Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of values that have the property "Has description" assigned.

Showing below up to 71 results starting with #1.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)


    

List of results

  • -  +
  • .  +
  • Application Platform with an ABAP kernel for SAP built applications.  +
  • Application Platform with an JAVA kernel for SAP built applications.  +
  • Central logging for SAP Applications.  +
  • Central monitoring for SAP Applications.  +
  • Connection between SAP GmbH and the SAP applications at the customer.  +
  • Enables input of control information and data from an end-user.  +
  • SAP Authentication (native).  +
  • SAP Authorization (native).  +
  • Software to implement the SAP specific Session Endpoint facility  +
  • j  +
  • '''S'''imple '''N'''etwork '''M'''anagemen'''S'''imple '''N'''etwork '''M'''anagement '''P'''rotocol (SNMP) </br></br>A version of a widely used network monitoring and control protocol, superseded in 2004 by SNMP v3. The IETF considers this version v2 to be "obsolete" or "historical". The v2 version of the SNMP protocol had an (overly) complex party-based security model, which resulted in the creation of a subversion SNMPv2c which has a simpler security model (much like v3). When SNMPv2 is referred to, usually SNMPv2c is meant. is referred to, usually SNMPv2c is meant.  +
  • An ABAP or Java-based SAP system runs on tAn ABAP or Java-based SAP system runs on top of the SAP Web Application Server. This software serves as an abstraction layer between the underlying operating system and database system to the ABAP or Java applications. The applications then are coded and run in an OS and DB-independent manner. The execution environment of the applications is often referred to as a Runtime system.</br></br>Thus, the kernel of an SAP system consists of all native programs and dynamic libraries that are required for launching the Runtime, executing ABAP or Java codes, communicating with the outside world of the application server like OS, DB and network. These native binaries can be categorized through different aspects:</br>* DB-dependent vs. DB-independent: While all native binaries are OS-specific, they can be grouped in either database-dependent or independent manner. Mostly there are numerous database management systems available for a particular Operating System. The DB-dependent part -- which is small in size -- presents the abstraction layer to the particular database system and the DB-independent part -- which makes up the vast majority of all native codes -- presents the abstraction layer to the rest of the outside world.</br>* Unicode vs. Non-Unicode: Depending on users' requirement, an SAP system supports data encoding either as Unicode or as non-Unicode. Since the processing of Unicode data and non-Unicode data respectively are slightly different, the kernel binaries are compiled accordingly.</br>* Primary vs. subsidiary: Some of the kernel binaries are permanently loaded in the memory when the system is running. We call them primary. In other words, without the primary codes, the system is not functioning. Contrary to the primary programs, the subsidiary programs provide tools and services which are used occasionally, no matter whether the system is running or not, in terms of OS and DB abstraction. </br>Before 2004, SAP applications had their own version of the kernel. As of 2004, all SAP application use the same kernel., all SAP application use the same kernel.  +
  • An SMTP-compatible mail transfer agent (MTAn SMTP-compatible mail transfer agent (MTA) is an MTA ("mail server") that transfers e-mails, as long as they are offered over SMTP. Specification of this Element means that the designer is free to choose any Mail Transfer Agent (s)he likes, as long as it fully supports SMTP. likes, as long as it fully supports SMTP.  +
  • An instance of this Pattern Variant supports local security to a facility or device. It offers a means for entities to identify or authenticate themselves, and offers authorization services for actions on local resources.  +
  • Any mobile device that can store digital iAny mobile device that can store digital information must adhere to the following guideline:</br>* if the device is a Company Owned & Controlled Device (COCD), then it must use strong encryption when storing any form of company data;</br>* if the device is '''not''' COCD, then it is not allowed to store company data at all.t is not allowed to store company data at all.  +
  • Any realization of an infrastructure serviAny realization of an infrastructure service or function that's storing data must support a portability for this data that's proportional to its volume, currency and importance to the organization.</br></br>Every realization of a service or function will eventually be phased out. Unless the data in this realization is volatile, obsolete, or unimportant, the data will have to be ported to a new realization of the service. To this end, the data must be exported from the current system, conserving as much as possible the (meta)data and correlation, and then imported in the new system, again conserving (meta)data and correlation. All (meta)data and correlation that's lost will either remain lost, or must be recreated in the new system using labour, customization and/or conversion, increasing cost (in money, time, and/or risk).</br></br>The more data portability a realization has, the less cost will be involved when changing the realization.</br></br>Data portability is especially relevant when outsourcing parts of the infrastructure. If the supplier of the infrastructure service fails, or if the quality of their service doesn't suffice, then the service may need to be outsourced to another party, or maybe even be insourced again. Lack of sufficient data portability will then present a significant additional cost.hen present a significant additional cost.  +
  • Application Platform with an ABAP and JAVA kernel for SAP built applications.  +
  • Central User administration is the SAP appCentral User administration is the SAP application that enables you to maintain user master records centrally in one system. Changes to the information are then automatically distributed to the child systems. This means that you have an overview in the central system of all user data in the entire system landscape. user data in the entire system landscape.  +
  • Deployment of customization, ABAP and JAVA programs for SAP Applications through the SAP landscape.  +
  • Enables output of interface information to the end-user. This variant is used to accommodate User Workspaces where the screen (a variant of User Input) provides the User Output functionality at the same time.  +
  • Facilities in the "Distribution Point" envFacilities in the "Distribution Point" environment support the automation of storage and end-point delivery of groceries. Some facilities from the Working Area Server are located here (in a distributed form) in order to minimize the networking capacity that is needed. Examples of those facilities are Mail Stores, Print Queues and Document Management provisions.Queues and Document Management provisions.  +
  • In the "Mobile Office" Environment, it is In the "Mobile Office" Environment, it is possible to access ArchiSurance IT resources by means of a facilities kit that can be moved easily and is equipped with wireless connectivity solutions that are widely supported. These are employed to support "on location" activities, decreasing the need for travelling to and from ArchiSurance offices. Some facilities kits are deployed from specially prepared flying cases, others are built in special vans.</br></br>Examples within ArchiSurance: Auction halls, trade fairs, et cetera.ce: Auction halls, trade fairs, et cetera.  +
  • In the "Office" Location, facilities are iIn the "Office" Location, facilities are in place to provide regular, controlled access to and use of ArchiSurance IT resources, for ArchiSurance personnel. This includes all offices that are owned/rented by ArchiSurance, offering access to facilities, dedicated to the use of ArchiSurance employees.ated to the use of ArchiSurance employees.  +
  • In the "Office" environment, facilities arIn the "Office" environment, facilities are in place to provide regular, controlled access to and use of ArchiSurance IT resources, for ArchiSurance personnel. This includes all offices that are owned/rented by ArchiSurance, offering access to facilities, dedicated to the use of ArchiSurance employees.ated to the use of ArchiSurance employees.  +
  • In the Data Centre - Back End Environment,In the Data Centre - Back End Environment, facilities are in place to support and secure data management, data exchange between business functions/applications, used by ArchiSurance, and also facilities from the Server Working Area, and facilities to implement security and management. The facilities in this Environment are provided and managed by ArchiSurance. In the Data Centre Environment, physical conditions (like power supply, cooling, fire prevention and physical security) meet very high standards.ysical security) meet very high standards.  +
  • In the Data Centre Environment facilities are in place to support reliable and fast data storage. Physical conditions (like power supply, cooling, fire prevention and physical security) meet very high standards.  +
  • In the Environment Regional, facilities arIn the Environment Regional, facilities are in place to establish connections between ArchiSurance sites that form one business region. In a business region, headquarters, branch offices, warehouses and Distribution Points are connected to each other. A special type of connection within this Environment is formed by the connections to Internet Service Providers (ISPs), that are established at regional level (instead of global).hed at regional level (instead of global).  +
  • In the Off Site Environment facilities are in place to protect (archived) data collections. In the Off Site Environment, physical conditions (like fire prevention and physical security) meet very high standards.  +
  • In the Office Guest environment, facilities are in place for unauthenticated users and equipment to access the public Internet (contractors, visitors).  +
  • In the On Site Environment, facilities are in place that provide local data storage (mostly on a remote ArchiSurance premise).  +
  • Instances of this facility provides data transport between locations outside of ArchiSurance's own premises and the ArchiSurance IT facilities.  +
  • Red Hat Enterprise Linux (abbreviated RHELRed Hat Enterprise Linux (abbreviated RHEL) is a Linux distribution produced by Red Hat and targeted toward the commercial market, including mainframes. Red Hat commits to supporting each version of Red Hat Enterprise Linux for 7 years after its release. New versions are released every 18 to 24 months. ArchiSurance has composed it's own standard version based on RHEL, named SmartHat.ard version based on RHEL, named SmartHat.  +
  • SAP provides the possibility to install several components independently in one single database (MCOD). Multiple Components in One Database is a feature in the installation process for SAP NetWeaver based SAP components.  +
  • Some SAP Database capabilities are undesirable for use in the case of ArchiSurance.  +
  • Strong encryption means a form of data encStrong encryption means a form of data encryption that is highly resistant to cryptoanalysis. This requires both a strong encryption algorithm and a matching key. As of january 2012, ArchiSurance considers the following algorithms "strong":</br>* WPA2 (for wireless communications)</br>* SSL2</br>* AES</br>* PGPireless communications) * SSL2 * AES * PGP  +
  • The "Remote" Environment is a quite abstraThe "Remote" Environment is a quite abstract type of Environment and is to be considered as any place that is beyond administrative and security control of ArchiSurance. Although client facilities in this Environment might be provided by ArchiSurance (e.g. a mobile PC or a phone), in the Remote Environment they are used without corporate supervision and easily accessible for others. Access to ArchiSurance centralized IT resources is provided by Internet connections.urces is provided by Internet connections.  +
  • The Data Centre - Demilitarized Zone (DMZ)The Data Centre - Demilitarized Zone (DMZ) Environment comprises facilities for communication between (both internal and external) end users/other party's systems on one hand and applications in the Back End Environment on the other hand. In the Data Centre - DMZ Environment, physical conditions (like power supply, cooling, fire prevention and physical security) meet very high standards.</br></br>This environment is complemented by/adjacent to the Data Centre - Back-end environment.to the Data Centre - Back-end environment.  +
  • The External Environment comprises facilities that are used to support business functions used by ArchiSurance, but not provided nor managed by ArchiSurance (administrative responsibility).  +
  • The Remote Environment comprises all data The Remote Environment comprises all data storage facilities that are located on a non-ArchiSurance, non-controlled location. There is no way ArchiSurance can impose Quality demands on facilities within this Environment. However, this Environment has been created to be aware of the fact that some ArchiSurance data will travel its own way. To limit this, policies should be in place and maintained to prevent spraying of data.nd maintained to prevent spraying of data.  +
  • The SAP Router provides several connection services for a SAP Application.  +
  • The Working Area "Client Realm" is where wThe Working Area "Client Realm" is where we find all facilities that offer means to process input from or deliver output to end users. This Working Area thus includes facilities like PC's, printers, scanners and telephones, but also specialized facilities like kiosks or Point-of-Sale equipment (cash registers, bar code scanners). They share a couple of characteristics:</br>* the functionality involves either receiving input from, or creating output to the end user, or both;</br>* the functionality is always realized at the location of an end user, or a group of end users.n of an end user, or a group of end users.  +
  • The Working Area "Middleware" comprises thThe Working Area "Middleware" comprises the facilities that provide (business) application support, like messaging, identity and resource management.</br>Generally they share a couple of characteristics:</br>* the functionality is closely related to those of Building Blocks from the Working Area Server;</br>* the functionality is usually being shared by multiple applications;</br>* the functionality provided is not intended to be used directly, but to support (business) applications.y, but to support (business) applications.  +
  • The Working Area "Network" comprises facilThe Working Area "Network" comprises facilities that are used to transport, and optionally control, manipulate and shape data between systems and locations. </br></br>Generally these facilities share a couple of characteristics:</br>* the functionality always concerns the transport of digital data between machines;</br>* the functionality provided has a supportive nature and cannot be used directly by end users and/or applications.directly by end users and/or applications.  +
  • The Working Area "Server" comprises centraThe Working Area "Server" comprises centralized computing capacity and facilities. Next to business application execution, this Working Area encompasses many centrally processed functions, like e-mail handling, print spooling, call management et cetera. </br></br>Generally, they share a couple of characteristics:</br>* the functionality is offered to business applications and end users;</br>* the functionality is offered non-locally: some form of networking facilities are employed to provide intended users access to centralized facilities and applications.o centralized facilities and applications.  +
  • The Working Area "Storage" compromises facThe Working Area "Storage" compromises facilities that supply (physical) data retention/preservation. </br></br>Infrastructure facilities in this Working Area share a couple of characteristics:</br>* their functionality relates not only to storing of data for a longer or shorter period of time, but also retrieval of it; </br>* their functionality is never offered to end users directly.ty is never offered to end users directly.  +
  • The receipt printer is a facility that delivers a paper receipt to customer that lists the goods they have purchased.  +
  • The software supplier SAP delivers her appThe software supplier SAP delivers her applications capable to run on different hardware platform, operating systems and database management systems. However, the supported combinations are limited.</br></br>For the latest information see http://service.sap.com/pam. (userid and password required) or ask the owner of this pagerd required) or ask the owner of this page  +
  • There are two key factors that determine the design of a SAP system: The first factor is the availability demanded by the business, the second factor is the expected load on the system. On the basis of these factors, a suitable solution must be chosen.  +
  • This Environment comprise the facilities tThis Environment comprise the facilities that offer network connectivity to server platforms/appliances that are used to support processes and applications that are accessed by external users/machines. It also accommodates facilities to connect to other networks, like the Internet, (business) partners and contractors.rnet, (business) partners and contractors.  +
  • This Environment is a placeholder for when an Environment hasn't yet, or cannot be assigned.  +
  • This Environment is intended to comprise the facilities that offer network connectivity to server platforms/appliances that are used to support internal processes.  +
  • This Location is a placeholder for when an Location hasn't yet, or cannot be assigned.  +
  • This Pattern Variant defines the implementation outline of a solution that provides best effort application hosting, making use of a Cloud service.  +
  • This Pattern retains data in loosely structured form, local to the facility or device.  +
  • This facility can be used to obtain access to centralized workspaces and/or corporate data on the organization's network. It can also run local applications and make use of the Internet.  +
  • This facility can deploy 3rd party apps to a specific class or brand of devices.  +
  • This facility offers business users a standardized set of business and office applications, accessible from a user's own local device/client.  +
  • This facility provides a Cloud service provider specific centralized Control Interface to manage Cloud Application solutions.  +
  • This facility provides a centralized Cloud Portal to access Cloud applications in a standardized way.  +
  • This facility provides a run-time environment for the execution of application code, based on Cloud Provider standards.  +
  • This facility provides a user interface to the application that is executed by the Application Engine and formats data that is being exchanged by the application, for example application messages.  +
  • This facility provides authentication of external end-users, to be used in the DMZ Part of the Data Centre  +
  • This facility provides authorization of external end-users, to be used in the DMZ Part of the Data Centre.  +
  • This function provides the connectivity and integration between the Tablet device and its peripherals. It's intended to make it possible to make use of a certain set of peripherals, such as external keyboards and mice.  +
  • This function provides the user interface for the Tablet device. This interface is adapted from common computer interfaces to handle touchscreen input and output.  +
  • This function represents the (external) peThis function represents the (external) peripherals that can supply a tablet with input, such as an external keyboard and/or mouse, stereo microphone, external harddisk etc. In some situations the standard input facilities of a tablet function less than optimal; in these cases one or more peripherals may be able to improve the user input experience.able to improve the user input experience.  +
  • This working area contains functions that are mainly used to enforce IT security, and/or help the IT administrators in their support of the infrastructure.  +
  • Traffic Filtering facility to control traversal of data traffic that originates from the Internet as an outer perimeter defence.  +
  • Within this Environment, networking connections between international branches of ArchiSurance reside.  +