You are previewing Guidelines for Application Integration.
O'Reilly logo
Guidelines for Application Integration

Book Description

Learn best practices and proven techniques for integrating disparate enterprise applications into solutions that work together to address ever-evolving business needs, extend IT investments, and improve ROI.

Table of Contents

  1. Guidelines for Application Integration
    1. SPECIAL OFFER: Upgrade this ebook with O’Reilly
    2. 1. Introduction
      1. Who Should Read This Guide
        1. Prerequisites
      2. How This Guide Is Organized
        1. Chapter 1: Introduction
        2. Chapter 2: Defining Your Application Integration Environment
        3. Chapter 3: Security and Operational Considerations
        4. Chapter 4: Using Microsoft Technologies for Application Integration
        5. Appendix: Application Integration Capabilities
      3. What Is Application Integration?
        1. Benefits of Application Integration
        2. Types of Application Integration
          1. Manual Application Integration
          2. Semi-Automated Application Integration
          3. Fully Automated Application Integration
        3. Choosing the Right Types of Application Integration
        4. Making Application Integration Scalable
          1. Point-to-Point Model
          2. Integration Hub Model
          3. Choosing an Application Integration Model
      4. Requirements for Application Integration
      5. Implementing Application Integration
        1. Web Services
        2. Extract, Transform, and Load
        3. Communications Message Protocols
        4. Screen Scraping
        5. Program Calls
        6. Direct Data Access
        7. File Transfer
        8. Human Involvement
      6. Challenges of Application Integration
        1. Technical Issues
        2. Organizational Issues
      7. Summary
    3. 2. Defining Your Application Integration Environment
      1. Levels of Application Integration
        1. Business Process – Level Integration
          1. Defining Your Business Processes
          2. Business Process Modeling
            1. Modeling Simple Business Processes
          3. Business Processing Standards
          4. Mapping Business Requirements to Your Application Integration Requirements
          5. Business Processing Integration Capabilities
        2. Data-Level Integration
          1. Data Integration Capabilities
        3. Communications-Level Integration
          1. Enabling Communication Between Applications
          2. Communications-Level Capabilities
      2. Important Considerations for Application Integration
        1. Using Synchronous and Asynchronous Communication
        2. Increasing Automation
          1. Straight-Through Processing (STP)
            1. Business Processing Capabilities Used in STP
            2. Data Capabilities Used in STP
            3. Communications Capabilities Used in STP
        3. Ensuring Data Integrity
          1. Data Synchronization
            1. Business Processing Capabilities Used in Data Synchronization
            2. Data Capabilities Used in Data Synchronization
            3. Communications Capabilities Used in Data Synchronization
        4. Managing Latency
          1. Concurrency Issues
            1. Pessimistic Concurrency
            2. Optimistic Concurrency
            3. Business Actions and Journals
          2. Data Aggregation
        5. Combining Application Functionality
          1. Application Composition
            1. Business Processing Capabilities Used in Application Composition
            2. Data Capabilities Used In Application Composition
            3. Communications Capabilities Used in Application Composition
        6. Managing Transactions
          1. Providing ACID Transactions
          2. Transactional Messaging
          3. Two-Phase Commit
          4. Transaction Compensation
          5. Long-Running Transactions
            1. Timed Transactions
      3. Summary
    4. 3. Security and Operational Considerations
      1. Security Considerations
        1. Security Policy
        2. Security Capabilities
        3. Defining Your Security Requirements
          1. Authentication
          2. Authorization
          3. Security Tokens
          4. Security Context Management
          5. Information Protection
          6. Web Services Security
      2. Operational Management Considerations
        1. Defining an Operational Management Policy
        2. Operational Management Services
        3. Defining Your Operational Management Requirements
          1. System Monitoring
            1. System and Application Health Monitoring
            2. System and Application Performance Monitoring
            3. Security Monitoring
          2. Business Activity Management
          3. Event Handling
          4. Change and Configuration Management
          5. Directory
      3. Summary
    5. 4. Using Microsoft Technologies for Application Integration
      1. Microsoft Technologies Used for Application Integration
        1. BizTalk Server 2004
        2. Host Integration Server 2000
        3. SQL Server 2000
          1. Data Transformation Services
          2. Analysis Services
        4. Windows Server 2003
          1. Active Directory
          2. Internet Information Services
          3. Message Queuing and MSMQT
        5. XML Technologies
          1. XML Parser
          2. XSLT
          3. Web Services
          4. Web Services Enhancements
        6. Windows SharePoint Services
        7. Microsoft Operations Manager
      2. Mapping Microsoft Technologies to Application Integration Capabilities
        1. Business Process Integration Capabilities Provided by Microsoft Technologies
          1. Rules Processing
          2. Transaction Management and Compensation
          3. Human Workflow Services
          4. Orchestration
          5. State Management
          6. Event Processing
          7. Schedule
          8. Contract Management
        2. Data Integration Capabilities
          1. Data Validation
          2. Data Access
          3. Schema Definition
          4. Data Transformation
        3. Communication Capabilities
          1. Message Routing and Message Forwarding
          2. Message Delivery
          3. Message Queuing
          4. Message Correlation
          5. Addressing
          6. Transactional Delivery
          7. File Transfer
          8. Serialization/Deserialization
          9. Request/Reply
          10. Batching/Unbatching
          11. Encode/Decode
          12. Connection Management
          13. Protocol Bridging
        4. Security Capabilities
          1. Authorization
          2. Authentication
          3. Information Protection
          4. Identity Management
          5. Nonrepudiation
          6. Profile Management
          7. Security Context Management
        5. Operational Management Capabilities
          1. Business Activity Management
          2. Event Handling
          3. Configuration Management
          4. Directory
          5. Change Management
          6. System Monitoring
      3. Summary
    6. A. Application Integration Capabilities
      1. Business Processing Capabilities
        1. Orchestration
        2. Event Processing
        3. State Management
          1. Process State
          2. Message State
          3. Service State
        4. Schedule
        5. Business Transaction Management
        6. Rules Processing
        7. Workflow
        8. Contract Management
      2. Data Capabilities
        1. Schema Definition
        2. Schema Recognition
        3. Mapping
          1. Field Mapping
          2. Semantic Mapping
        4. Data Validation
        5. Data Transformation
          1. Data Aggregation/Disaggregation
          2. Data Enrichment
          3. Data Filtering
        6. Data Access
          1. Dynamic Data Access
          2. Staged Data Access
          3. File/Database Access
      3. Communications Capabilities
        1. Request/Reply
        2. Connection Management
        3. Message Routing
        4. Addressing
          1. Direct Addressing
          2. Indirect Addressing
            1. Publish/Subscribe Addressing
            2. Content-Based Routing
        5. Message Forwarding
        6. Message Delivery
          1. Multicasting
          2. Single Casting
        7. Message Queuing
        8. Message Instrumentation
        9. Message Correlation
        10. Serialization/Deserialization
        11. Transactional Delivery
        12. Batching/Unbatching
        13. Encode/Decode
        14. File Transfer
      4. Security Capabilities
        1. Authentication
        2. Authorization
        3. Identity Management
        4. Security Context Management
        5. Profile Management
        6. Information Protection
          1. Encryption
        7. Nonrepudiation
      5. Operations Capabilities
        1. System Monitoring
        2. Event Handling
        3. Business Activity Management
        4. Configuration Management
          1. Versioning
          2. Automated Provisioning
          3. System Configuration Snapshot
          4. Configuration Verification
        5. Change Management
        6. Directory
    7. B. Additional Resources
    8. Index
    9. SPECIAL OFFER: Upgrade this ebook with O’Reilly