Property:Brief description

From OIAr
Jump to navigation Jump to search

A "Brief description", of type text, serves as a short, functional description for an infrastructure artefact.

Note: the string must preferably be less than 256 characters

Showing 206 pages using this property.
D
Identifier/pointer of/to a specific machine or recipient  +
Sequence of instructions that a computer can interpret and execute  +
Unit of data on a physical storage medium  +
Systematically arranged directory of information  +
Arrangement of settings  +
State of exchange between two facilities  +
(Digital) information objects/tokens  +
Collection of similar and related data for processing  +
An occurrence that is significant for usage or working of automated systems  +
Array of equipment to afford one or more services  +
Collection of data stored as a unit with a single name  +
Information preceding a data piece to provide the context of this data  +
The fact of being who or what a person or thing is, a persisting entity  +
Exact replica of the contents of a storage medium  +
Sequence of characters and/or digits, used by a cryptographic algorithm to encrypt or decrypt data  +
A (set of) record(s) of performance, behaviour and or interaction  +
Unit of information or data that is transmitted from one user or facility to one or more other users or facilities  +
Reduced representation of (a number of aspects of) reality  +
Word or phrase that refers to a specific system or file  +
Information being pushed to communicate an event  +
The amount of (clock)time that has been elapsed between two specific moments / time interval.  +
Record of approval  +
System that hosts and/or executes applications/services  +
Display of a system or application to an end-user  +
Collection of settings for a (type of) user or machine  +
Unit of data in a structured data storage facility  +
Formalism that is used to instruct automated systems  +
Consecutive flow of data, events or activities  +
Instance of digital interaction  +
(Predefined) state an entity is in  +
Steady, time critical flow of data  +
An orderly arrangement of data, especially one in which the data are arranged in columns and rows  +
Measured or measurable period / moment, as indicated by a clock or calendar, expressed in (milli)seconds, minutes, hours, day, and/or years  +
Exchange of data between automated systems  +
Interaction between users or systems  +
Order in which and with whom/what system activities are carried out  +
Collection of facilities that facilitate end-users to interact with the digital world  +
F
Increase of speed/decrease of time needed to carry out a function  +
Enablement of entrance/usage  +
Facilitation of functions in the physical world  +
Collection into a whole  +
Notification of a status that demands intervention  +
Indisputable authentic preservation for future reference  +
Distribution into different classes/categories  +
Performance improvement by buffering and provision of quick access  +
Execution of mathematical operations  +
Real-time transmission  +
Item inventory  +
Systematic placement in categories  +
Pickup (of items specified in the data/object part)  +
Hiding of data/objects in order to preserve confidentiality  +
Manipulation of behavior  +
Command interaction  +
Interoperation control  +
Connection of (equal) parts  +
Removal of exact copy instances  +
Organization of representation  +
Transfer, including its completion  +
Placement in a position for utilization  +
(Re)allocation to bring on or closer to the destination  +
Application of wrapping to protect or to hide  +
Protective conversion  +
Execution of predefined automated tasks  +
Saving data objects in a format usable by another system  +
Removal of unwanted items during transit  +
Prearrangement for usage  +
Treatment, manipulation, management  +
Bringing data objects into one system from another  +
Creation of reference (points)  +
Digitalization (of items specified in the data/object part)  +
Linkage to bridge a distance or difference  +
Preservation of a state  +
Recording of activities/events  +
Confined search operation  +
Registration of condition/quantity  +
Creation of exact copy instances  +
Act of information, providing of an informative message/signal  +
Put aside to make room (for example transferring data to a cheaper medium)  +
Arrangement of automated processes  +
Human perceptible representation  +
Conservation in the state in which/existing  +
Arrangement of right of way  +
Preparation/placement to fulfill a demand on beforehand  +
Removal of the unwanted/unnecessary  +
Ordering for dispatch order  +
Admission/Intake  +
Registration/Transcription  +
Decrease in volume  +
Distributed retention  +
Act of passing something along  +
Creation of an exact copy of an instance  +
Presentation of events/results of an automated analysis  +
Substitution of one data type for another, with translation of the corresponding values  +
Automated response on behalf of intended recipient  +
Storage facilitation  +
Targeted pickup  +
Sweeping/probing search or digitalization operation  +
Assignment of preference  +
Transportation engagement  +
Interaction to establish communication  +
Preservation of state  +
Centralized retention  +
Ranking (according to a predefined hierarchy)  +
Movement from one place to another  +
Conversion from one appearance, form, representation, state, or phase into another  +
Conversion from one expression, state, or phase into another  +
Shielded/abstracted transmission  +
Inspection on (global) accuracy/correctness  +
Inspection on (internal) completeness/genuineness  +
Revision control/instance preservation  +
G
Access Aggregation is a logical infrastructure function that performs the tasks required to group multiple Access Conditioning instances.  +
Access Conditioning handles tasks that the infrastructure architect associates with obtaining access to an infrastructure facility.  +
The Name Resolution serves lookups from a store of connected names and addresses.  +
Alerting serves to notify clients of, and/or trigger other services/functions on, certain predefined conditions or events.  +
This function offers a run-time environment for applications.  +
This function provides preservation with retention policies as add-on to another storage function.  +
Function that creates (primary or secondary) copies of data.  +
This function offers to hold collections of data that are duplicated from elsewhere, or buffer data in transit.  +
The Configuration Register function retains sets of configuration parameters for one or more IT facilities.  +
This function collects a service or (sub)system's configuration, and sends it to a consumer.  +
This function covers all behaviour associated with the management of one end of a communication session.  +
The Content Handling function provides intelligence to manage and manipulate digital content in an automated fashion.  +
Function that can ''change'' a facility's actual behaviour, the way it is ''configured''.  +
This function offers the ability to process strictly structured data.  +
This function aims to replicate stored data that resides in one (logical or physical) storage location to another one.  +
The Data Scanning function scans through data searching for certain characteristics, and taking actions upon finding them.  +
This function aims to preserve data that resides in a particular (logical or physical) location in the state that it is at a specific point in time.  +
The Deploying function can automatically install and configure (software) objects on a specified (remote) location.  +
Distribution routes incoming data to one or more destinations.  +
This function takes care of the encryption and/or decryption of data.  +
This function handles storage, retrieval and manipulation of loosely structured data.  +
The Filtering function scans through data, matching it against patterns or rules, and either passing it on or not.  +
This Generic Function enables message exchange between senders and receivers that use different messaging protocols/encapsulations.  +
This function offers to store digital identities together with information that can serve as credentials.  +
The Identity Validation function offers the ability to validate a digital identity.  +
This function provides the possibility to translate physical information into digital information for use in IT facilities  +
An Interconnection function offers to transport data over relatively long distances  +
The Load Balancing functionality accepts data en route, and intelligently directs it to travel to one of several destinations.  +
This function provides a (logical) location where logs can be written and consulted, and the ability to do so.  +
This function offers to direct messages between and/or within instances of the Message Handling facility.  +
This function can receive, process and/or send messages.  +
The Message Filtering function checks message handling transactions, matching it against patterns or rules, and either passing messages on or not.  +
This function is used to format messages for exchange between a facility and a message handling service.  +
The Message Responding function provides feedback to senders regarding message delivery failures and/or recipient status.  +
This function preserves and organizes digital messages.  +
Converts/changes content of a message based on predefined rules during exchange.  +
The Name Resolution serves lookups from a store of connected names and addresses.  +
This function conveys digital information for use in the physical world, by converting digital information into events and/or physical information.  +
This function offers a means to store and publish permissions (technical representations of business rules about infrastructural actions like reading or writing information).  +
This function offers the ability to decide on allowing or disallowing a proposed action by a digital identity on a specified resource.  +
This function provides a single point of access to a variety of information and/or applications.  +
This function processes input to and output from an infrastructure facility.  +
Provides the ability to process traffic based various queuing policies.  +
Function that handles storing/retrieving/updating/deleting unstructured data such as bits and bytes.  +
This function encodes data using fewer bits than the original representation, and/or restores it to its original form if so requested.  +
A Reporting function can take data from a connected source, process it, and then deliver focused, salient content to its clients.  +
Function that restores a secondary copy of data to the original, or to an alternative, location.  +
This function offers intelligent handling of data at the "unstructured data" abstraction level.  +
This function can have the infrastructure perform actions based on rules.  +
This Function provides control over tasks, based on schedules, events, triggers, and other control information.  +
Informing its user of the state of some object, system, or (infrastructure) facility.  +
This function collects a service or (sub)system's status, and sends it to a consumer.  +
This function supports the retention of "strictly structured data", e.g. a database.  +
This function is used to coordinate series of transactions that involve two or more distinct services.  +
This function makes ICT functionality available at a specific physical location and in a specific manner.  +
This function offers a run-time environment for applications that require direct input from, and/or output to, the physical world.  +
This function serves to increase the maximum load that a given resource can handle, and/or allowing access to instances of the resource spread over multiple sites.  +
An implementation of this Pattern can be used to secure access to back-end resources.  +
The Application Hosting function can accommodate (business) application services.  +
Helps to secure IT facilities and applications by validating digital identities and permissions.  +
This pattern hosts relatively static content, and makes it available to authorized users in a suitable form.  +
This Pattern provides the ability to manage and make use of "strictly structured data", i.e. it controls the organization, querying, and retrieval of sets of organized data.  +
This Pattern can help to realize a level of data protection for sets of data and/or convert these sets into archives.  +
This Pattern provides the means to transport digital data between automated systems.  +
This Pattern realizes a security separation between different Data Transport zones.  +
This Function can deploy the software part of an IT (sub)system, and/or configurations thereof.  +
This Pattern helps Operations and Security personnel to monitor other facilities for noteworthy events.  +
This Pattern offers functionality to manipulate (store, retrieve and modify et cetera) data in loosely structured form (e.g. files).  +
Instances of this Generic Pattern are able to maintains the propagation and consistency of digital identities and digital permissions that are recognized within the organization.  +
This Pattern provides a means to transport loosely structured data from a source to one or more targets, either ad hoc or structurally..  +
This Pattern accepts messages from senders, and then handles transport, storage, and delivery to recipients.  +
This Pattern offers functionality for the storage and retrieval of unstructured data at a single, logical location; it may also provide "intelligence" to administrators and/or consumers.  +
This Pattern models a gateway between the physical and digital world, such as a user workspace.  +
This service serves to increase the maximum load that an IT resource can handle, and/or to allow access to instances of the resource spread over multiple sites.  +
This service is used to secure access to back-end resources.  +
Application Hosting provides functionality to accommodate (business) application services.  +
This service provides the ability to create and use archives.  +
This service can validate an identity claim, and it can validate the permissions required for an action, as part of an Authentication & Authorization process.  +
This service provides the ability to create and manage backups, and to restore (parts of) those backups.  +
This service hosts relatively static content, and makes it available to authorized users in a suitable form.  +
This service provides its consumers the ability to manage strictly structured data.  +
This service provides the ability to protect data against accidental or wilful corruption.  +
This service transports data between automated systems.  +
This service satisfies relevant security requirements while passing data between different Data Transport services.  +
This Service can deploy the software part of an IT systems, and/or configurations thereof.  +
This service allows its users to monitor IT facilities with the aim of guarding operational continuity or security.  +
This service offers clients the ability to store, retrieve and modify data in loosely structured form.  +
This service maintains the propagation and consistency of digital identities and digital permissions that are recognized within the organization.  +
This service provides a means to transport loosely structured data from a source to one or more targets, either ad hoc or structurally.  +
This service handles transport, storage and delivery of messages between senders and recipients.  +
This service offers to store, manipulate and read data at the level of "unstructured data".  +
This Service delivers a (generic) digital workspace, which acts as a gateway between the digital and physical world.  +
P
This Pattern provides the function layout to model "strictly structured data" handling, in a relational fashion.  +
S
This service provides a data store for applications with a predefined structure  +
This service offers databases the ability to store, retrieve and modify database data  +
This service enables business application execution and usage.  +