Index


 
Numerics

9/11 80

 
A

abstraction layer 218
academia 80
academic research 81
accounting departments 132
ACORD 47
adaptive infrastructure 45
administrator 132, 136
agile 103
agility. See business agility
agnosticism. See vendor neutrality
airline 78
alliances 73
application 153, 191
development 192
proxy 119
server 184
users 152
application server xxvii
architects council 196, 219, 226, 232
architecture 50, 75, 198, 217
AS/400. See IBM AS/400
ASP 66, 213
ATM 14
attacks. See malicious attacks
audit reports 123
audit trail 114
auditability 69
auditing 114, 123
authentication 110, 113, 117–119, 124, 147
authorization 110, 113, 119
authorized users 117
availability 136

 
B

B2B 73, 147
commerce 73
backup computer 136
bad guys 110
BAM. See business activity monitoring
bank accounts 87
batch upload 100
BEA 3, 214
best of breed 183
best practices 191, 198, 213, 215
binary security mechanism 112
binding 31
Biomedical informatics 81–82
BLAs. See business level agreements
BPM 86
BPM. See business process management
breaking down barriers 191
brokerage account 99
browsers 31, 164
budget xxxiv, 60, 230
budgets xxv
business activity monitoring 90–92
program 91
business agility 38, 103
business analytics 92
business architecture 50
business driver 85
business goals 202
business initiatives 198–199
business justification 85
business logic xxxv, 5, 179, 204, 216
Business Objects. 106
business process 85, 87–88, 192, 203, 214
audit 226
flexibility 79
models 200
optimization 86, 95
process definition 201
SOA best practices 198
supply chain 75
business process management 86, 91, 96
business requirements 192
business-level agreements 106

 
C

C 68
C# 34
C++ 14, 45, 66
CA. See certificate authority
cache 133
calendars 64
call and response 14, 24
cancer 82
candidates for exposure as web services 203
capacity 154
car rental 78
certificate authority 121, 125
certificates 116, 120
chain management 110
change management 62, 76, 79
SOA Networks 143
SOAP Interception 135
Web Services Management 129
charge-backs 142
chief enterprise architect 231
chief information officer (CIO) 49
choosing a pilot project 214
CIA 80
claims payment check-printing system 168
claims processing system 168
client/server 14
application 192
architecture 21, 38
Clinger-Cohen Act 80
COBOL 40, 68, 190, 214
code 192
Cognos 106
collaboration 80–81
COM 213
Common Business Oriented Language. See COBOL
competitive bidding 74
compliance xxxiv, 116
conflict 69
consultants 226
consumer 140, 220
See also Web service consumer
consuming application 204
See also Web service consuming application
consumption
scenarios 204
use cases 208
content 63–64, 72
context 128, 135
sensitivity 128
continuous learning 188
contract management 119
contracts 133, 142
converting to an SOA 74
CORBA 16, 168
correlate 89–90
cost cutters 152
counterterrorism 80
credentials 117
credit cards 87, 147
processing 91, 169
crime 113
critical path 230
CRM. See customer resource management
cryptography 120
CSR. See customer service rep
custom code xxxvi, 218
custom interfaces xxxvii, 163
custom programming 101
custom-coded 8
portal 64
custom-developed code 10
customer acquisition 87
customer portal 180
customer resource management 59, 61
customer service 127, 164
customer service rep 23, 26, 127, 199
customer-supplier relationships 74

 
D

dashboard. See enterprise management dashboard
data dumps 101
data envelope. See SOAP envelope
data exchange 37, 99, 101
data warehouse xxvii, 89, 91, 105
data wrapper 28
database 12, 33, 80, 82–84, 165
database management system. See DBMS
DB2 146
DBMS 146
DCE. See distributed computing environment
DCOM 16
deadlines 200
decrypt 121
defense 3
delayed
data transfer 99
demand 157
denial of service attacks 123
deployment 198
deposit 98
design specifications for Web service 193
desktop xxx, 164
detection 144
developers 194, 198
development 216
environment 184, 192
fees 10
platforms 213
process 220
tools 110
DIF 19
digital signature 120, 122
distributed architectures 24
distributed computing 4–5, 7, 24–26
distributed computing environment 12, 22, 25, 57
distributed process 22
distributed systems 98, 108
domain 218
DOS 114
DoS attack. See denial of service attack
downtime 152
DSOM 16

 
E

EA. See enterprise architecture
EAI. See enterprise application integration
EAP. See enterprise architecture planning
eavesdropping 113, 116
ebXML 40
EDI 39–40, 47
EDI. See electronic data interchange
education 45
efficiency 202
electronic data interchange 7, 39–40, 43, 47–48
electronic document system xxxiii
employee portal 64
enablers of utility computing 154
encryption 110, 116, 120
end points 140
enterprise application integration xxvii–xxviii, xxxii–xxxiii, xxxvi, 7, 43–44, 182, 185–186
architecture 59
initiatives 62
limitation of web services 69–72
module 60, 186
package 62
portals 62–65
simplifying with web services 62–63
SOA side by side 63
Titon 58–61
enterprise architecture xxvii, 49–54, 56–57, 183, 207
enterprise management dashboard 103
enterprise resource planning 55, 62, 74
envelope 28
ERP. See enterprise resource planning
error 101
executives 196
exposed transactions 110
exposed, as a web service 24, 33, 55, 65
security 70, 112
exposing 32, 126

 
F

failover 130, 136, 218
failure 188
fat client xxvi, xxx
fat clients 164–165, 228
FBI 80
federated authentication 118
Federated Identity Management System 118
financial services 86
firewall 53, 70, 110, 112
flexibility 204
flexible infrastructure allocation 154
flight 78
flooding 114, 133
footprint 96
foreign governments 80
forming an SOA plan 225–231
forming the target architecture 228
Forrester Research 15, 59
fraud 113
front end 179
FTP 25, 140
function 193

 
G

Gartner 32
genomic 81
treatment 82
governance 115–116
government 80
government agencies 140
government and scientific SOAs 80

 
H

hacker 112, 114
hard code 66
hard-coded 7
custom interface 218
hardware xxvii, 8
header. See SOAP message header
health care 80–81
heterogeneous operating system environment 69, 164
Hewlett-Packard 3, 21
high availability 136
high-load 136
history of computing 4
history of Web services 4
homeland security 3
hops 144
HP 12
HTML 15, 18–19, 21
HTTP xxxi, 140–141
messaging 218
MQ 222
hubs 77, 149
human resources 64
human to machine 112
Hyper-Text Markup Language. See HTML

 
I

IBM 3, 12, 16–17, 21, 40, 53, 214
IBM AS/400 40
IBM mainframe 42
IBM WebSphere 34
identity 113
implementation schedule 230
infrastructure 152, 164, 196
planning 195
insecure 70
instance 136, 157
insurance 87
integration 5–6, 58, 60–63, 66, 70, 72, 163
integration centric enterprise 87
integrity 113
data 123
Intel 12
intelligence 3
Interactive Voice Response system 98, 165, 180, 214, 230
interceptors. See SOAP interceptor
interface 8, 24–25, 30
Internet 7, 14–18, 21–22, 31, 73, 141
connection 110
protocols 18, 30
interoperate 7, 11, 25, 37, 41–44, 47, 98
in real time 99
intrusion 144
inventory 74
invocations 127
per minute 136
invoice 128
invokable interfaces 4
invoking
remote procedures 38
See also invocation
islands of integration 59, 71
isolation 204, 208, 211, 216
IT
architectures 226
budget 168
department 213, 225
executives 165
infrastructure 152
managers 12, 109
requirements 199
security 113
spending 5
team 178
transactions 107
IT budget xxxv
IT organizations xxv
IVR. See Interactive Voice Response

 
J

J2EE 34, 183, 232
Java 34, 45, 53, 55, 66, 68, 141, 155, 213, 231
Java 2 Enterprise Edition. See J2EE
Java Database Connectivity. See JDBC
Java web services development tool 219
JBuilder 34
JDBC 44
JMS 25, 141

 
K

key exchange 112
key pairs 120
keys 116, 120

 
L

LANs 7
Latency 44
law enforcement 81
leadership 188, 190
legacy 155, 180
code 6
configuration 186
integration 163
organization 184
system 5, 45, 101, 233
system replacement 163
legacy architecture xxv
legacy systems xxiv, xxvi, xxx, xxxvi
Lego 52
license 10
lifetime value of a customer 92
Linux 45
load 136, 155
balancing 130
characteristics 195
parameter 136
logging. See transaction logging
logical name 29
logical process 209
modeling 95
Loose coupling xxxvii
loose coupling 16–17, 30, 110, 183

 
M

machine-to-machine 83, 111
communication 112
mainframe xxviii, 5–6, 40, 45, 113, 230, 233
legacy environment 155
maintenance 10, 59–60, 62
malicious attacks 133
malicious mischief 113
management information systems (MIS) 49
managing change 143
managing the SOA network 140
manufacturer 110
merge 69, 232
message header. See SOAP message header
message in transit 113
message management 69
message queuing 140–141
back to HTTP 218
message transportation protocols 24
message-level security 115–116
messages 6
messaging 24, 26
metadata 18, 147
Microsoft 3, 14–16, 21, 140, 213
languages 66
SQL 213
migrate xxxiii
migration xxxv–xxxvi, 69, 72, 167, 207, 211, 230
of data 5
path 207
plan 229
minicomputer 30, 53
mission-critical business applications 126
modeling the business 199
monitoring and management of business processes 94
MQ. See message queuing
multiphased migration plan 231

 
N

National Institute of Standards and Technology (NIST) 15
near real time 100
.NET 34, 140, 183, 219
.NET Framework 213
network 102, 144
operations monitor 223
protocols 51, 57
See also protocols
transmission standards 24
transparency 17, 30, 32
nonprofit 80
non-repudiation 123
non-SOAP XML 47

 
O

OASIS 15
object 12
Object Management Group 16
object-oriented programming 66
obsolescence xxx
off-the-shelf Web services development package 179
on-demand 151
Open Database Connectivity (ODBC) 12–13, 21, 44, 66
open standards 4, 110
operating system xxvii
operating systems 8, 24, 33–34, 38, 40, 47, 51, 154
operations 24, 26, 35, 221
Oracle 3, 12, 21, 40, 42, 47
orchestrated 26, 134
Organization for the Advancement of Structured Information Standards. See OASIS
organizational chart 189
organizational politics 71
outside consultants 226
overflow load 136
overhead 44
overloaded service 157

 
P

packaged software 5
packet 18
partners 73
partner-to-partner 78
parts inventory 128
passing messages 141
patch xxviii–xxx
people 185, 190
PeopleSoft 3, 32
performance 46
pilot 139, 185, 203, 213, 218, 231
pilot web service project. See pilot
plan 185, 225
platform 213
point-of-sale (POS) 87
policy
enforcement points 138
information 168
system 165
political issues 71
portal xxxv, 58, 63–64, 164, 169, 174, 180, 230
architecture 64–65
developer 64
package 64
power grid 136
PowerPoint 179
priority for web service creation 203
privacy and integrity 113
private key 121
procedural code 12
procedure calls. See RPC
proceed 185
process-centric enterprise 93, 95
processes 85, 128, 168
See also business processes
product life cycles 73
production release 192–193
programmatic, integration 147
programming languages 24, 33, 45
multi-vendor systems 40
remote procedure call 38
utility computing 154
programming logic 207
project plan 192–193
proof of concept 219
proprietary EAI 61
proprietary interfaces 24, 30, 36, 74
proprietary standards 8, 51
protocols 23, 25, 29–30, 35
providers 26, 140
provisioning 116
proxy 119
public key 121
public/private key encryption 122
purchasing 85

 
Q

QoS. See Quality of Service
Quality of Service (QoS) 127, 132, 142
UDDI 146
Utility computing 156
queue 94

 
R

Rating the services 204
RDBMSs 83
real time 98, 100
enterprise 100
interoperation 108
operations 101
reporting 179
SOA 102
transactions 99
record 12
registry. See UDDI
reliability 69, 150
remote procedure calls. See RPC
replacing legacy systems 45
replay attack protection 123
Report Program Generator (RPG) 190
reports xxxiv
request/response 24
requests per minute 130
requirements analysis 226
reserve regulation 101
reserves 101
retirement accounts 87
Return on Investment. See ROI
reusability 63, 66, 204, 209
code 66, 194
interfaces 179
rewriting 69, 72
risks of loose coupling 109–114
rivalries 231
ROI 152, 227
routing 140–141, 143, 145–146
and change management 136
RPC 38, 47

 
S

sales forecasting 64
SAML 117
assertion 118–119
SAP 3, 32, 40, 47, 53
Sarbanes-Oxley 116, 124
scientific data 81
secondary web service 130
secure access 218
securing the SOA network 143
securing third parties 118
security xxx, 44, 70, 143, 157, 223
credentials 144
infrastructure 117, 218
parameters 110
policies 71, 115, 146
policy and provisioning 115
policy enforcement 147
policy information 146
risks 110
Security Assertion Markup Language. See SAML
self-describable 208
self-healing SOA 156
Send and Forget 24
service
creation 198, 203–211
design 199
discovery 198–199
inventory 204
map 175
service level agreements 45, 127, 142, 195, 218
QoS 132
rule for performance 106
unmanaged SOA 127
service map 173
service-level parameters 130
service-oriented architectures. See SOA
service-oriented development 219
setting goals 219
SGML 19
Siebel 40, 42, 53
signatures 116
See also digital signatures
silo 5, 11
silos xxviii
Simple Object Access Protocol. See SOAP
single sign-on (SSO) 112
SLA. See service-level agreement
SMTP 25
SOA
based real-time enterprise 103–105
best practice 184, 191, 231
best practices training 191
development 190, 198, 230
framework 167
management 131–132, 145
management solution 131–132
network 139, 142–143
network management solution 145
planning 225–226
projects 178
security 109, 116, 119
security solution 116
solution 178
training success 188
SOA development best practices 203
SOAP 24, 27, 39, 56, 83, 110, 191
consuming application 165
encryption 114
envelope 28, 33
interception 101–103, 116, 145
interceptor 222
interface 30, 68
message header 117
message interceptor 131, 145
message monitoring 116, 125
message streams 102
messages 28, 33, 75, 106, 143, 165, 218
monitoring 131–132
real time 102–103
request 129, 141, 146, 158, 180, 206
response 206
security 117
SOA Networks 145
transactions 138
SOAP XML 155
messages 101
SOAP-based Web services 165
software
architecture 167
developer 10, 191
development 58, 66, 68, 72, 193
engineers 59
license and maintenance fees 167
maintenance 164
requirements document 192
Solaris. See Sun Solaris
spaghetti code 13
staff allocation 230
staff training 188
staffing 164
stakeholders 186
Standard Generalized Markup Language. See SGML
standards 11, 16, 18–19, 21, 35
bodies 16, 21, 35
standards-based 49
subprograms. See operations
Sun 3, 12, 17, 21, 25, 30, 34, 40, 42, 47
Sun box 219
Sun Microsystems 3
Sun Solaris 25, 40
super-user access 112
supply-chain management 74
SYLK 19
synchronize operations 107
syntax 191
system
incompatibilities 230
integration 87
migration plans. See migration
overload 133

 
T

tag 19
target architecture 228
taxes 81
TCP/IP 17
team 190
team leader 184
technology architecture 50
telcos 3
terminal emulation xxvi
the four P’s 185
tight copyling 8, 31, 58
tight coupling xxvii, xxx
trading partner 110
traffic 119
training 188, 190, 194, 199, 210, 213
training groups 190, 198, 210, 213, 220
training period 196, 223
transactions 127
logging 124
monitoring 127
transparency 45
transport protocols 145
turf battles 71

 
U

U.S. government 80
UDDI 21, 27, 29, 163, 219
B2B Commerce 76–77
Security 110
SOA Networks 145
Utility Computing 158
unauthorized access 44
unauthorized use 113
Universal Discovery, Description, and Integration. See UDDI
Universal Resource Locater. See URL
UNIX 5, 25
unmanaged SOA 126, 134
unsecured SOA 113, 126
uploading 100–101
URL 17, 29
usage logs 123
user experience 179
utilities 151
utility computing 151
in the SOA 156
infrastructure 153

 
V

value added network (VAN) 39
vaporware 137
VB. See Visual Basic
vendor 59, 61–63, 70–72
vendor mix 51
vendor neutrality 73, 179
vendor neutrality/agnosticism 179
verification 147
VeriSign 121
version control 129–130
virtual corporations 73
virtual data warehouse 105–106
virtual private network 112, 114
See also XML VPN
visibility into operations 179
Visual Basic 14, 66–69, 139, 190, 213
VisualStudio.NET 34
VPN. See virtual private network

 
W

W3C 15, 19, 21, 27
Wal-Mart 86
WANs 7
web browsers 15
web server 100
web services
architecture 64, 218
based hub 78
based SOA 63
consumers 45, 209
consuming applications 166, 217
design 222
development 198
management 135
management solutions 131
orchestration 127
report card 210, 217
scorecard 185
software development 66
standards 130
Web Services Description Language. See WSDL
Web services registry. See UDDI
WebLogic 34
website 98, 180
WebSphere. See IBM WebSphere
wide area networks 7
Windows xxvi–xxviii, xxxi, 11, 25, 30, 34, 40, 42, 53, 219
wish list 168, 199
WSDL 21, 27–29, 31, 76, 220
and change management 129
WS-I 15
WS-Security 118

 
X

XML
document 18
encryption 121, 125
schema 19
standards 21, 24
tagging schemas 21
without SOAP 46
XML VPN 147–148