Read Abu Dhabi IT Architecture & Standards v2.0 text version

CHAPTeR

APPenDICeS

3

Chapter 3

Appendices

INTRODUCTION

CHAPTeR 3

3.1 Glossary

Term .NET Standard Microsoft .NET Framework Description* Software component that provides pre-coded solutions to common programming requirements, and manages the execution of programmes written specificallyfor.NET. Client-server architecture in which the user interface, business logic, and data access/storage (including maintenance) are developed as independent modules. Provides the capacity to simultaneously transfer both voice data (a telephone call) and non-voice data. Abu Dhabi Systems & Information Committee Services Agreement to be entered into between ADSIC and the Service Provider, and under which the Services will be provided. Computer programmes that attempt to identify, thwart, and eliminate computer viruses and other malicious software (malware). The ability to permit or deny the use of an object (a passiveentity,suchasasystemorfile)byasubject (an active entity, such as an individual or process). Distributionofincomingcallstoaspecificgroupof terminals that agents use. Concept in computer security used to enforce privilege separation. Looselydefinedsetoftechnologiesdevelopedby Microsoft for sharing information among different applications. Set of computer software components that can be used by programmers to access data and data services. Symmetric 128-bit block data encryption technique. Private,non-profitorganisationthatoverseesthe development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States.

3 Tier Architecture

3 Tier Architecture

3G ADSIC Agreement

Third-generation Technology ADSIC Agreement

Anti-Virus

Anti-Virus

A/C

Access Control

ACD ACL Active X

Automatic Call Distribution Access Control List Active X

ADO.NET

ADO.NET

AES ANSI

Advanced Encryption Standard American National Standards Institute

313

Appendices

Term API

Standard Application Programming Interface

Description* Used to describe how computer applications and software developers may access a set of (usually third party) functions (for example, within a library) without requiring access to the source code of the functions or library, or requiring a detailed understanding or the functions' internal workings. A computer programming language with specialised array processing functionality. Set of Web development technologies marketed by Microsoft and used by programmers to build dynamic Web sites, Web applications, and XML Web services. An integrated circuit sold to multiple clients for a single application. Cellrelaynetworkprotocolthatencodesdatatraffic intosmall,fixed-sizedcellsratherthanvariable-sized packets. Relations between enterprises, as opposed to relations between enterprises and other groups. A real-time, event-driven set of services to provide Business Intelligence on the performance of activities across Government or within an individual entity. Provides a business context so that the remaining technical elements can be framed. Methodology used to create a plan for how an organisation will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. Analysisofandreportingondatafromofflinedata sources. Business process language that grew out of WSFL and XLANG. It is serialised in XML and aims to enable"programminginthelarge." Lifecycle - wide management of business processes performed by businesses to optimise and adapt their processes. Multiple components that together form the basis for"end-to-end"integrationandmanagementof business processes. Standardised graphical notation for drawing business processesinaworkflow.

APL ASP.NET

A Programming Language Microsoft ASP.NET

ASSP ATM

ApplicationSpecificStandard Product Asynchronous Transfer Mode

B2B BAM

Business-to-Business Business Activity Monitoring

BASE BCM

Business Architecture Security Element Business Continuity Management

BI BPEL

Business Intelligence Business Process Execution Language Business Process Management Business Process Management and Integration Business Process Modeling Notation

BPM

BPMI

BPMN

314

CHAPTeR 3

Term BRE Standard Business Rules Engine Description* Set of software tools that work alongside or within enterprise IT applications and enable enterprises to automate decision-making processes. Includes facilities for discovering, analysing, designing, deploying, and executing business rules. Set of software tools that work alongside BPMI to provide decision-making support for decision process management and message routing. Any legal person to which an RFP has been issued, andwhohasconfirmedtotheRFPissuerthathe/ she intends to submit a proposal in response to that RFP. Mechanism for storing information that can be retrieved based on its content rather than its storage location. Developed by the Software Engineering Institute (SEI) at Carnegie Mellon University in Pittsburgh (Pennsylvania), CMM is a method for evaluating and measuring the maturity of the software development process of organisations on a scale of 1 to 5. CMM Level 3 implies that processes are well characterised and understood, and are described in standards, procedures, tools, and methods. Describes a set of data elements necessary to support biometric technologies. Specificationfordefiningthecapabilitiesand preferences of user agents. A map of concepts and their relationships. Set of layered security services with a cryptographic framework that provides the infrastructure for creating cross-platform, interoperable, and securityenabled applications for client-server environments. Aunitofconfigurationthatcanbeindividually managed and versioned. Avendor-neutralcertificationgovernedbythe International Information Systems Security CertificationConsortium(ISC)2.Itisconsidered one of the premiere Information Security (IS) certifications.

BREMS BRM

Business Rules Engine Management System Business Rules Management

Bidder

Bidder

CAS

Content Addressed Storage

CMM

Capability Maturity Model

CBEFF CC/PP CDM CDSA

Common Biometric Exchange File Format Composite Capability/ PreferenceProfiles Conceptual Data Models Common Data Security Architecture

CIs CISSP

ConfigurationItems CertifiedInformationSystems Security Professional

315

Appendices

Term CM

Standard ConfigurationManagement

Description* Management of security features and assurances through controlling changes made to hardware, software,firmware,documentation,testing,fixtures, and test documentation of an automated information system throughout the system's development and operational life. Aunifiedorfederatedrepositoryofinformation related to all components of an information system. Means by which network assets and/or network users are segregated by some technological means for some established purpose. Products as they are sold in stores by companies, withoutmodifications. Multi-disciplinary approach to deterring criminal behaviourthatreliesupontheabilitytoinfluence offender decisions that precede criminal acts. Capabilities, methodologies, and technologies that support an enterprise in managing customer relationships. Style sheet language used to describe the presentation of a document written in a markup language. Extensionforafilethatisconvertiblefromtextto spreadsheet. A qualitatively measurable element vital to an organisational strategy's success. Allows telephone and computer interactions to be integrated or coordinated. Business executive position whose holder is focused on technical issues within a company. Platform- and programming language-agnostic standardthatdefinesthetypesofdata,aswellas available operations on that data, that a particular software programme exposes to other programmes and systems. Specifiesinterfacesthatcanbeusedtoenable the easy interchange of warehouse and business intelligence metadata between warehouse tools, platforms, and metadata repositories in distributed heterogeneous environments.

CMDB COI

ConfigurationManagement Data Base Community of Interest

COTS CPTED

Commercial off-the-shelf Crime Prevention Through Environmental Design Customer Relationship Management Cascading Style Sheets

CRM

CSS2

CSV CSF CTI CTO CORBA

Comma Delimited Text File Extension Critical Success Factor Computer Telephony Integration Chief Technical (or "Technology")Officer Common Object Request Broker Architecture

CWM

Common Warehouse Metamodel

316

CHAPTeR 3

Term CMS Standard Content Management System Description* Software system that facilitates the organisation and management of various forms of digital content and assets. A CMS system can help the governance of numerous aspects of content lifecycle, including creation,classification,publication,andaccess control. It can also automate the archiving and destructionofcontentaccordingtodefinedretention and disposition policies. Array of disk drives dedicated to a particular host device, typically a server. Abbreviationfor"database." Software platform that controls organisation, storage, maintenance, and access to data in one or more hosted databases. Feature offered by telephone companies for use with their customers' PBX system, whereby the telephone company (Telco) allocates a range of numbers connected to their customer's PBX. Computerlanguageusedfordefiningdata. Client-server networking protocol. A DHCP server providesconfigurationparametersspecifictothe DHCP client host, generally requesting information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocating IP addresses to client hosts. Family of computer languages used by computer programmes or database users to retrieve, insert, delete, and update data in a database. Demilitarised Zone is a network area that sits between an organisation's internal network and an external network, usually the Internet. Stores and associates many types of information with domain names. Most importantly, it translates domain names (computer hostnames) to IP addresses. Acommonfileextension,traditionallyusedfor documentation in plain-text format particularly of programmes or computer hardware on a wide range of operating systems. United States Federal Government Standard (FIPS) for digital signatures.

DAS DB DBMS

Direct Attached Storage Database Database Management System Direct Dial In

DDI

DDL DHCP

DataDefinitionLanguage DynamicHostConfiguration Protocol

DML

Data Manipulation Language

DMZ

Demilitarised Zone

DNS

Domain Name System

DOC

Document File Extension

DSS

Digital Signature Standard

317

Appendices

Term DTD

Standard DocumentTypeDefinitions

Description* One of several SGML and XML schema languages. It is also the term used to describe a document (or portion of a document) that is authored in the DTD language. Optical signals multiplexed within the 1550-nm band to leverage the capabilities (and cost) of erbium dopedfibreamplifiers(EDFAs)theseareeffectivefor wavelengths between approximately 1530 and 1560 nm. Allows to resume operations within a minimal amount of time in the event of a disaster Framework to align an organisation's structure, processes, information, operations, and projects with the organisation's overall strategy. Use of software and computer systems' architectural principles to integrate a set of enterprise computer applications. Managing the real-time enforcement of separation of dutiesandroles,aswellas"dynamicauthorisation." Family of global XML - based standards sponsored by OASIS and UN/CEFACT, with the mission of providing an open, XML - based infrastructure. Self-contained forms that allow the management of online form resources. Set of integration technologies that employ metadata management and data abstraction capabilities to address data access and semantic challenges associated with heterogeneity data sources. Management that provides a common, trustworthy view of disparate information using various approaches for data integration, data quality, and metadata management. Remotely accessible software component. Model that provides a high-level description of a conceptual data model. Provide the ability to integrate the data and processes of a company or organisation into a single, unifiedsystem.Forexample,anERPsystemmight integrate an organisation's payroll and accounting systemsintoasinglesystemwithaunifiedinterface.

DWDM

Dense Wavelength Division Multiplexing

Disaster Recovery EA

Disaster Recovery Enterprise Architecture

EAI

Enterprise Application Integration Extranet access management Electronic Business using extensible Markup Language Electronic Forms Enterprise Information Integration

EAM ebXML

eForms EII

EIM

Enterprise Information Management

EJB ER ERP

Enterprise Java Bean Entity Relationship Enterprise Resource Planning

318

CHAPTeR 3

Term ESB Standard Enterprise Service Bus Description* Enterprise Service Bus is a concept implemented by various middleware infrastructure vendors such as IBM and BEA that provides a layer of abstraction between a heterogeneous system of services and software applications. An ESB product handles the messaging and communications between those services and external systems in a standards-based manner through the use of XML, and typically also supports the transformation of data between the sending and receiving applications. Control and binding of resources within an executable process. Business-driven plan that describes the desired end state for the Government's performance, business, applications, services, technology, data, and security. Data warehousing process that involves extracting datafromoutsidesources,transformingittofit business needs, and ultimately loading it into the data warehouse. A global, independent IT examination provider that establishes educational requirements and developsandorganisesexaminationsinthefieldof Information Technology. Setofdefinedtechnicalpoliciesandspecifications governingtheflowofinformationbetween government organisations and the public sector. This can include interconnectivity, data sharing and integration, e-services access, and content management. Procedure used to convert plain text into ciphertext to prevent anyone but the intended recipient from reading that data. There are many types of data encryption, and they form the basis of network security. Provides a standard for data transmission in a local area network that can extend in range up to 200 kilometres. Automates and integrates requirements and data withinacompany'sfinancialdepartment. Publicly announced standards developed by the United States Government for use by all non-military government agencies and government contractors. Document that describes what functions a system under construction must have.

ESO ETA

Event and Service Orchestration Enterprise Target Architecture

ETL

Extract, Transform, and Load

EXIN

Examination Institute for Information Science

e-GIF

e-Government Interoperability Framework

Encryption

Encryption

FDDI

Fibre-Distributed Data Interface Financial module of Oracle e-Business Suite Federal Information Processing Standards Functional Requirements Document

Financial FIPS

FRD

319

Appendices

Term FTP/FTPS

Standard File Transfer Protocol/ File Transfer Protocol Server File Transfer Protocol

Description* Commonlyusedprotocolforexchangingfilesover any network that supports the TCP/IP protocol, such as the Internet or an intranet. Standard Internet communications technology enabling computers in different locations to transfer filesandperformcommandsremotely. Piece of hardware and/or software that functions in a networked environment to prevent some communications forbidden by the security policy, analogoustothefunctionoffirewallsinbuilding construction. It has the basic task of controlling trafficbetweendifferentzonesoftrust.Typicalzones oftrustincludetheInternet(azonewithnotrust) andaninternalnetwork(azonewithhightrust).The ultimate goal is to provide controlled connectivity betweenzonesofdifferingtrustlevelsthrough enforcement of a security policy and connectivity modelbasedonthe"leastprivilege"principle. A set of programming language compilers. An upper ontology integrating processes and objects. An 8-bit-per-pixel bitmap image format that uses a palette of up to 256 distinct colours from the 24-bit RGB colour space. Mobile data service that provides moderate-speed data transfer through unused TDMA channels in the GSM network. World's most popular standard for mobile phones. Online, non-commercial interaction between local and central government and the commercial business sector, rather than private individuals' G2C. Online, non-commercial interaction between local and central Government and private individuals, rather than the commercial business sector`s G2B. Online, non-commercial interaction between local and central Government and its employees. Online, non-commercial interaction between Government agencies.

FTP

Firewall

Firewall

GCC GFO GIF

GNU Compiler Collection General Formal Ontology Graphics Interchange Format

GPRS

General Packet Radio Service

GSM G2B

Global System for Mobile Communications Government to Business

G2C

GovernmenttoCitizen

G2E G2G

Government to Employee Government to Government

320

CHAPTeR 3

Term Government Entities Standard Government Entities Description* Government of the Emirate of Abu Dhabi or any ministry, department, or political subdivision thereof and any other entity, instrumentality, agency, authority, corporation, committee, or commission that is under the direct or indirect control of the Government of the Emirate of Abu Dhabi whether or not it is exercising executive, legislative, judicial, regulatory, or administrative functions of the Government, or any independent regulatory authority constituted by the Government of the Emirate of Abu Dhabi and any successor to or any assignee of any of the foregoing. Visual representation of a software programme's interface that allows the user to interact with that programme in an intuitive manner. Connects a host system (the computer) to other network and storage devices. Referstotheindividualswithinafirmandtheportion ofthefirm'sorganisationthatdealswithhiring,firing, training, and other personnel issues. The merging of basic HR activities and processes withtheinformationtechnologyfield. Extension of the Open Group's Common Data Security Architecture, which is a set of layered security services and a cryptographic framework that provides the infrastructure for creating cross-platform, interoperable, security-enabled applications for client-server environments. Anindependent,non-profitconsortiumdedicatedto enabling e-commerce and inter-company exchange of human resources (HR) data worldwide. Markup language designed for the creation of Web pages with hypertext and other information to be displayed in a Web browser. HTML is used to structure information denoting certain text as headings, paragraphs, lists and so on and can be used to describe (to some degree) the appearance and semantics of a document. A method used to transfer or convey information on the World Wide Web. HTTP, but over a secure transport layer using Secure Socket Layer (SSL).

GUI

Graphical User Interface

HBA HR

Host Bus Adapter Human Resources

HRMS HRS

Human Resource Managing System Human Recognition Services Module

HR - XML

HR - XML

HTML

Hypertext Markup Language

HTTP HTTPS

Hypertext Transfer Protocol Secure Hypertext Transfer Protocol

321

Appendices

Term I/O

Standard Input/Output

Description* Collection of interfaces that different functional units (sub-systems) of an information processing system use to communicate with each other; also the signals (information) sent through those interfaces. Combines processes, technologies, and policies to manage digital identities and specify how they are used to access resources. Anypocket-sizedcardwithembeddedintegrated circuits. Provides a framework for electronic collaboration based on shared directory and messaging platforms. A broad subject concerned with technology and other aspects of managing and processing information. Afamilyofdefinitionlanguagesthathavebecome standard modelling techniques. Software system that detects unwanted system manipulations. Internationalnon-profit,professionalorganisationfor the advancement of technology related to electricity. Develops and promotes Internet standards, especially with the TCP/IP and Internet protocol suit. A form of real-time communication between two or more people based on typed text. Management of a user's credentials and how they might log onto an online system. An Application layer Internet protocol that allows a local client to access e-mail on a remote server. SecurityprotocoldefinedforIPnetworks. The dominant network layer protocol on the Internet. Successor to IPv4. An international industry/commercial standardsetting body composed of representatives from various nations' standards bodies.

IAM

Identity and Access Management Integrated Circuit Card Integrated Collaborative Environment Information and Communications Technology ICAMDefinitionLanguages Intrusion Detection System Institute of Electrical and Electronics Engineers Internet Engineering Task Force Instant Messaging Identity Management Internet Messaging Access Protocol 4 Internet Protocol Security Extensions Internet Protocol Version 4 Internet Protocol Version 6 International Standards Organisation

ICC ICE ICT IDEF IDS IEEE IETF IM IM IMAP4 IPSec IPv4 IPv6 ISO

322

CHAPTeR 3

Term IP Standard Internet Protocol Description* Specifiestheformatofpackets,alsocalled datagram, and the addressing scheme. The current version of IP is IPv4. A new version, called IPv6 or IPng, is under development. Also known as Information and Communication(s) Technology (ICT) and Infocomm in Asia is concerned with the use of technology in managing and processing information, especially in large organisations. In particular, IT deals with the use of electronic computers and computer software to convert data into information and store, protect, process, transmit, and retrieve information. Computer professionals are often called IT specialists/consultants, and the division of an organisation that deals with software technology is often known as the IT department. Body that sets standards for multimedia communications over Local Area Networks (LAN). Customisable framework of best practices that promote quality computing services in the IT sector. The only internationally recognised and independent organisation dedicated to IT Service Management. Independent international organisation set up to influencetheITServiceManagementindustry. International organisation established to standardise and regulate international radio and telecommunications. Computerised system that allows a person (typically a telephone caller) to select an option from a voice menu and interface with a computer system. The system generally plays pre-recorded voice prompts to which the person presses a number on a telephone keypad to select the option chosen, or speaks simple answerssuchas"yes,""no,"ornumbersinresponse to the voice prompts. Characterised as the preservation of (a) confidentiality,ensuringthatinformationis accessible only to those authorised to have access; (b) integrity, safeguarding the accuracy and completeness of information and processing methods; and (c) availability, ensuring that authorised users have access to information and associated assets when required.

IT

Information Technology

ITCCB ITIL ITSCM itSMF ITU

ITConfigurationControl Board Information Technology Infrastructure Library IT Service Continuity Management IT Service Management Forum International Telecommunications Union Interactive Voice Response

IVR

Information Security

Information Security

323

Appendices

Term Integration Testing Interactive Features J2EE

Standard Integration Testing

Description* Hardware or software test that evaluates the connection of two or more components that pass information from one area to another. Services that allow a user to search a database for information--e.g., search schedules. Java programming platform for developing and running distributed multi-tier architecture Java applications. Software package developed by the British company First 4 Internet and sold as a copy protection or digital rights management (DRM) scheme for compact discs. Scripting programming language, mostly used for client-side processing in Web browsers, based on the concept of prototypes. Storage system that does not contain any disk redundancy levels. Framework for working with cryptography using the Java programming language. Application programming interface for the Java programminglanguagethatdefineshowaclientmay access a database. Messaging standard that allows application components based on the Java 2 Platform, Enterprise Edition (J2EE) to create, send, receive, and read messages. Commonly used standard method of compression for photographic images. Java language Web server scripting. A range of practices and techniques used by organisations to identify, represent, and distribute knowledge. Financialandnon-financialmetricsusedtoquantify objectivestoreflectthestrategicperformanceofan organisation. KPIs are used in business intelligence to assess the present state of the business and to prescribe a course of action. KPIs are typically tied to an organisation's strategy using such techniques as the Balanced Scorecard.

Interactive Features Java Platform, Enterprise Edition Jaber Extended Copy Protection

Jaber XCP

Javascript

Javascript

JBOD JCA JDBC

Just a Bunch of Disks Java Cryptography Architecture JDBC

JMS

Java Message Service

JPEG JSP KM

Joint Photographic Experts Group Java Server Pages KM

KPI

Key Performance Indicators

324

CHAPTeR 3

Term KPMM Standard Key Performance Measurement Methodology Description* Step-by-step approach used to provide feedback on the success of the organisation's performance as it relates to the attainment of its vision, mission, and objectives. Hardware device that allows a user to control a computer from a keyboard, video monitor, and mouse. High-speed network used to connect nodes that are geographically close, usually within the same building. Networking protocol for querying and modifying directory services running over TCP/IP. Hard disk partitioning system for Windows, developed by Microsoft and Veritas Software. Optional part of a public key infrastructure that maintainsusers'identities,fromwhichcertification authoritiescanissuedigitalcertificates. A large computer network, usually spanning a campus or a city. Discipline in Information Technology that focuses on the management of reference or master data that is shared by several disparate IT systems and groups. Device that provides various electronic capabilities, e.g. scanning, printing, faxing and copying. Internet standard that extends the format of email to support text in character sets other than US-ASCII, non-text attachments, multi-part message bodies, and header information in non-ASCII character sets. General name for the academic discipline covering the application of people, technologies, and procedures collectively, the information system to business problems. Stripped-down version of SMIL. Extensibleframeworkfordefiningmodelsfor metadata and providing tools with programmatic interfaces to store and access metadata in a repository.

KVM

Keyboard Video Mouse

LAN

Local Area Network

LDAP LDM LRA

Lightweight Directory Access Protocol Logical Data Models Local Registration Authority

MAN MDM

Metropolitan Area Network Master Data Management

MFP MIME

Multi-Function Peripherals Multipurpose Internet Mail Extension

MIS

Management Information Systems

MMS MOF

MMS Meta-Object Facility

325

Appendices

Term MOM

Standard Message-Oriented Middleware

Description* Category of inter-application communication software that generally relies on asynchronous message-passing as opposed to a request/response metaphor. Asynchronous refers to the transmitter and receiver clock generators not being exactly synchronised. Most MOM depends on a message queue system, although some implementations rely on broadcast or on multicast messaging systems. QuickTime'sfileformatformovies. Legal document describing an agreement between two parties. It expresses a convergence of will between the parties, indicating an intended common line of action rather than a legal commitment. It is a more formal alternative to a gentlemen's agreement, but generally lacks the binding power of a contract. Popular digital audio encoding and lousy compression format, designed to greatly reduce the amount of data required to represent audio. A language commonly used to build VPNs. A relational database management system that combines the relational Microsoft Jet Database Engine with a graphical user interface. Collection of applications contained in the standard version of Microsoft Windows 2003. Collection of applications contained in the larger "Professional"versionofMicrosoftWindows2003. Messaging protocol that allows applications running on disparate servers to communicate in a failsafe manner. Process of controlling network access, including pre-admission endpoint security policy checks and post-admission controls over where users can go on a network and what they can do. Hard disks grouped on a specialised storage server that is attached to the network. Re-writing the source and/or destination addresses of IP packets as they pass through a router or firewall.

MOV MoU

MOV File Extension Memorandum of Understanding

MP3

MPEG-1 Audio Layer 3

MPLS MS Access

Multi-Protocol Label Switching MicrosoftOfficeAccess

MSOffice2003 MSOfficePro 2003 MSMQ

MicrosoftOffice2003 Standard Edition MicrosoftOffice2003 Professional Edition Microsoft Message Queuing

NAC

Network Access Control

NAS NAT

Network Attached Storage Network Address Translation

326

CHAPTeR 3

Term NDA Standard Non-Disclosure Agreement Description* Legal contract between two or more parties that outlinesconfidentialmaterialsorknowledgethe parties wish to share with one another for certain purposes but wish to restrict from generalised use. Non-regulatory institute whose mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve quality of life. Internet application protocol used primarily for reading and posting Usenet articles, as well as transferring news among news servers. An archive consisting of an organisation of people and systems that has accepted the responsibility to preserve information and make it available for a designated community. Global consortium that drives the development, convergence, and adoption of e-business and Web service standards. Provides a standard software API method for using database management systems (DBMS). Intended by its designer to be independent of programming language, database system, and operating system. An integrated database of operational data. Approach to quickly provide the answer to analytical queries that are dimensional in nature. Internal documents, owned by the Service Management Team, that set out responsibilities for the support and delivery of IT services to customers. Class of programme that facilitates and manages transaction-oriented applications, typically for data entry and retrieval transaction processing. Specificationformodellingmetadataforrelational, non-relational, multi-dimensional, and most other objects found in a data warehousing environment.

NIST

National Institute of Standards and Technology

NNTP

Network News Transfer Protocol Open Archival Information System

OAIS

OASIS

Organisation for the Advancement of Structured Information Standards Open Database Connectivity

ODBC

ODS OLAP OLAs

Operational Data Store On-Line Analytical Processing Operational Level Agreements Online Transaction Processing Object Management Group's Common Warehouse Metamodel

OLTP

OMG CWM

327

Appendices

Term OS

Standard Operating System

Description* Computer programme that manages the hardware and software resources of a computer. At the foundation of all system software, an operating system performs basic tasks such as controlling and allocating memory, prioritising system requests, controlling input and output devices, facilitating networking,andmanagingfiles.Italsomayprovidea graphical user interface for higher-level functions. It forms a platform for other software. Effort to standardise networking that was started in 1982 by the International Organisation for Standardisation (ISO), along with the ITU - T. Markup language for publishing and sharing data using ontologies on the Internet. Telephone exchange that is owned by a private business, as opposed to one owned by a common carrier or by a telephone company. Same as PABX. Computers, in the general sense of the term. Electronic device that can include some of the functionality of a computer, a cell phone, a music player, and a camera. Representation of a data design that takes into account the facilities and constraints of a given database management system. Anopensource,reflectiveprogramminglanguage used mainly in server-side application software. Set of standards for public-key cryptography. Public Key Infrastructure enables users of a basically non-secure public network such as the Internet to securely and privately exchange data and money through use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. Bitmap image format that employs lossless data compression. Technology to transmit power along with data over standard network cables.

OSI

Open Systems Interconnection Web Ontology Language Private Automatic Branch Exchange Private Branch Exchange Personal Computer Personal Digital Assistant

OWL PABX

PBX PC PDA

PDM

Physical Data Models

PHP PKCS PKI

PHP: Hypertext Pre-processor Public-Key Cryptography Standards Public Key Infrastructure

PNG PoE

Portable Network Graphics Power over Ethernet

328

CHAPTeR 3

Term POP3 Standard PostOfficeProtocol3 Description* Application-layer Internet standard protocol to retrieve e-mail from a remote server over a TCP/IP connection. Provides a standard representation for data mining models to facilitate model interchange among vendors using XML DTD. File extension for PowerPoint, a Microsoft programme used to construct presentations. Document given to a customer that describes the availability of service. Worldwide distribution of voice networks with gateways and agreed addressing conventions. A Uniform Resource Locator (URL) that does not directly describe the location of the resource to be retrieved, but rather an intermediate (more persistent) location which, when retrieved, results inredirectiontothecurrentlocationofthefinal resource. Process of feeding test data into two systems the modifiedsystemandanalternativesystem(possibly the original system) and comparing the results. AnopenfileformatcreatedbyAdobeSystemsin 1993 and now being prepared for submission as an ISO standard. It is used for representing twodimensional documents in a device- and resolutionindependent,fixed-layoutdocumentformat.PDF filesdonotencodeinformationthatisspecifictothe application software, hardware, or operating system used to create or view the document. Perimeter and premise security which ensures that Government physical assets are adequately protected against human tampering and natural disasters. Comparing a system's performance to other equivalentsystemsbyusingwell-defined benchmarks. Preliminarytestthatfocusesonthespecificand predetermined aspects of a system. It is not meant to replace other testing methods, but to provide a limited evaluation of the system.

PPML

Predictive Model Markup Language Microsoft PowerPoint File extension Projected Service Availability Public Switched Telephone Network Persistent Uniform Resource Locator

PPT PSA PSTN Purls

Parallel Testing

Parallel Testing

PDF

Portable Document Format

Physical Security

Physical Security

Performance Testing Pilot Testing

Performance Testing

Pilot Testing

329

Appendices

Term POC

Standard Proof of Concept

Description* Short and/or incomplete synopsis of a certain method or idea to demonstrate its feasibility, or a demonstration in principle whose purpose is to verify that some concept or theory is likely capable of exploitation in a useful manner. The proof of concept is usually considered a milestone on the way of a fully functioning prototype. Written offer to provide the services submitted to an entity in accordance with and subject to the terms of an RFP. Process/set of processes or measures used to assure the quality of a product. A measure of the reliability of a computer network. Multimedia framework developed by Apple Computer, capable of handling various formats. A body given the responsibility of maintaining lists of codes under international standards and issuing new codes to those wishing to register them. Security system that provides access control andauditingfunctionalityforthez/OSandz/VM operating systems. Encompasses all storage systems shipped with Redundant Array of Independent/inexpensive Disks capability to varying levels. Multiprocessing system that can quickly recover from a failure. Access credential system where access is based upon a user's role or rank. Database management system based upon a relational model that presents a view of the data as a collection of rows and columns. The system also may have management tools or functions to support the data contained within the database management system. A language for representing information about resources in the World Wide Web. A series of numbered Internet informational documents and standards. Systems dealing with records management and archiving.

Proposal

Proposal

QA, Q&A QOS QT RA

Quality Assurance Quality of Service Apple Quicktime Registration Authority

RACF

Resource Access Control Facility Redundant Array of Independent/inexpensive Disks Reliability, Availability, Serviceability Role-Based Access Control Relational Database Management Systems

RAID

RAS RBAC RDBMSs

RDF RFC RISS

Resource Description Framework Request for Comments Reference Information Storage Systems

330

CHAPTeR 3

Term RM RMI Standard RealMedia Streaming Media Remote Method Invocation Description* Fileextensionforthevideofileassociatedwith RealAudio. Java application programming interface for performing the object equivalent of remote procedure calls. Benefitgainedfromtheamountofresources invested. Protocol that allows a computer programme running on one computer to cause a subroutine on another computer to be executed without the programmer explicitly coding the details for this interaction. Pointintimethatarestartedapplicationwillreflect. WebsyndicationfileformatusedbynewsWebsites and Web logs. A general request sent by a Government entity or corporation soliciting proposals from various vendors for the implementation of a certain project or need. Time goal for the reestablishment and recovery of a system's lost business functions or resources. Checking a system's ability to recover after a software or hardware failure. Process of selecting appropriate controls to reduce risks to an acceptable level. Provision of multiple interchangeable components to perform a single function to cope with failures and errors. Process of re-running a portion of a test scenario or test plan to ensure that changes or corrections have not introduced new errors. The data used in regression testing must be the same as that used in the original test. Secure electronic messaging standard for e-mail and store-and-forward messaging. XML standard for exchanging authentication and authorisation data between security domains. This is typically found within the Single Sign On (SSO) solutions.

ROI RPC

Return on Investment Remote Procedure Call

RPO RSS RFP

Recovery Point Objectives Really Simple Syndication Request for Proposal

RTO Recovery Testing Risk Mitigation Redundancy

Recovery Time Objectives Recovery Testing Risk Mitigation Redundancy

Regression Testing

Regression Testing

S/MIME SAML

Secure Multipurpose Internet Mail Extension Security Assertion Markup Language

331

Appendices

Term SAN

Standard Storage Area Network

Description* Network designed to attach computer storage devices (typically hard drives, tape libraries and diskarraycontrollers)viaspecialisedfiberchannel switches. This storage network is available to remote hosts or computers to directly attach themselves throughuseofspecialisedfiberchannelcards called Host Bus Adapters (HBA) via the specialised switches. Once the remote systems have attached themselves to the storage network, mounted drives appear to the local operating systems as local drives. Framework for authentication and data security in Internet protocols. VoIPterminalcontrolprotocoldefinedbyCisco Systems, Inc. Process of planning, implementing, and controlling operation of the supply chain. The supply chain management monitors all movement and storage of materials,inventory,andfinishedproducts.Theend goal or purpose is to satisfy customer requirements asefficientlyaspossible. A set of cabling and connectivity products that integrates the voice, data, video, and various management systems of a building. Establishes procedures, practices, and guidelines governing the initiation, concept development, planning, requirements analysis, design, development, integration and testing, implementation, and operations, maintenance, and disposition of information system. A technology that allows heterogeneous data to be accessed in a uniform way. Act of centralising the storage and interpretation of logs or events generated by other software running on the network. Standard that enables secure credit card transactions on the Internet. Ensuringthatamodified/newsystemincludes appropriate access controls and does not introduce any security holes that might compromise other systems. The successful bidder that enters into an Agreement with the issuer of an RFP.

SASL SCCP SCM

Simple Authentication and Security Layer Skinny Client Control Protocol SoftwareConfiguration Management

SCS

Structured Cabling System

SDLC

Software Development Life Cycle

SDO SEM

Service Data Objects Security Event Management

SET Security Testing

Secure Electronic Transactions Security Testing

Service Provider

Service Provider

332

CHAPTeR 3

Term Services SLAs Services Service Level Agreements Standard Description* All the services provided by a Service Provider pursuant to the terms of a legal Agreement. Partofacontractthatdefinesacertainlevelof service that is being agreed upon. A contract containing at least one SLA is typically referred to as a performance contact, and may address one or many of the following items performance, warranties,customerduties,definitionofservices,or termination of agreement. Person who is an expert on a particular technology or process. Format that enables the standardised exchange of modelling, repository, and programming data over the network and Internet. A W3C recommendation for describing multimedia presentations using XML. Any handheld that integrates personal information management and mobile phone capabilities in the same device. This often includes adding phone functions to already capable Personal Digital Assistants(PDA),orputting"smart"capabilities, such as PDA functions, into a mobile phone. Messaging service found on most digital mobile phones or PDAs which uses services to store-andforwardor"forwardandforget"messageswith limited characters between handheld devices. The de facto standard for e-mail transmissions across the Internet. PartoftheInternetprotocolsuiteasdefinedby the Internet Engineering Task Force. It is used by network management systems for monitoring network-attached devices for conditions that warrant administrative attention. Confirmsthatthenewormodifiedsystemcan operate in its target environment without adversely impacting existing systems. Protocol for exchanging XML - based messages over computer networks. SOAP forms the basic messaging framework of the Web services stack to allow more abstract layers to be built. Standard for communicating digital information using lasersorlight-emittingdiodes(LED)overopticalfibre asdefinedbyGR-253-COREfromTelcordia.

SME SMIF

Subject Matter Expert Stream-based Model Interchange Format Synchronised Multimedia Integration Language Smart Phone

SMIL Smart Phone

SMS

Short Message Service

SMTP SNMP

Simple Mail Transfer Protocol Simple Network Management Protocol

Sociability Testing SOAP

Sociability Testing

Simple Object Access Protocol

SONET

Synchronous Optical Networking

333

Appendices

Term SPOC SQL

Standard Single Point of Contact Structured Query Language

Description* Person who acts as the sole point of contact for specificissues,especiallywithHelpDesks. The most popular computer language used to create, modify, retrieve, and manipulate data from relational database management systems. SQL has been standardised by both the American National Standards Institute (ANSI) and the International Organisation for Standardisation (ISO). Provides a single source of policy and recommended standards for cross-Government IT services. Complete description of the behaviour of a system to be developed. It typically includes use cases that describe user interactions with the system, and should contain non-functional requirements which typically deal with the system's performance, quality standards, or design constraints. Set of standards and associated network protocol that allows establishment of a secure channel between a local and a remote computer. Provides secure communications on the Internet for such things as e-mail, Internet faxing, data transfer to/from online poker clients, etc. Specialised form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems. Usedtographicallyrepresentfinitestatemachines. An upper ontology intended to serve as foundation ontology for a variety of computer information processing systems. Virtual private communications network that uses cryptographic tunnelling protocols to provide necessaryconfidentiality. Services that provide only static information to the user,e.g.,obtaininformationonspecificprocesses Strategic planning tool used in a project or business venture to help an organisation or individual make a decision in the pursuit of an objective. Proprietaryvectorgraphicsfileformatproducedby Adobe Flash software.

SRM SRS

Standards Reference Model Software Requirements Specification

SSH

Secure Shell

SSL

Secure Sockets Layer

SSO

Single Sign-On

STD SUMO

State Transition Diagrams Suggested Upper Model Ontology Secure VPN

SVPN

Static Features SWOT

Static Features Strengths, Weaknesses, Opportunities, and Threats SWFfileextension

SWF

334

CHAPTeR 3

Term System Testing Standard System Testing Description* Seriesoftestsdesignedtoensurethatmodified programmes, objects, database schema, etc., that constituteanewormodifiedsystemcanfunction collectively. Definesthetechnicalaspectofthetargetsecurity architecture. Expresses the cost to fully implement and own a solution. Using TCP, applications on networked hosts can create connections to one another over which they can exchange data in packets. A virtual circuit protocol that is one of the core protocols of the Internet protocol suite. The IP part of this term represents a data-oriented protocol used for communicating data across a packet-switched inter-network. File format used primarily for storing images, including photographs and line art. Cryptographic protocol which provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. Services that allow the user to perform transactions, e.g., payments, to create accounts and post information. A framework for Enterprise Architecture that provides a comprehensive approach to the design, planning, implementation, and governance of an enterprise information architecture. File extension for simple text. Contracts with external suppliers that cover the delivery of services contributing to the delivery of IT services to customers. Platform-independent, XML - based registry that enables businesses worldwide to list themselves on the Internet. The integration of different streams of messages (e-mail, fax, voice, video, etc.) into a single in-box that is accessible from a variety of different devices. Non-proprietaryspecificationlanguageforobject modelling.

TASE TCO TCP

Technical Architecture Security Element Total Cost of Ownership Transmission Control Protocol

TCP/IP

Transmission Control Protocol (TCP) and the Internet Protocol (IP)

TIFF TLS

Tagged Image File Format Transport Layer Security

Transactional Features TOGAF

Transactional Features

The Open Group Architecture Framework

TXT UCs

Text File Extension Underpinning Contracts

UDDI V3

Universal Description, Discovery, and Integration UnifiedMessaging

UM

UML

UnifiedModellingLanguage

335

Appendices

Term Unit Testing

Standard Unit Testing

Description* Testing of an individual programme or module that uses a set of test cases focusing on the control structure of procedural design. These tests ensure that the internal operation of the programme performsaccordingtospecification. Device which maintains a continuous supply of electric power to connected equipment by supplying power from a separate source when utility power is not available. Compact string of characters used to identify or name a resource. AsubsetofURI,specifictoidentifiersthatare primarily locators. AUniformResourceIdentifier(URI)thatusesthe URN scheme, and does not imply availability of the identifiedresource. A variable-length character encoding for Unicode that is able to represent any universal character in the Unicode standard. A logical LAN. The W3C's standard XML format for specifying interactive voice dialogues between a human and a computer. The routing of voice conversations over the Internet or through any other IP - based network. Private communications network often used within a company, or by several companies or organisations, tocommunicateconfidentiallyoverapublicly accessible network. International consortium where member organisations, a full-time staff, and the public work together to develop standards for the World Wide Web. Network of communications infrastructure that typically covers several geographical areas. Open international standard for applications that use wireless communication whose principal application is to enable Internet access via a mobile phone or PDA.

UPS

Uninterruptedly Power Supply

URI URL URNs

UniformResourceIdentifier Uniform Resource Locator Uniform Resource Names

UTF - 8

8-bit Unicode Transformation Format Virtual Local Area Network Also VRML

VLAN VoiceXML

VoIP VPN

Voice over Internet Protocol Virtual Private Network

W3C

World Wide Web Consortium

WAN WAP

Wide Area Network Wireless Application Protocol

336

CHAPTeR 3

Term WfMC Standard WorkflowManagement Coalition Description* Non-profit,internationalorganisationofworkflow vendors, users, analysts, and university/research groups aiming to promote and develop the use of workflowthroughtheestablishmentofstandards for software terminology, interoperability, and connectivitybetweenworkflowproducts. DigitalaudiofileformatcreatedbyMicrosoft. GraphicfileformatcreatedbyMicrosoft. Markup language used in mobile phones with Wireless Application Protocol. Follow-on security standard to WPA for wireless networks. Software system designed to support interoperable, machine-to-machine interaction over a network. XMLdialectusedtodefinebusinessprocess execution. Based on XML, this is a content format for devices that implement the WAP Wireless Application Protocolspecificationsuchasmobilephonesand preceded the use of other markup languages now used with WAP such as XHTML and standard HTML (which are gaining in popularity as processing power in mobile devices increases). Pronounced`wiz-dull',anXML-basedlanguage that provides a model for describing Web services. Version 1.1 has not been endorsed by the World Wide Web Consortium (W3C). Version 2.0, for which several drafts have been released, is expected to become a W3C recommendation. A standard for content aggregators, such as Web portals, to access and display content sources (i.e., portlets) that are hosted on a remote server. WSRP is a technology-agnostic protocol designed for accessing remote portlets in a standard manner. The WSRPspecificationdefinesaWebserviceinterface for interacting with interactive presentation-oriented Web services. An industry consortium chartered to promote interoperability amongst the stack of Web services specifications. Provides interoperability guidance for core Web ServicesspecificationssuchasSOAP,WSDL,and UDD.

WMA WMF WML WPA2

Windows Media Audio WindowsMetafile Wireless Markup Language Wi-Fi Protected Access 2

WS WS-BPEL WML

Web Services Business Process Execution Language for Web Services Wireless Markup Language

WSDL

WebServiceDefinition Language

WSRP

Web Services for Remote Portlets

WS - I

Web Services Interoperability Organisation Web Services-Interoperability BasicProfile

WS - I Basic Profile

337

Appendices

Term WSIF

Standard Web Services Invocation Framework Web Services Management XASpecification Extensible Business Reporting Language Extensible Hypertext Markup Language Microsoft Excel File Extension XML Metadata Interchange

Description* Follows the semantics of WSDL as much as possible. Meant to be used when existing semantics of WSDL donotsufficeandneedtobeextended. The act of managing interaction between machines over a network. Describes what a resource manager must do to support transactional access. EmergingXML-basedstandardtodefineand exchangebusinessandfinancialperformance information. Markup language that has the same expressive possibilities as HTML, but stricter syntax. File extension for Microsoft Excel Workbooks. Specifiesanopen-interchangemodelintendedto give developers working with object and distributed technology the ability to exchange data between tools, applications, repositories, business objects, and programmes. General purpose markup language for creating special purpose markup languages; capable of describing many different kinds of data. An open, XML - based protocol for near realtime, extensible instant messaging and presence information. XML query language designed to be broadly applicable across many types of XML data sources. Family of languages that enables the description ofhowfilesencodedintheXMLstandardaretobe formatted or transformed. W3C-recommended, general purpose markup language that supports a wide variety of applications.XMLlanguagesor"dialects"are easy to design and process. The primary purpose is to facilitate the sharing of data across different information systems, particularly systems connected via the Internet. XML language for transforming XML documents.

WSM XA XBRL

XHTML XLS XMI

XML

Extensible Markup Language

XMPP

Extensible Messaging and Presence Protocol W3C Xquery Extensible Style sheet Language Extensible Markup Language

Xquery XSL

XML

XSL(T)

Extensible Style sheet Language (Transformation)

*

Source: www.wikipedia.org

338

CHAPTeR 3

339

Information

Abu Dhabi IT Architecture & Standards v2.0

30 pages

Find more like this

Report File (DMCA)

Our content is added by our users. We aim to remove reported files within 1 working day. Please use this link to notify us:

Report this file as copyright or inappropriate

1006691


You might also be interested in

BETA
Mise en page 1
Management: Leading and Collaborating in a Competitive World, 8/e