论企业集成平台的技术与应用
企业集成平台是一个支持复杂信息环境下信息系统开发、集成和协同运行的软件支撑环境。它基于各种企业经营业务的信息特征,在异构分布环境(操作系统、网络、数据库)下为应用提供一致的信息访问和交互手段,对其上运行的应用进行管理,为应用提供服务,并支持企业信息环境下各特定领域的应用系统的集成。企业集成平台的核心是企业集成架构,包括信息、过程、应用集成的架构。
请以“企业集成平台的技术与应用”为题,依次从以下三个方面进行论述:
1.概要叙述你参与管理和开发的企业集成平台相关的软件项目以及你在其中所担任的主要工作。
2.简要说明企业集成平台的基本功能及企业集成的关键技术,并结合项目实际情况,阐述该项目所选择的关键技术及其原因。
3.结合你具体参与管理和开发的实际项目,举例说明所采用的企业集成架构设计技术的具体实施方式及过程,并详细分析其实现效果。
正确答案及解析
正确答案
解析
一、按题目要求介绍作者参与的项目基本信息。
二、企业信息集成是解决“孤岛”问题的需要,技术发展的同时也推动了集成架构等相关的研究。企业集成平台的核心是企业集成架构,包括信息、过程、应用集成的架构。
企业集成的关键应用技术可从两个大的方面来选择技术进行论述,即:数据交换格式和分布式应用集成基础框架。
1、数据交换格式
(1)EDI
EDI(Electronic Data Interchange,电子数据交换)是一种利用计算机进行商务处理的方法,它将贸易、运输、保险、银行和海关等行业的信息,用一种国际公认的标准格式,通过计算机通信网络,供有关部门、公司与企业之间进行数据交换与处理,并完成以贸易为中心的全部业务过程。
EDI格式处理的目的是将在功效上与纸介质文件等同的电子表单用统一的(或标准的)格式进行表示,以保证各个独立开发的计算机应用间能够实现表单数据共享与集成。用于描述电子表单格式的标准称为EDI格式标准或EDI标准,目前广泛使用的EDI格式标准主要有两个UN/EDIFACT和ANSIX12,它们分别由联合国欧洲经济委员会(UN/ECE)和美国国家标准化协会(ANSI)制定。
(2)XML
XML(Extensible Markup Language,可扩展标记语言),它是国际组织W3C制定的一个面向各类信息的数据存储工具和可配置载体的开放式标准。提出XML的目的是为了更好地适应Web应用的需求,解决HTML在表达能力、可扩展性和交互性等方面的缺陷。XML是通过对SGML标准进行简化而形成的元标记语言,具有语法清晰简单和结构无歧义等优点。它利用一套定义标记的规则将文件的内容和外观进行分离,实现了XML文档的可延伸性及自我描述特性,从而使各种业务信息可以在全球信息网或企业间的应用系统中传递、处理及储存。这里需要指出的是,虽然XML称为可扩展标记语言,但它本身并不是一种标记语言,而是一种创建、设计和使用标记语言的根规则集,是一种创建标记语言(如HTML)的元语言。
(3)STEP
STEP标准(Standard for the Exchange of Product Model Data)是一个描述如何表达和交换数字化产品信息的ISO标准(ISO 10303),其目的是提供一种不依赖于具体系统的中性模型和机制,并将其用来描述整个生命周期内的产品数据。
2、分布式应用集成基础框架
(1)CORBA
CORBA的全称是公共对象请求代理体系结构(Common Object Request Broker Architecture),它是对象管理组织(OMG)为解决分布式处理环境中硬件和软件系统的互连而提出的一种标准的面向对象应用程序体系规范。
(2)COM +
COM +是Microsoft公司基于Windows平台的一个分布式企业应用模型,它与Windows操作系统紧密结合,是沿着DDE-OLE-OLE2-COM-DOOM-COM+的路线发展而来。目前COM、DCOM和COM +应用比较广泛。
(3)Web Service
Web Service(Web服务)是指服务提供者将应用作为服务部署在Web上,通过使用Web服务描述语言(WSDL)来描述特定Web服务提供的功能。服务请求者在需要一种Web服务时,可以通过Internet,在Web服务的注册机构中查找分布在Web站点上的Web服务,并自动实现与服务的绑定,完成数据交换,在这个过程中无需人工干预。由于Web服务的系统架构和实现技术基本上基于已有的技术,因此,Web服务可以看成是现有应用面向Internet的一个延伸。
三、第3个问题要根据项目的实际情况来写自己是怎么做的,遇到什么样的问题,如何解决的。同时文章收尾要对效果进行评价。
包含此试题的试卷
你可能感兴趣的试题
Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like (作答此空),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.
-
- A.compression
- B.encryption
- C.decryption
- D.translation
- 查看答案
Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should (作答此空)the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.
-
- A.address
- B.define
- C.ignore
- D.pose
- 查看答案
Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational (作答此空)and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.
-
- A.behaviors
- B.cultures
- C.policies
- D.structures
- 查看答案
Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the (作答此空)security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.
-
- A.logical
- B.physical
- C.network
- D.Information
- 查看答案
Data security is the practice of protecting digital information from (作答此空)access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.
-
- A.unauthorizeD
- B.authorizeD
- C.normal
- D.frequent
- 查看答案