1,655 research outputs found

    ECOMMERCE MOBILE APPLICATION WITH IBM WEBSPHERE

    Get PDF
    IBM WebSphere Commerce is an enterprise application that provides high levels of scalability, performance, security, reliability and manageability. It provides a modern tool for business information exchange and eCommerce. WebSphere Commerce products include reliable, scalable and secure runtime environment with modern JEE programming model. WebSphere Commerce programming model consists of a mix of technologies including JavaServer Pages, Enterprise JavaBeans, JavaServer Faces, SOAP and Struts. WebSphere Commerce supports mobile versions of web store including native and hybrid applications. This thesis adds a new detail to the development process of a hybrid mobile application for Android Operating System with a new feature for handling and scanning barcodes. In the first part of the thesis, theoretical basics are introduced. The architecture of WebSphere Commerce application is briefly introduced with a programming model, mobile platform, barcode specification and libraries used in the thesis. In the following chapters, the development process is explained. Finally, there is the implementation chapter with the development of an Android hybrid application, implementation of the barcode generator and testing the application. The last chapter presents the author’s personal experiences and conclusions concerning this thesis. It also presents possibilities for future development. The thesis shows how to implement a fully-featured mobile hybrid application working on Android Operating System

    Information Systems in University Learning

    Get PDF
    The authors of this article are going to bring into light the significance, the place and the role of information systems in the university education process. At the same time they define the objectives and the target group of the subject named Economic Information Systems and state the competence gained by students by studying this subject. Special attention is given to the curriculum to be taught to students and to a suggestive enumeration of a series of economic applications that can be themes for laboratory practice and for students’ dissertation (graduation thesis).Information System, Academic Partnership, Curriculum, General Competence, Specific Competence, Open Systems

    An Embedded Domain Specific Language to Model, Transform and Quality Assure Business Processes in Business-Driven Development

    Get PDF
    In Business-Driven Development (BDD), business process models are produced by business analysts. To ensure that the business requirements are satisfied, the IT solution is directly derived through a process of model refinement. If models do not contain all the required technical details or contain errors, the derived implementation would be incorrect and the BDD lifecycle would have to be repeated. In this project we present a functional domain specific language embedded in Haskell, with which: 1) models can rapidly be produced in a concise and abstract manner, 2) enables focus on the specifications rather than the implementation, 3) ensures that all the required details, to generate the executable code, are specified, 4) models can be transformed, analysed and interpreted in various ways, 5) quality assures models by carrying out three types of checks; by Haskell.s type checker, at construction-time and by functions that analyse the soundness of models, 6) enables users to define quality assured composite model transformations

    Towards alignment of architectural domains in security policy specifications

    Get PDF
    Large organizations need to align the security architecture across three different domains: access control, network layout and physical infrastructure. Security policy specification formalisms are usually dedicated to only one or two of these domains. Consequently, more than one policy has to be maintained, leading to alignment problems. Approaches from the area of model-driven security enable creating graphical models that span all three domains, but these models do not scale well in real-world scenarios with hundreds of applications and thousands of user roles. In this paper, we demonstrate the feasibility of aligning all three domains in a single enforceable security policy expressed in a Prolog-based formalism by using the Law Governed Interaction (LGI) framework. Our approach alleviates the limitations of policy formalisms that are domain-specific while helping to reach scalability by automatic enforcement provided by LGI

    A Case Study on Enterprise Content Management using Agile Methodology

    Full text link
    Every organization has the need to create, classify, manage and archive information so that it is accessible when they need it. The amount of data or information needed for an organization to build their business and for them to be more positive in today’s business world is increasing exponentially, which also includes unstructured data or unstructured content. It is not appropriate only to “manage” content, but whether the correct version of the data or document or record can be accessed. Enterprise Content Management is an efficient collection and planning of information that is to be used by a very particular type of audience for pure business objectives. It is neither a single type of technology nor a process, it is a combination of strategies, methods and tools used to preserve, store and deliver information supporting key enterprise processes through its entire lifecycle. This research is classified into a case study research because it takes a particular focus on a certain area, i.e., the ECM implementation in XYZ organization where I completed my summer internship this year. Besides research, this study also helped me understand the in-depth implementation of ECM in an enterprise which directly depicts the working environment and methodologies in XYZ

    How open is open enough?: Melding proprietary and open source platform strategies

    Get PDF
    Computer platforms provide an integrated architecture of hardware and software standards as a basis for developing complementary assets. The most successful platforms were owned by proprietary sponsors that controlled platform evolution and appropriated associated rewards. Responding to the Internet and open source systems, three traditional vendors of proprietary platforms experimented with hybrid strategies which attempted to combine the advantages of open source software while retaining control and differentiation. Such hybrid standards strategies reflect the competing imperatives for adoption and appropriability, and suggest the conditions under which such strategies may be preferable to either the purely open or purely proprietary alternatives

    Performance testing : Performance measurement of web application

    Get PDF
    The main objective of this project was to design and implement a performance test which can provide relevant information for stakeholders. The test was designed for testing the performance of newly developed store which can be improved in the future. An implementation of the new store was based on IBM WebSphere Commerce that is a software platform for cross-channel commerce. E-commerce is a general concept of covering business transaction between organizations of various types. The implementation of designed test is a process which depends on used software tools. The test was created with an open source application Apache JMeter which is able to measure performance of the web application. One of the main goals of this thesis was to design a testing scenario which is able to simulate a flow of customer behavior on the store web pages. Subsequently implement the designed test via Apache JMeter, execute it and provide desired data. Results of the thesis are managed by Jenkins CI that is an integration server which accelerates the software development process through automation. In the future the test can be extended with parts that will be considered for testing the performance

    A Shibboleth-protected privilege management infrastructure for e-science education

    Get PDF
    Simplifying access to and usage of large scale compute resources via the grid is of critical importance to encourage the uptake of e-research. Security is one aspect that needs to be made as simple as possible for end users. The ESP-Grid and DyVOSE projects at the National e-Science Centre (NeSC) at the University of Glasgow are investigating security technologies which will make the end-user experience of using the grid easier and more secure. In this paper, we outline how simplified (from the user experience) authentication and authorization of users are achieved through single usernames and passwords at users' home institutions. This infrastructure, which will be applied in the second year of the grid computing module part of the advanced MSc in Computing Science at the University of Glasgow, combines grid portal technology, the Internet2 Shibboleth Federated Access Control infrastructure, and the PERMS role-based access control technology. Through this infrastructure inter-institutional teaching can be supported where secure access to federated resources is made possible between sites. A key aspect of the work we describe here is the ability to support dynamic delegation of authority whereby local/remote administrators are able to dynamically assign meaningful privileges to remote/local users respectively in a trusted manner thus allowing for the dynamic establishment of virtual organizations with fine grained security at their heart
    corecore