Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Has description" with value "The Working Area "Middleware" comprises the facilities that provide (bus". Since there have been only a few results, also nearby values are displayed.

Showing below up to 25 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • ENV.Data Centre.Back-end  + (In the Data Centre - Back End Environment,In the Data Centre - Back End Environment, facilities are in place to support and secure data management, data exchange between business functions/applications, used by ArchiSurance, and also facilities from the Server Working Area, and facilities to implement security and management. The facilities in this Environment are provided and managed by ArchiSurance. In the Data Centre Environment, physical conditions (like power supply, cooling, fire prevention and physical security) meet very high standards.ysical security) meet very high standards.)
  • ENV.Data Centre - Storage  + (In the Data Centre Environment facilities are in place to support reliable and fast data storage. Physical conditions (like power supply, cooling, fire prevention and physical security) meet very high standards.)
  • NW.ENV.Regional  + (In the Environment Regional, facilities arIn the Environment Regional, facilities are in place to establish connections between ArchiSurance sites that form one business region. In a business region, headquarters, branch offices, warehouses and Distribution Points are connected to each other. A special type of connection within this Environment is formed by the connections to Internet Service Providers (ISPs), that are established at regional level (instead of global).hed at regional level (instead of global).)
  • ST.ENV.Off-Site  + (In the Off Site Environment facilities are in place to protect (archived) data collections. In the Off Site Environment, physical conditions (like fire prevention and physical security) meet very high standards.)
  • ENV.Office Guest  + (In the Office Guest environment, facilities are in place for unauthenticated users and equipment to access the public Internet (contractors, visitors).)
  • ST.ENV.On Site  + (In the On Site Environment, facilities are in place that provide local data storage (mostly on a remote ArchiSurance premise).)
  • PAV.Data Transport.Public  + (Instances of this facility provides data transport between locations outside of ArchiSurance's own premises and the ArchiSurance IT facilities.)
  • EL.Red Hat Enterprise Linux SmartHat  + (Red Hat Enterprise Linux (abbreviated RHELRed Hat Enterprise Linux (abbreviated RHEL) is a Linux distribution produced by Red Hat and targeted toward the commercial market, including mainframes. Red Hat commits to supporting each version of Red Hat Enterprise Linux for 7 years after its release. New versions are released every 18 to 24 months. ArchiSurance has composed it's own standard version based on RHEL, named SmartHat.ard version based on RHEL, named SmartHat.)
  • BV.Identity Validation.SAP  + (SAP Authentication (native).)
  • BV.Permission Validation.SAP  + (SAP Authorization (native).)
  • EL.SAP Database Guideline  + (SAP provides the possibility to install several components independently in one single database (MCOD). Multiple Components in One Database is a feature in the installation process for SAP NetWeaver based SAP components.)
  • EL.SAPRouter  + (Software to implement the SAP specific Session Endpoint facility)
  • MW.BV.Database Management.SAP Database  + (Some SAP Database capabilities are undesirable for use in the case of ArchiSurance.)
  • EL.Strong Encryption  + (Strong encryption means a form of data encStrong encryption means a form of data encryption that is highly resistant to cryptoanalysis. This requires both a strong encryption algorithm and a matching key. As of january 2012, ArchiSurance considers the following algorithms "strong":</br>* WPA2 (for wireless communications)</br>* SSL2</br>* AES</br>* PGPireless communications) * SSL2 * AES * PGP)
  • ENV.Remote  + (The "Remote" Environment is a quite abstraThe "Remote" Environment is a quite abstract type of Environment and is to be considered as any place that is beyond administrative and security control of ArchiSurance. Although client facilities in this Environment might be provided by ArchiSurance (e.g. a mobile PC or a phone), in the Remote Environment they are used without corporate supervision and easily accessible for others. Access to ArchiSurance centralized IT resources is provided by Internet connections.urces is provided by Internet connections.)
  • ENV.Data Centre.DMZ  + (The Data Centre - Demilitarized Zone (DMZ)The Data Centre - Demilitarized Zone (DMZ) Environment comprises facilities for communication between (both internal and external) end users/other party's systems on one hand and applications in the Back End Environment on the other hand. In the Data Centre - DMZ Environment, physical conditions (like power supply, cooling, fire prevention and physical security) meet very high standards.</br></br>This environment is complemented by/adjacent to the Data Centre - Back-end environment.to the Data Centre - Back-end environment.)
  • ENV.External  + (The External Environment comprises facilities that are used to support business functions used by ArchiSurance, but not provided nor managed by ArchiSurance (administrative responsibility).)
  • ST.ENV.Remote  + (The Remote Environment comprises all data The Remote Environment comprises all data storage facilities that are located on a non-ArchiSurance, non-controlled location. There is no way ArchiSurance can impose Quality demands on facilities within this Environment. However, this Environment has been created to be aware of the fact that some ArchiSurance data will travel its own way. To limit this, policies should be in place and maintained to prevent spraying of data.nd maintained to prevent spraying of data.)
  • BV.Session Endpoint.SAP Router  + (The SAP Router provides several connection services for a SAP Application.)
  • Client Realm (CR)  + (The Working Area "Client Realm" is where wThe Working Area "Client Realm" is where we find all facilities that offer means to process input from or deliver output to end users. This Working Area thus includes facilities like PC's, printers, scanners and telephones, but also specialized facilities like kiosks or Point-of-Sale equipment (cash registers, bar code scanners). They share a couple of characteristics:</br>* the functionality involves either receiving input from, or creating output to the end user, or both;</br>* the functionality is always realized at the location of an end user, or a group of end users.n of an end user, or a group of end users.)
  • Middleware (MW)  + (The Working Area "Middleware" comprises thThe Working Area "Middleware" comprises the facilities that provide (business) application support, like messaging, identity and resource management.</br>Generally they share a couple of characteristics:</br>* the functionality is closely related to those of Building Blocks from the Working Area Server;</br>* the functionality is usually being shared by multiple applications;</br>* the functionality provided is not intended to be used directly, but to support (business) applications.y, but to support (business) applications.)
 (The Working Area "Middleware" comprises the facilities that provide (bus)
  • Network (NW)  + (The Working Area "Network" comprises facilThe Working Area "Network" comprises facilities that are used to transport, and optionally control, manipulate and shape data between systems and locations. </br></br>Generally these facilities share a couple of characteristics:</br>* the functionality always concerns the transport of digital data between machines;</br>* the functionality provided has a supportive nature and cannot be used directly by end users and/or applications.directly by end users and/or applications.)
  • Server (SE)  + (The Working Area "Server" comprises centraThe Working Area "Server" comprises centralized computing capacity and facilities. Next to business application execution, this Working Area encompasses many centrally processed functions, like e-mail handling, print spooling, call management et cetera. </br></br>Generally, they share a couple of characteristics:</br>* the functionality is offered to business applications and end users;</br>* the functionality is offered non-locally: some form of networking facilities are employed to provide intended users access to centralized facilities and applications.o centralized facilities and applications.)
  • Storage (ST)  + (The Working Area "Storage" compromises facThe Working Area "Storage" compromises facilities that supply (physical) data retention/preservation. </br></br>Infrastructure facilities in this Working Area share a couple of characteristics:</br>* their functionality relates not only to storing of data for a longer or shorter period of time, but also retrieval of it; </br>* their functionality is never offered to end users directly.ty is never offered to end users directly.)
  • BV.Receipt Printer  + (The receipt printer is a facility that delivers a paper receipt to customer that lists the goods they have purchased.)
  • EL.Guideline SAP Product Matrix  + (The software supplier SAP delivers her appThe software supplier SAP delivers her applications capable to run on different hardware platform, operating systems and database management systems. However, the supported combinations are limited.</br></br>For the latest information see http://service.sap.com/pam. (userid and password required) or ask the owner of this pagerd required) or ask the owner of this page)
  • EL.SAP Configuration Advice  + (There are two key factors that determine the design of a SAP system: The first factor is the availability demanded by the business, the second factor is the expected load on the system. On the basis of these factors, a suitable solution must be chosen.)
  • NW.ENV.Webhosting  + (This Environment comprise the facilities tThis Environment comprise the facilities that offer network connectivity to server platforms/appliances that are used to support processes and applications that are accessed by external users/machines. It also accommodates facilities to connect to other networks, like the Internet, (business) partners and contractors.rnet, (business) partners and contractors.)
  • ENV.Not Specified  + (This Environment is a placeholder for when an Environment hasn't yet, or cannot be assigned.)
  • NW.ENV.Server  + (This Environment is intended to comprise the facilities that offer network connectivity to server platforms/appliances that are used to support internal processes.)
  • LOC.Not Specified  + (This Location is a placeholder for when an Location hasn't yet, or cannot be assigned.)
  • PAV.Application Hosting.Cloud - Internal Access Only Best Effort  + (This Pattern Variant defines the implementation outline of a solution that provides best effort application hosting, making use of a Cloud service.)
  • PAV.File Storage.Local  + (This Pattern retains data in loosely structured form, local to the facility or device.)
  • PAV.User Workspace.Tablet  + (This facility can be used to obtain access to centralized workspaces and/or corporate data on the organization's network. It can also run local applications and make use of the Internet.)
  • PAV.Facilities Deployment.Vendor Market  + (This facility can deploy 3rd party apps to a specific class or brand of devices.)
  • PAV.User Workspace.Corporate Central  + (This facility offers business users a standardized set of business and office applications, accessible from a user's own local device/client.)
  • BV.Control Interface.Cloud Platforms  + (This facility provides a Cloud service provider specific centralized Control Interface to manage Cloud Application solutions.)
  • BV.Presentation Aggregation.Cloud Portal - Internal Use  + (This facility provides a centralized Cloud Portal to access Cloud applications in a standardized way.)
  • BV.Application Engine.Cloud - Internal Use Best Effort  + (This facility provides a run-time environment for the execution of application code, based on Cloud Provider standards.)
  • BV.Presentation.Cloud - Internal Use  + (This facility provides a user interface to the application that is executed by the Application Engine and formats data that is being exchanged by the application, for example application messages.)
  • BV.Identity Validation.DMZ  + (This facility provides authentication of external end-users, to be used in the DMZ Part of the Data Centre)
  • BV.Permission Validation.DMZ  + (This facility provides authorization of external end-users, to be used in the DMZ Part of the Data Centre.)
  • BV.Workspace Accommodation.Tablet  + (This function provides the connectivity and integration between the Tablet device and its peripherals. It's intended to make it possible to make use of a certain set of peripherals, such as external keyboards and mice.)
  • BV.Presentation Engine.Integrated Tablet  + (This function provides the user interface for the Tablet device. This interface is adapted from common computer interfaces to handle touchscreen input and output.)
  • BV.User Input.Tablet Peripherals  + (This function represents the (external) peThis function represents the (external) peripherals that can supply a tablet with input, such as an external keyboard and/or mouse, stereo microphone, external harddisk etc. In some situations the standard input facilities of a tablet function less than optimal; in these cases one or more peripherals may be able to improve the user input experience.able to improve the user input experience.)
  • Security + Support (SS)  + (This working area contains functions that are mainly used to enforce IT security, and/or help the IT administrators in their support of the infrastructure.)