Property:Brief description
Jump to navigation
Jump to search
A "Brief description", of type text, serves as a short, functional description for an infrastructure artefact.
Note: the string must preferably be less than 256 characters
F
Hiding of data/objects in order to preserve confidentiality +
Manipulation of behavior +
Command interaction +
Interoperation control +
Connection of (equal) parts +
Removal of exact copy instances +
Organization of representation +
Transfer, including its completion +
Placement in a position for utilization +
(Re)allocation to bring on or closer to the destination +
Application of wrapping to protect or to hide +
Protective conversion +
Removal of unwanted items during transit +
Prearrangement for usage +
Treatment, manipulation, management +
Creation of reference (points) +
Linkage to bridge a distance or difference +
Preservation of a state +
Recording of activities/events +
Registration of condition/quantity +
Creation of exact copy instances +
Act of information, providing of an informative message/signal +
Put aside to make room (for example transferring data to a cheaper medium) +
Arrangement of automated processes +
Conservation in the state in which/existing +
Arrangement of right of way +
Preparation/placement to fulfill a demand on beforehand +
Removal of the unwanted/unnecessary +
Ordering for dispatch order +
Admission/Intake +
Registration/Transcription +
Decrease in volume +
Distributed retention +
Creation of an exact copy of an instance +
Presentation of events/results of an automated analysis +
Substitution of one data type for another, with translation of the corresponding values +
Automated response on behalf of intended recipient +
Storage facilitation +
Targeted pickup +
Sweeping/probing search or digitalization operation +
Assignment of preference +
Transportation engagement +
Interaction to establish communication +
Preservation of state +
Ranking (according to a predefined hierarchy) +
Movement from one place to another +
Conversion from one appearance, form, representation, state, or phase into another +
Conversion from one expression, state, or phase into another +
Shielded/abstracted transmission +
Inspection on (global) accuracy/correctness +
Inspection on (internal) completeness/genuineness +
Revision control/instance preservation +
G
Access Aggregation is a logical infrastructure function that performs the tasks required to group multiple Access Conditioning instances. +
Access Conditioning handles tasks that the infrastructure architect associates with obtaining access to an infrastructure facility. +
The Name Resolution serves lookups from a store of connected names and addresses. +
Alerting serves to notify clients of, and/or trigger other services/functions on, certain predefined conditions or events. +
This function offers a run-time environment for applications. +
This function provides preservation with retention policies as add-on to another storage function. +
This function offers to hold collections of data that are duplicated from elsewhere, or buffer data in transit. +
The Configuration Register function retains sets of configuration parameters for one or more IT facilities. +
This function collects a service or (sub)system's configuration, and sends it to a consumer. +
This function covers all behaviour associated with the management of one end of a communication session. +
The Content Handling function provides intelligence to manage and manipulate digital content in an automated fashion. +
Function that can ''change'' a facility's actual behaviour, the way it is ''configured''. +
This function offers the ability to process strictly structured data. +
This function aims to replicate stored data that resides in one (logical or physical) storage location to another one. +
The Data Scanning function scans through data searching for certain characteristics, and taking actions upon finding them. +
This function aims to preserve data that resides in a particular (logical or physical) location in the state that it is at a specific point in time. +
The Deploying function can automatically install and configure (software) objects on a specified (remote) location. +
Distribution routes incoming data to one or more destinations. +
This function takes care of the encryption and/or decryption of data. +
This function handles storage, retrieval and manipulation of loosely structured data. +
The Filtering function scans through data, matching it against patterns or rules, and either passing it on or not. +
This Generic Function enables message exchange between senders and receivers that use different messaging protocols/encapsulations. +
This function offers to store digital identities together with information that can serve as credentials. +
The Identity Validation function offers the ability to validate a digital identity. +
This function provides the possibility to translate physical information into digital information for use in IT facilities +
An Interconnection function offers to transport data over relatively long distances +
The Load Balancing functionality accepts data en route, and intelligently directs it to travel to one of several destinations. +
This function provides a (logical) location where logs can be written and consulted, and the ability to do so. +
This function offers to direct messages between and/or within instances of the Message Handling facility. +
This function can receive, process and/or send messages. +
The Message Filtering function checks message handling transactions, matching it against patterns or rules, and either passing messages on or not. +
This function is used to format messages for exchange between a facility and a message handling service. +
The Message Responding function provides feedback to senders regarding message delivery failures and/or recipient status. +
This function preserves and organizes digital messages. +
Converts/changes content of a message based on predefined rules during exchange. +
The Name Resolution serves lookups from a store of connected names and addresses. +
This function conveys digital information for use in the physical world, by converting digital information into events and/or physical information. +
This function offers a means to store and publish permissions (technical representations of business rules about infrastructural actions like reading or writing information). +
This function offers the ability to decide on allowing or disallowing a proposed action by a digital identity on a specified resource. +