus Management Workshop Configuration and ToolsIHE203 Industry Campus Management Student AccountingIMD320 Industry SAP for Media - Periodical Sales and DistributionIMD420 Industry SAP for Media - Advertising Management (Publishers)IMD500 Industry SAP for Media: Media Product Sales and DistributionIMD700 Industry SAP for Media – Intellectual Property ManagementIOG130 Industry Oil & Gas Industry Supply ChainIOG150 Industry Oil & Gas Industry Supply ChainIOG320 Industry Oil & Gas Exchanges BusinessIOG330 Industry Bulk Transportation and Shipment CostingIOG340 Industry Bulk SchedulingIOG350 Industry Service Station RetailingIOGW40 Industry SAP Joint Venture Accounting (JVA)IOGW50 Industry Remote Logistics management (RLM)IOGW60 Industry Production Sharing Accounting with SAP PSAIPS030 Industry PBC Commitment ProcessorIPS050 Industry PBC Organisation of Public ServicesIPS510 Industry SAP Public Sector Collection and DisbursementIPS640 Industry SAP Public Sector Records ManagementIPS810 Industry SAP Grants Management/ GranteeIPS910 Industry Funds Management: Processes, Organisation and Configuration SAPIRT Industry Retail Process OverviewIRT310 Industry Master Data in SAP for RetailIRT320 Industry Pricing and PromotionsIRT330 Industry Requirements/Planning/PurchasingIRT340 Industry Supply Chain ExecutionIRT360 Industry Store ConnectionIRT370 Industry SAP Retail StoreIUT110 Industry Introduction to IS-U/CCSIUT210 Industry Master Data and Basic FunctionsIUT220 Industry Device ManagementIUT221 Industry Work ManagementIUT225 Industry Energy Data ManagementIUT230 Industry Billing and InvoicingIUT235 Industry Real-Time PricingIUT240 Industry Contract Accounts: Recievable & PayableIUT250 Industry Customer ServiceIUT255 Industry Integration of SAP CRM and SAP IS-UJA100 NetWeaver - Web AS SAP J2SE FundamentalsJA200 NetWeaver - Web AS Java GUI KitJA300 NetWeaver - Web AS SAP J2EE Start-up KitJA310 NetWeaver - Web AS Java Web Dynpro BasicsJA312 NetWeaver - Web AS Advanced Java Web DynproJA313 NetWeaver - Web AS Java WebDynpro - Adobe FormsJA314 NetWeaver - Web AS Java WebDynpro - Business GraphicsJA320 NetWeaver - Web AS SAP Java Persistence FrameworkJA331 NetWeaver - Web AS SAP Java Open Integration TechnologiesJA340 NetWeaver - Web AS SAP NetWeaver Development InfrastructureMDM100 NetWeaver - MDM Master Data Management 5.5 SP04MDM101 NetWeaver - MDM Global Data SynchronisationMDM300 NetWeaver - MDM Master Data Management 5.5 SP04 Print PublishingMDM400 NetWeaver - MDM SAP NetWeaver Data Modeling in MDMNET200 NetWeaver - Web AS SAP Web Application Server: BSP Application Development NET310 NetWeaver - Web AS ABAP Web DynproNET311 NetWeaver - Web AS Advanced Web Dynpro for ABAPNW001 Overview Technology Solutions Powered by SAP NetWeaverOBA31S Industry SAP Bank Analyser 3OBW31S NetWeaver - BIT SAP BW 3.1COBW35S NetWeaver - BIT SAP BW 3.5OCB13S Industry SAP Core BankingOCD47S Industry SAP Coll. and Disbursements 4.72OCL47S Industry SAP Claims Management 4.72OCM41S Industry SAP Campus Management 4.71OCM42S Industry SAP Campus Management 4.72OCP20S Life-Cycle Data Management SAP cProject Suite 2.0OCP30S Life-Cycle Data Management SAP cProject Suite 3.0OCP31S Life-Cycle Data Management SAP cProject Suite 3.1OCR31S CRM SAP CRM 3.1OCR40S CRM Online Knowledge Product SAP CRM 4.0OCR50S CRM SAPCRM 2005OCR60S CRM SAPCRM 2006sODIMP5 Industry SAP DIMP 5.0ODIMPS Industry SAP DIMP 4.71OE4CS Industry SAPERP2004 - Corporate Services: Travel & Real Estate MgtOE4DSD Industry SAPERP2004 - Direct Store Delivery & BeverageOE4FIN Financials SAPERP 2004 - FinancialsOE4FS Financials SAPERP2004 - Financial ServicesOE4HCM HCM SAPERP2004 - Human Capital ManagementOE4OPS Industry SAPERP2004 - Operations / LogisticsOE4PS Industry SAPERP2004 - Public ServicesOE4SEM Industry SAPERP2004 - Analytics / SEMOE5CS Industry Corporate Services (Travel, Real Estate, Project Portfolio, Quality Mgmt. & E HS)OE5FIN Financials FinancialsOE5FS Financials Financial Services Industries (Banking, Insurance, FSCM)OE5HCM HCM Human Capital ManagementOE5MI Industry Manufacturing Industries (Catch Weight Mgmt., Chemicals, Mining, Oil & Gas) OE5PRC Industry ProcurementOE5PRD Industry Manufacturing Execution, Product Development & Enterprise Asset Management OE5PS Industry Public ServicesOE5RET Industry Retail / TradingOE5SEM Industry Analytics / SEMOE5SI Industry Service Industries (Media, Prof. Services, Telecommunications, Utilities) OE5SLS Industry Sales, Incentive & Commission ManagementOEP50S Netweaver - EP SAP Enterprise Portal 5.0OEP60S Netweaver - EP SAP Enterprise Portal 6.0 SP02OEP64S Netweaver - EP SAP EP 6.0 on SAP Web AS 6.40OERP4S Overview SAPERP 2004OFS20S Financials SAP FSCM 2.0OGT20S NetWeaver - Web AS SAP GTS 2.0OGT30S NetWeaver - Web AS SAP GTS 3.0OGT70S NetWeaver - Web AS SAP GTS 7.0OIN42S Industry SAP Reinsurance 4.72OLS20S HCM SAP Learning Solution 2.0OMA47S Industry SAP Media 4.72OMB03S Netweaver - MI SAP Mobile BusinessOMD55S Netweaver - MDM SAP MDM 5.5OME21S NetWeaver - MI SAP Mobile Engine 2.1OME25S Netweaver - MI SAP Mobile Infrastructure 2.5OMGD1S Netweaver - MI SAP MDM (GDS) 1.0OMI10S Financials SAP Management of Internal Controls (MIC) 1.0 OMM25S Netweaver - MI SAP Mobile Asset Mgmt. 2.5OMS10S Netweaver - MI SAP Mobile Sales Online 1.0OMT16S Netweaver - MI SAP Mobile Time and Travel 1.6OMU10S Netweaver - MI SAP Mobile Asset ManagementOOG47S Industry SAP Oil and Gas 4.72OPM47S Industry SAP Patient Management 4.72OPOB20 Industry SAP Price Optimisation for BankingOPS04S CRM SAP Prof.Services (Edition 2004)OR3E20 R/3 Enterprise SAP R/3 Enterprise Ext.Set 2.0OR3ENT R/3 Enterprise SAP R/3 Enterprise Ext.Set 1.10ORF04S SCM SAP RFID Enabled Supply ChainORF05S SCM SAP Auto-ID Infrastructure 4.0ORM21S Life-Cycle Data Management SAP Recipe Management 2.1 ORT47S Industry SAP RetailOSC40S SCM SAP SCM 4.0OSC41S SCM SAP SCM 4.1OSC50S SCM SAP SCM 5.0OSE32S SEM SAP SEM 3.2OSE35S SEM SAP SEM 3.5OSR20S Netweaver - Web AS SAP WebAS 6.40OSR30S SRM SAP SRM 3.0OSR40S SRM SAP SRM 4.0OSR50S SRM SAP SRM 5.0OTD07 Industry SAP Trade Delivery 2007OTE47S SRM SAP SAP Telecommunications 4.72OTPM1S Trade Promotions SAP TPMOUC10S Industry SAP Utility Customer E-Services 1.0OUT47S Industry SAP Utilities 4.72OWD10S Industry SAP Workforce Deployment 1.0OWS62S Netweaver - Web AS SAP Web AS 6.20OWS63S Netweaver - Web AS SAP Web AS 6.30OWS64S Netweaver - Web AS SAP Web AS 6.40OXE10S Netweaver - Web AS SAP xApp Emissions Management 1.0OXI20S Netweaver - Web AS SAP XI 2.0OXI30S Netweaver - Web AS SAP XI 3.0OXL10S Netweaver - Web AS SAP xApp Integration Exploration and Production (xIEP) 1.0OXP10S Netweaver - Web AS SAP xApp Product Definition 1.0OXQ10S Netweaver - Web AS SAP xApp Cost and QuotationOXR20S Netweaver - Web AS SAP xApp Res.& Program Mgmt. 2.0PLM100 Life-Cycle Data Management Business Processes in Product Life-Cycle Data Management (includes e-learning courses SAP125 and SAP130 )PLM114 Life-Cycle Data Management Basic Data for Manufacturing and Product ManagementPLM115 Life-Cycle Data Management Basic Data for Process ManufacturingPLM120 Life-Cycle Data Management Document Management SystemPLM130 Life-Cycle Data Management ClassificationPLM145 Life-Cycle Data Management Variant Configuration: Modelling and IntegrationPLM146 Life-Cycle Data Management Variant Configuration: Additional Functions and Scenarios PLM150 Life-Cycle Data Management Change & Configuration ManagementPLM160 Life-Cycle Data Management Recipe ManagementPLM200 Project Portfolio Management Business Processes in Project Management (includes e-lea rning courses SAP125 and SAP130 )PLM210 Project Portfolio Management Project Management - StructuresPLM220 Project Portfolio Management Project Management – LogisticsPLM230 Project Portfolio Management Project Management – ControllingPLM240 Project Portfolio Management Project Management - ReportingPLM280 Project Portfolio Management Resource Related BillingPLM281 Project Portfolio Management HR - Workforce Planning IntegrationPLM300 PLM Business Processes in Plant Maintenance (includes e-learning courses SAP125 and S AP130 )PLM301 PLM Customer ServicePLM305 PLM Managing Technical ObjectsPLM310 PLM Maintenance and Service Processing: PreventativePLM315 PLM Maintenance Processing: Operational FunctionsPLM316 PLM Maintenance Processing: Controlling and Reporting FunctionsPLM318 PLM Analytics in Enterprise Asset ManagementPLM320 PLM WCM Work Clearance ManagementPLM322 PLM Capacity Planning & Time Scheduling in PM ProjectsPLM330 PLM Service ContractsPLM335 PLM Service ProcessingPLM400 PLM Business Processes in Quality Management (includes e-learning courses SAP125 and SAP130)PLM412 PLM Quality Planning and InspectionPLM415 PLM Quality Management in LogisticsPLM420 PLM Quality Management in Discrete ManufacturingPLM421 PLM Quality Management in the Process Industry。
外文原文Development trend brief analysis of the networkcommunication softwareAlong with the development of the information science technology rapidly, the humanity will face the new technologies, new concepts one after another incessantly at any time. The development of the computer technology, the electronics industry, the network communication and the transmission technology apace, made the timely communication great progress at some fields, and the C/S structure as the representative.The Client - Server (C/S) technology evolves from the host computer technology which the single processor system generates naturally, which may trace to the computer origin. In the host computer technology, data in system processing and the management is all completed in the central. The host computer is revolving by the some periphery customer terminals which merely simply support information performance. In the period of the Client - Server technology, the client computer becomes the important processing resources. The client system processing speed rises unceasingly during the personal computer revolution. Now its processing speed might compare beauty with the small machine and the large-scale machinery before, even had surpassed them. At first in order to support the department and enterprise's data accessing, the Client - Server technical has supported to connect through the local area network (LAN) to the rear end large-scale machinery, the small machine and the workstation server system. The technology which Supports this kind of communication in the software level is called as the middleware. At first, the middleware is installed to support the Client - Server network communication conventional ability between the PC and the server platform. Along with the technical development, the middleware is embedded in the operating system gradually, so it became one kind of ordinary ability in the client platform and the server platform. The client system which the middleware has been embedded in supports to the application procedure service which are operated through the local and the network now. The evolvement from the Client - Server technology to the embedded ability increases a few challenges for the application system execution.Recently the Client-Server technology is being replaced gradually by the N-tier Object Oriented solution. The N-tier solution Based on the Java application procedure server has contained to support the thin client terminal user interface, strengthened the expandability and the reliability atthe same time. Now the interconnection network is mostly based on IPv4 protocol. The success of the protocol has facilitated the Internet rapid development. But, along with the Internet user quantity is increasing unceasingly and the application request of the Internet is enhancing, the want of the IPv4 is appearing gradually. Most incisive question is the growing huge demand of the Internet resources and the omen of the insufficient IPv4 address space. At present the IPv4 address has already assigned about 70%. Among it B kind of address already is exhausted. According to the IETF forecast, the IPV4 address resources will be exhausted in 2005 ~2010 year. Moreover, because the IPv4 address plan cannot support the address gathering commendably, the existing Internet is facing the pressure which the route table inflates unceasingly. At the same time, the demands of the service quality, mobility and security and so on are all urgent to develop the new generation of IP protocols.In order to settle Internet address crisis drastically, IETF has 128 bit addresses the IPv6 Internet protocol in the middle of 1990s early, and has carried on the further standardized work in 1998. Besides address space expansion, IETF made the definition to the IPv6 address structure. IETF assign the address which adopts the CIDR method in the IPv4 similarly. IPv6 has also provided the new characteristic to support the automatic disposition, the mobility and the security and so on better. At present, the main protocols of the IPv6 has matured already and has formed the RFC text, it already obtained the world consistent approval as the only substitute of the IPv4. The big communication facility merchants overseas all invested the massive resources in the IPv6 application and research, and developed the relevant software and hardware.Called the network file server, one of the most successful network technologies, comes from the Sun Microsystems Co. The Sun Microsystems Co. has become the actual standard successfully through providing the realized source code free reference technology visit authority on any platform. The network file server technology, another Sun Microsystems's technology, one of first generation of successful distributed computer technologies, is based on the open style network computation. The network file server is the technology based on the oriented-process, is held in the C programming language, like other important long-distance procedure call technologies (distributed computing environment). The two kinds of technologies all realize the document sharing ability widely. The database server technology provides that the different client platform access the long-distance database system by these lower levels distributed computing ability."Has the matter you Q I!", not long since this speech is widely popular both sides of the river during one night, becomes standard message while people leave. The only word witnesses the co-prosperity and co-indignity history of the timely communication and the Chinese Internet. That can’t deny that, the timely communication facilities which take the fast, interactive, easily as the representative, already became the network communication tool which the current network users mostly like. The other Internet increment services Based on the timely communications platform, like the phonetic, music order, information sharing and so on are also changing people's life style by the unprecedented speed.Along with Internet application is more and more rich in the years, "The Internet third war year" erupted drastically. After Tencent QQ have occupied the timely communication market 76.7%, Microsoft MSN, Net Easy POPO, Yahoo! Messenger, Skype and so on enter the market in abundance, strive to be the first strenuously.Firstly, the immediate communication application will be even more multiform.In later several years, people might the clearly feel that the chatted entertainment demand which the user demand timely communication is growing unceasingly, along with the timely communication facilities itself more and more richly. The application of the more prolific entertainment will already becomes the main development direction of the timely communication in future. In order to meet the user exuberant entertainment application need day by day, many timely communications services providers all develop the prolific application based on the timely communication platform, for example: The virtual image, the magic expression and the virtual pets and so on ,which the new application emerges one after another incessantly.Second, the timely communication even will be more and more absorbs the people’s attention, will manifest the community and InteractionThe analysis demonstrated, the reason that the timely communication is developing in recent years swiftly and violently, is the important impetus factor not only the its itself function but also the Internet rapidly gathering user. According to the CNNIC statistics report: the user accessed the internet is total to 87 million users in our country until June 30, 2004, the computers accessed the internet have achieved 36.3 million computers, the network application of the timely communication services like the email、the search engine、the browsing information and so on are going into to in web user's daily life in maximum.Following the Internet development and the network user demand, the comm- unity and the interaction which are absorbing a mass of users will also become the important development tendency of the timely communication.According to the concerned expert forecast that the network hypothesized life will become the hot spot of the Internet application in the future two or three years. The network user may have network life like the real life e.g. purchases homes, buys the vehicle, and raises the pet and so on. At the same time, the pure chatting tool is entrusting with the new connotation, becomes a rich individual space. There are not only the friends who may chat with you, but also games, news, community, diary and so on. The Internet enterprise sets up the alumnus in the network, founds community, provides the platform which composes the diary for the network user, lets the users establish their own blog. It is satisfied the network users’ demand to the network hypothesized life.The third tendency will be the even more outstanding function processing individual information of the immediate communication. Humanization will become the final factor of the immediate communication as the most quick and convenient communication tool. At present it already was applied widely to in the daily work and the study. The user had affiliated with and saved the massive materials document on the Internet every day. Therefore, as the transmission information terminal, the individual information processing function of the immediate communication will decide the itself vitality radically, which not only includes the information interactive function of the writing dialogue、the voice communication、the video intercommunion, but also includes the information sharing function of the file transfer and the transmission picture, meanwhile includes the effective preservation of the chatted recording, the down-transmission and download information management function.The fourth tendency is that the immediate communication even more emphasizes the Internet application conformity, the wireless Internet resources conformity in particular. Now the application of the immediate communication and the exchange of the Internet information already merged into one organic body, so the each kind of service of the conformity Internet will become the inevitable trend which the immediate communication future will develop, which satisfies the immediate communication users share the Internet resources. At present, Sina UC、the net easy hubble-bubble have the gateway website the formidable network resources, but Microsoft also is strengthening the gateway with the aid of MSN the influence. The immediate communication application will presentwith the traditional gateway website, motion or the fixed terminal, the network application increment service depth conformity tendency; in the wireless Internet resources conformity, the people hope to gets rid the " line" fetter and get the “wireless” freedom more and more, along with handset application is studied and developed unceasingly in the nearly two year in our country. The wireless accesses will become the network user’s pet. That the handset lands or accepts from the internet information is also to receive the user’s favor, especially the immediate information or news. In future the conformity between the Internet and the wireless net will be the inevitable home, the mutual connection between the immediate communication and the wireless will also be a way that must be taken. Along with 3G devotion, the immediate communication user's motion demand is higher; the immediate communication motion increment service will be able to develop one's ability to the full.The fifth tendency will be that the immediate communication even more manifests the security and the stabilityAccording as investigation demonstration, the user not only needs to realize the voice, audio frequency, video function and so on through the immediate communication ,but also the immediate communication security along with each kind of data service application increasing. ID robbed, privacy exposition, viral invasion and so on is puzzling all along. In particular to the enterprise users, if the security measure is unreliable, the enterprise will pay the huge price for the bug. Without a doubt, the safety has already become the basis of immediate communication safeguard foundation application in the future.Because the entire industry did not yet formulates the immediate communication security standard, the fad immediate communication soft wares at present are all the files access、the files transmission、the password input encryption simpleness, therefore which did not fully safeguard to user's use safety and privacy. QQ has adopted the design model of the advanced open secure system structure and 128 bit high strength encryption algorithm; it guarantee the security of the entire system through a series of complex shake-hand authentication mechanism. In future it will guarantee the QQ safeguard measures that the user is using of based on the existing foundation: One measure is that the local information memory and the network intelligence transmission encryption algorithm; Two measure is that more strengthens the user’s password security; Three measure is that more prevented the malicious link and the malicious virus spread through QQ. Thus it is obviousthat, although the technical support bases the safe foundation, the self-consciousness and the initiative of the protection user safety are especially important. In this aspect, the user is satisfied with the QQ pledge and performance. The tencent QQ Engineer explained the endeavor in the QQ security aspect in detail.From the birthday of the communication birth, the product stability is the concern user and enterprise in the extreme. In the present in the circumstances of the immediate communication application rapid development especially, the stability is the basis that the immediate communication guarantee user application, enhances product mucosity. Along with the unceasing breakthrough technical method, at present, the immediate communication product stability matures day by day, each kind of products of the immediate communication all can process any form document, the immediate transmission picture, the documents, the song and so on ,even can realize continues to transmit the information still after the network is off at little moment, for instance the break-point transmission function of the Tencent QQ is able to insure the stability of the transmission document effectively, and is unimpeded under any network environment ,has also become the first choice transmission document way of the immediate transmission users.The sixth tendency is that the amalgamation of the immediate communication between the social culture and the localization appliesAfter the immediate communication has already become one custom that the users intercommunicate by the immediate communication, the human hotspot gathering will enlarge the immediate communication product mucosity non-doubtfully. The immediate communication users all have 20 - 30 good friends averagely in the Chinese at present. If they lose this communication interaction platform, the relation between the good friends will also break off along with it. therefore it is identifiable that, the immediate communication will become one fashion gradually After it gathered the human hotspot, then became one kind of social culture phenomenon, The function of the group、the community and the abundant Blog can all help users to exchange the viewpoint and the view in the scope which may been extended. That it disseminates the correct cultural guidance and the value demand also is the important topic which the immediate communication development faces.Moreover, along with immediate communication product individual attribute strengthening and the application scope extending, the amalgamation between the immediate communication and thelocalization application will become product the main development tendency. This kind of amalgamation tendency will manifest firstly that the immediate communication service manages and analyses business to the local user resources, and understands the local cultural , as well as product application unceasing optimization based on local user demand foundation .In the next place this kind of tendency also lies in the conformity between the immediate communication and the local Internet, providing a higher value for the user together; Moreover, the localized tendency also will manifest in providing high quality service for the local subscriber.The experts in the domain express that the mature of the users and the technical progress actuate the industrial development like a double-frame-horse-drawn vehicle. The user demands appear diversiform、rich and colorful characteristic, but the network technology, the communication technology, the multimedia frequency technology and the network magnanimous resources also opened the condition for the Internet enterprises at the point that the users create value. Now it is the best opportunity that the immediate communication develop to the industrialization、standardization. It will become the luminescent spot of the Internet industry.中文译文网络通讯软件的发展趋势简析随着信息科学技术的迅速发展,人类每时每刻都会面对层出不穷的新技术、新概念。
Middleware and Management Concepts, Characteristics, and IntegrationDr. Sven van der Meer Telecommunication Software and Systems Group Waterford Institute of TechnologyVersion 1, 28/04/2003Waterford Institute of Technology / Telecommunication Software Systems Group1Integration of Management and MiddlewareDo current management frameworks offer answers to the new questions? Are they applicable for future applications, services, and resources? Answers to those questions can be given after analyzing current trends in communication and computing and after evaluating the actual level of interworking and integra-tion of management and middleware. Doing this, the answer is no, under most favorable conditions maybe.The current situation can be described by the interworking (not the integration) of middleware and man-agement systems. Furthermore, the available information sources within companies and organizations rely on many different solutions for storing data. They are still waiting to be harmonized. In short, this situation can be described as follows.1.Distributed applications can access classic management systems via ‘gateways’ that translatespecifications and interactions. Figure 1-1 shows an example where clients from the WWW1 manage resources via CORBA2. The figure shows the CORBA gateway to the management systems.[CORBA-MAN]2.Legacy management systems are used to manage distributed applications. Providers and opera-tors use their running management systems to administrate distributed applications. Thus, the in-vestment for the education of this staff is not wasted but reused for distributed applications.[CORBA-TMN]3. A few middleware concepts and many different products are used in parallel. Most of themprovide mechanisms for interworking (that means for the invocation of operations and the exchange of information). The information exchange often needs an informal agreement of developers on se-mantic. Each middleware concept includes basic management functionality on object level (e.g.based on the clustering concepts of ODP3; [Raymond95]). Furthermore, “middleware developers strive to support applications that meet the technical challenges of ubiquitous computing” [Geihs01].4.Service platforms form a layer of abstraction enabling service creation and deployment, monitor-ing of distributed applications, and integration of legacy systems. Within those platforms, the man-agement of services is included by means of the support of tools for the definition of services and business roles, an execution environment for services, and the management of the platform itself.[Funabashi00] [Magedanz01]Figure 1-1: Distributed Applications accessing classic Management Systems [NMF-GB909]1 World Wide Web2 Common Object Request Broker Architecture3 Open Distributed ProcessingWaterford Institute of Technology / Telecommunication Software Systems GroupManagement is defined as all activities needed to operate communication networks and services in a se-cure and effective way. It identifies methods and provides tools to support configuration, monitoring, maintenance, and administration of these networks and their services. The target vision is to support user and provider in planning and operating networks and distributed systems. Nevertheless, middleware and service platforms do not reflect management standards sufficiently. Each of them comes with a new con-cept for managing objects or services. Furthermore, development of middleware does not follow man-agement principles. The components object specifications, protocols, and data formats are designed spe-cifically to support distribution. Here, an integration of management concepts into these components can be an important step. [Hegering99]Distributed applications define new requirements, which middleware and management need to address. Applications and devices are not realized with a single technology. Devices and network appliances need to be accessed in a technology independent manner. Specifications must be independent of dedicated vendors. At the same time, the support of autonomy of operators and vendors is needed to enable them to offer clearly distinguishable products. These are basics for cooperative environments in a competitive world.2Characteristics of MiddlewareThe term middleware is used today to describe any technology that provides an abstraction from the het-erogeneous components of computer environments, like hardware platforms, networks, protocols, operat-ing systems, applications, groupware, and databases. Middleware ties components of a distributed appli-cation together and solves the problem of scalability. It supports application deployment using well de-fined, probably standardized, Application Programming Interfaces (API). Those APIs and related inter-faces decouple the applications from technologies as shown on Figure 2-1.Figure 2-1: Middleware – Logical View of Middleware Two different types of middleware are present: Inter Process Communication (IPC) and Distributed Transaction Processing (DTP). IPC based middleware systems operate with a direct communication among distributed components. Members of IPC based middleware are Remote Procedure Call (RPC) middleware, Message Oriented Middleware (MOM), and Object Request Broker (ORB).DTP based middleware realizes the link between a client and any kind of database. Those middleware systems define abstract interfaces to databases for handling transactions and concurrency. Members of DTP based middleware are portable Transaction Processing (TP) Monitors and interconnected Database Management Servers (DBMS).2.1.Paradigm of Client – ServerDistributed object communicate in a client/server relationship. The client calls operations on a server and receives return values. The server offers those operations on its interface(s), runs the business logic once an operation is called, and generates the return value. The technical realization of interfaces and the communication is task of a middleware.Waterford Institute of Technology / Telecommunication Software Systems GroupFigure 2-2: Middleware – Distributed Objects The actual relationships between distributed objects are not defined by the paradigm. Each object can access each other object. The definition of the relationships needs to be done in the development process of the distributed application. Hierarchical structures are not supported. They need to be realized indi-vidually.2.2.Message Oriented MiddlewareMessage Oriented Middleware accomplishes the communication of application components through the exchange of records called messages. Messages are strings of bytes that have meaning to the applications that exchange them. MOM is event-driven. It can support asynchronous as well as synchronous commu-nication. However, there is no general standard or common set of specifications. At least three different techniques for the exchange of messages are available.Message passing applies a direct communication model. A message is sent directly from one application to another. The model is connection-oriented. A logical connection between applications needs to be es-tablished. The exchange of messages can be either asynchronous (via a polling model or by call back routines) or synchronous (sender blocks until a message is returned).Figure 2-3: Middleware – Message Queuing Message Queuing applies an indirect communication model. Applications communicate via a message queue. This model is connectionless. Messages are put in queues for immediate or subsequent delivery. A Queue Manager is responsible for message handling and delivery. Message queuing implies the support for different types of Quality of Service (QoS), such as reliable message delivery (no packet loss on the network), guaranteed message delivery (messages are delivered immediately or eventually, at least after a specified period of time), and assured non-duplicate message delivery (message are delivered only once). Publish and Subscribe is based on trading. Publishers produce information and offer them. Subscribers sign in to certain topics and receive messages. Publishers and Subscribers usually do not know the exis-tence of the other. Applications can be loosely coupled increasing the flexibility of the design and opera-tion of a system. Those systems can be reconfigured dynamically without interrupting operations. New applications can be added without disturbing existing applications.Waterford Institute of Technology / Telecommunication Software Systems Group2.3.Remote Procedure CallThe Remote Procedure Call is a common accepted and widely used technique for the communication between applications in distributed environments. All major operating systems support client/server communication via logical RPC interfaces. That is, clients and servers have local, logical interfaces that are called stubs. Those stubs realize proxy objects for remote functions. To the client, the stub looks like the remote procedures thus providing location transparency (hiding the actual location of the server).The logical function calls on the RPC interface are mapped to physical invocations on the stub. The later one has the knowledge on how to access the network’s transport layer to send the request to the server and to receive the reply for the client. The client itself usually blocks until the server replies to the remote call. On server side, the stub calls the requested function (procedure) as if the client would have done if called locally. The programmer of the server has to provide some functionality to support a remote call, like directory, security, etc.Figure 2-4: Middleware – Remote Procedure Call To use the network’s transport layer for data exchange between client and server, the data has to be streamed through a communication channel. The serialization of the data for the transport inside of the network is called marshalling. The serialization requires that all data to be transported be pre-described, including type, format, and length. Such a description is to be provided by the programmer of the server in form of an interface definition using an Interface Definition Language (IDL). An IDL is a high level, universal notation that is capable to describe interfaces independent of the actual programming language.2.4.Object Request BrokerObject Request Brokers can be classified into a group compliant to the Object Management Group’s CORBA4 and one compliant to Microsoft DCOM5. In the following, the generic ORB architecture is viewed that is the basis for both.The ORB is a software component that enables objects to initiate requests and to receive responses. All inter-object communication happens via the ORB, independent of the actual location of the objects (local or remote). The ORB enables objects to communicate over networks with different communication proto-cols and to reside on different hardware platforms. It provides the mechanisms by which objects make requests and receive responses. Furthermore, it is responsible for managing and locating the objects, sup-porting both inter-object communication and communication between objects and external services.Most ORB products provide a set of components that is specified by the Object Management Group (OMG). At first, an IDL is used as notational language to describe interfaces of objects. It is implementa-tion-neutral and needs specifications for the mapping to implementation languages. An Interface Reposi-tory contains all IDL definitions for attributes, operations, user-defined types, and exceptions. The Basic Object Adapter (BOA) represents the interface between the ORB and server applications. It dispatches objects that the server application maintains, and exchanges messages with the server objects. The Static4 Common Object Request Broker Architecture5 Distributed Component Object ModelWaterford Institute of Technology / Telecommunication Software Systems Group Invocation Interface (SII) is a stub-based interface used by client programs in order to invoke services on application objects. Finally, the Dynamic Invocation Interface (DII) provides a generic interface that does not require stubs, but supports dynamic construction of object invocations by the client program at run-time.The ORB establishes a client/server relationship among objects. A client can transparently invoke any method on any server object. The ORB intercepts the call, seeks for an object that has implemented the call, passes the parameters to that object, invokes the method, and returns the result. Clients can invoke either ‘one way requests’ when no result is expected or synchronous requests.The ORB itself is responsible to locate the server object by use of the implementation repository, to ex-change data between client and server (including marshalling), to invoke the server (dynamic server invo-cation), and to recover from failures of the server object. The ORB provides objects with services like naming, lifecycle, property, relationship, query, and licensing.2.5.Distributed Transaction ProcessingTransaction Processing has been used for mainframe-based applications where TP Monitors have man-aged the limited number of connections to databases. They acted as connection concentrator reducing overhead and increasing performance of database access. Today, TP Monitors are the only solution for transactional integrity in database environments. They support the so-called ACID properties that de-scribe the quality of transactions:•Atomicity: All operations that an application performs, which involve updates to any kind of re-source, are grouped into a "unit of work." This unit is referred to as atomic, meaning it is indivisible.Any partial completion (due to system failures) will be rolled back.•Consistency: At the end of a transaction, all resources that have participated will be in a consistent state.•Isolation: Concurrent access to shared resources by different units of work (performed by different applications) is coordinated so that they do not affect each other. Transactions that compete for re-sources are isolated from each other.•Durability: All updates to resources that have been performed within the scope of a transaction will be persistent or durable.The standard for DTP represents a basis for TP Monitor products. It allows programmers to share re-sources keeping the overall system in a consistent state. Databases are connected to the TP Monitor via a standardized interface called XA. Applications use the TX interface to communicate with the TP Monitor. The Standard Transaction Definition Language (STDL) provides a TP Monitor independent API in form of a higher layer, procedural language for the description of transactions.3Characteristics of ManagementManagement is needed to control and to optimise the operation of a network and offered services, and to respond to changing user requirements. Management contains all activities for the secure and effective operation of networks and services. Those activities are methods and tools for the initialisation, monitor-ing, maintenance, and administration of network functions, services, and application components. Man-agement activities can be performed explicitly by human operators or automated by dedicated software modules. Management systems support different independent actors that want to co-operate (support of autonomy and co-operation), large amount of involved components (scalability), huge variety of em-ployed systems and components (vendor independence, standard based management), and frequently changing systems and components (reusability of management concepts, support of the whole lifecycle of network equipment and services).Several approaches are in use for the development of management systems responsible for complex man-agement activities:Waterford Institute of Technology / Telecommunication Software Systems Group•Top-Down Approach: The analysis of the requirements the system to be managed leads to specifica-tions of business roles (data), functional processes and services (function), and network locations where the business operates (communication).•Partitioning: The task of managing a complex system is subdivided in to several domains for the delegation of management responsibilities. Domains can be service oriented (signalling network, packet switched network), functional areas (FCAPS6), layers from the RM-OSI7 (vertical manage-ment of (N)-Layer), layers from TMN8 (vertical management of business, services, networks, and network elements), geographical (horizontal), and business domains (horizontal).•Object-oriented: Distributed applications and management components are as dissociated as possible (almost no overlap in functionality) with simple interfaces (making them reusable). Information is exchanged in form of standardized messages in an abstract form that is independent of the internal structure of the object.•Views: Management systems can be specified for example following the guidelines of Open Distrib-uted Processing (ODP) or the Telecommunication Information Networking Architecture (TINA) and its Management Architecture.Each approach can be used separately or in combination with other approaches to define a reference model for a management system. Such a reference model includes definitions for the management infor-mation, management services, and management applications. Care has to be taken in order to optimise the depth of partitioning and decompositions. If that process remains too abstract, the reference model may become useless. If it becomes too detailed, the reference model might not be universal and extensible enough, and may not have the ability to evolve as the managed systems evolve.3.1.Management ArchitecturesManagement architectures have the task to provide a principle order of functionality and information specifications for a management system. They enable a high level abstraction for designers of manage-ment applications and provide guidance for the design of management protocols and services. They con-sist of concepts (like simplicity or openness), rules specifying how to use the concepts, and models visu-alizing how an application of the concepts and rules can lead to design specific classes of management systems.Classical management architectures are the Simple Network Management Protocol (SNMP), the OSI Management (X.700), and the TMN. Other developments have spent huge effort to reuse concepts and rules from those management architectures for a specific application domain. The Object Management Architecture (OMA) responses to the requirements object-oriented distributed applications. TINA speci-fies telecommunication service platforms. Mobile Agent based management realizes management by delegation with mobile code segments. Directory-enabled Networks (DEN) harmonise classified data-bases. Web-based Enterprise Management (WBEM) aims to manage business processes and value chains on top of distributed objects and management systems.3.2.Paradigm of Managers and AgentsManagement architectures are based on the well-accepted paradigm that management information is ex-changed among Managers and Agents, as shown in Figure 3-1. Managers are software systems, respon-sible for the communication with agents to retrieve information about their state and to change the state, the storage of the obtained information and own activities in adequate databases, and the provision of the stored management information to administrators (through user interfaces) or to senior management sys-tems. An Agent is a software module of a certain network component (e.g. a bridge / router) entrusted6 Fault, Configuration, Accounting, Performance, and Security7 Reference Model for Open System Interconnection8 Telecommunication Management NetworkWaterford Institute of Technology / Telecommunication Software Systems Group with the supervision, configuration, and control of the entities of resources and the connection with the related manager and the transmission of the requested information to the manager.Figure 3-1: Management – Manager and Agent Role [Badach94] Network Components are modelled as managed objects. They represent an abstraction of physical (net-works, interconnection equipment, customer premises equipment) or logical (protocol stacks, switch-ing/routing tables, status information) resources. Managed Objects (MO) can be accessed via a virtual information store, termed the Management Information Base (MIB). Objects in the MIB are specified using abstract notations. Each object type is identified by a unique and administratively assigned name. A set of objects forms a module in the MIB that provides access to management information for a clearly defined domain (e.g. monitoring or accounting).Figure 3-2: Management – Management Hierarchy Managers and agents exchange information in form of operations and notifications. In combination with managed objects, they build hierarchies. This hierarchical management model is shown in Figure 3-2. It describes a hierarchy of entities in the role of managers, local managers, agents, sub agents, and managed objects. Each managed object is assigned to exactly one agent. In distributed environments, a managed object might be assigned to multiple agents, too. A number of agents can be arranged in the hierarchy among managed objects and managers. Local managers and sub agents are introduced to allow the forma-tion of domains (organizational, geographical).Waterford Institute of Technology / Telecommunication Software Systems GroupA manager needs to be provided with the knowledge of each entity of the underlying hierarchy, their con-figuration functions, and their relationships to each other. Managers offer management operations that combine multiple configuration functions of subordinate managers, agents, and managed objects to units of work (also called transactions). Graphical User Interfaces (GUI) or superior management systems can use these management operations to perform complex management tasks in a simple way.An agent is responsible for the controlling of assigned sub-agents and managed objects. This includes the evaluation (e.g. authorization checks) of management operations and their forwarding to the configuration functions of managed objects, as well as the processing of notifications and their transfer to addressed managers.3.3.Management ModelsThe specified concepts and rules of a management architecture form architectural models. Management architectures differ in the terminology for their models. However, management architectures contain at least definitions that can be grouped into four models: Information Model, Functional Model, Communi-cation Model, and Organizational Model. All those models are related to a specific part of the general Manager-Agent paradigm, as shown in Figure 3-3.rmation ModelThe Information Model provides notational techniques for management information, specifications of managed objects, and specification of MIBs. Hereby, an object is a collection of behaviours that share the same state. A state describes a stable internal condition of an object. The behaviour explains a change in the state of an object. Attributes are a set of data values and qualifiers over those data values with fixed semantics. An operation of an object is a behaviour, normally initiated by the reception of a notification.A method is the implementation of a behaviour and parameters are data values with the syntax conform to a prescribed protocol. An event is an autonomous behaviour signalled by the emission of a notification.Figure 3-3: Management Models3.3.2.Functional ModelManagement is required for a number of purposes categorized into a number of functional areas: fault, accounting, configuration, performance, and security management. These areas have been recommended by OSI management. Specific management functions, within these functional areas, are provided by OSI management mechanisms. Many of the mechanisms are general. Similarly, managed objects are general in the sense that they may be common to more than one functional area.munication ModelThe communication between a manager and an agent is done by the exchange of management informa-tion in form of operations and notifications. The manager requests certain behaviour via an operation andthe agent can use notifications to inform the manager about detected events. Therefore, communication between managing entities is done through status requests, the exchange of control information, and event notification. The communication model provides guidelines for the identification of communication par-ties, specifies mechanisms for the communication between them, and defines formats for syntax and se-mantic of the communication.3.3.anizational ModelThe organizational model depicts concepts for the adaptation of the management architecture to the or-ganizational structure of an enterprise. This can be related to a certain business role the enterprise is act-ing in (service provider, network operator), to domains (e.g. the management of groups of resources in a room, a floor, a building), or to management policies.3.4.Character of Management SystemsFollowing the rules and concepts of management architectures, a real management system can be de-signed and implemented. The first solutions have realized a centralized approach, where one manager controls the entire network. These solutions have proven to be unable to efficiently manage even small networks and a few services. New approaches provide distribution for the configuration of managers and agents, the definition of policies to decouple management functionality that can be further distributed, handle the reuse existing resources like directories, and include emerging technologies like the World Wide Web to perform management.Hierarchical Management means to subdivide management intelligence in a strict hierarchy of man-agement applications. Manager requests operations on Local Managers, which forwards those requests to other Local Managers or Agents. The structure of an enterprise management system can now include the organizational requirements of a central system administration group and administrative domains for spe-cific management functionality.Distributed Management goes to rearrange to location of management intelligence from one central point inside of a network to different, separated computer systems or hosts, management applications, and management domains. The available resources are used in a more efficiently way and the scalability of the management, as the network or applications grow and change, guaranteed. Management applications can be loosely coupled to operate in co-operation or independently from each other.Policy-based Management means to establish rules (policies) that the network and applications can act on in response to changing conditions. This includes the profiling of users, services, and applications to determine appropriate QoS levels.The idea of Directory Enabled Networks is based on the OSI Directory [ITU-X500] and the develop-ment efforts spend on the Light-weight Directory Access Protocol (LDAP) [IETF-RFC1777]. The target vision is to unify the many kinds of directories used in enterprise networks by means of user interfaces, data formats, data duplications, data inconsistencies, and synchronization. The outcome should be a global directory as a single point of data access with a well-agreed structure. This global directory can be administered locally similar to X.500 sub trees.Web-based Enterprise Management realizes the conception of so-called thin clients that gain access to network elements or services. Many network elements already provide interfaces for web browsers. The programming language Java, fully integrated into the World Wide Web (WWW), promises to provide the flexibility needed at the clients side.。