摘要:
Maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.
摘要:
Software services for a business are identified. The goals for the business to meet its objectives are identified. Sub-goals are then identified recursively until services can be identified for fulfilling each of the sub-goals. Performance indicators are identified for each of the sub-goals. Each indicator has a metric identifying the type of measurements that need to be collected to assess the state of the corresponding indicator. Services and indicators are entered in a services portfolio database. A services solution for the business is then implemented using a services oriented architecture using the services in the portfolio.
摘要:
A business enterprise is assessed by a consultant using a computer implemented tool for practicing component business modeling techniques. The tool builds a map of components, filters the map to form a heat map and identifies collaborations. Key performance indicators are evaluated.
摘要:
Assigning security levels to a shared component is presented. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.
摘要:
Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.
摘要:
Candidate services are identified using goal-service modeling or other techniques. A candidate service is tested using a business alignment test, a composability test, an externalized service description test, and a redundancy test. When all tests are successfully passed, the candidate service is exposed for use in a client solution, such as implementation as a service-oriented architecture.
摘要:
A business enterprise is assessed by a consultant using a computer implemented tool for practicing component business modeling techniques. The tool builds a map of components, filters the map to form a heat map and identifies collaborations. Key performance indicators are evaluated.
摘要:
An assessment of a business is performed using a computer implemented tool to provide a strategy model, an operating model, and an IT model. The assessment is performed by a services providing company for a client company. The assessment is used to create a SOA solution for the business. The services providing company may also implement the SOA solution for the business.
摘要:
A business consulting company performs an assessment of a client business enterprise. The assessment includes use of a computer implemented tool for performing business component modeling techniques for creating a heat map. The heat map is used with the tool to form a domain decomposition, form a goal-service modeling structure, and perform an existing asset analysis based to linkages to the heat map. The assessment is delivered to the client company. A service oriented architecture, SOA, solution plan based on the assessment may also be delivered. The consulting company may implement the SOA plan for the client.
摘要:
Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.