Property:Brief description
Jump to navigation
Jump to search
A "Brief description", of type text, serves as a short, functional description for an infrastructure artefact.
Note: the string must preferably be less than 256 characters
D
Unit of data in a structured data storage facility +
Consecutive flow of data, events or activities +
Instance of digital interaction +
(Predefined) state an entity is in +
Steady, time critical flow of data +
An orderly arrangement of data, especially one in which the data are arranged in columns and rows +
Measured or measurable period / moment, as indicated by a clock or calendar, expressed in (milli)seconds, minutes, hours, day, and/or years +
Exchange of data between automated systems +
Interaction between users or systems +
Order in which and with whom/what system activities are carried out +
Collection of facilities that facilitate end-users to interact with the digital world +
F
Increase of speed/decrease of time needed to carry out a function +
Facilitation of functions in the physical world +
Collection into a whole +
Notification of a status that demands intervention +
Indisputable authentic preservation for future reference +
Distribution into different classes/categories +
Performance improvement by buffering and provision of quick access +
Execution of mathematical operations +
Real-time transmission +
Item inventory +
Systematic placement in categories +
Pickup (of items specified in the data/object part) +
Hiding of data/objects in order to preserve confidentiality +
Manipulation of behavior +
Command interaction +
Interoperation control +
Connection of (equal) parts +
Removal of exact copy instances +
Organization of representation +
Transfer, including its completion +
Placement in a position for utilization +
(Re)allocation to bring on or closer to the destination +
Application of wrapping to protect or to hide +
Protective conversion +
Removal of unwanted items during transit +
Prearrangement for usage +
Treatment, manipulation, management +
Creation of reference (points) +
Linkage to bridge a distance or difference +
Preservation of a state +
Recording of activities/events +
Registration of condition/quantity +
Creation of exact copy instances +
Act of information, providing of an informative message/signal +
Put aside to make room (for example transferring data to a cheaper medium) +
Arrangement of automated processes +
Conservation in the state in which/existing +
Arrangement of right of way +
Preparation/placement to fulfill a demand on beforehand +
Removal of the unwanted/unnecessary +
Ordering for dispatch order +
Admission/Intake +
Registration/Transcription +
Decrease in volume +
Distributed retention +
Creation of an exact copy of an instance +
Presentation of events/results of an automated analysis +
Substitution of one data type for another, with translation of the corresponding values +
Automated response on behalf of intended recipient +
Storage facilitation +
Targeted pickup +
Sweeping/probing search or digitalization operation +
Assignment of preference +
Transportation engagement +
Interaction to establish communication +
Preservation of state +
Ranking (according to a predefined hierarchy) +
Movement from one place to another +
Conversion from one appearance, form, representation, state, or phase into another +
Conversion from one expression, state, or phase into another +
Shielded/abstracted transmission +
Inspection on (global) accuracy/correctness +
Inspection on (internal) completeness/genuineness +
Revision control/instance preservation +
G
Access Aggregation is a logical infrastructure function that performs the tasks required to group multiple Access Conditioning instances. +
Access Conditioning handles tasks that the infrastructure architect associates with obtaining access to an infrastructure facility. +
The Name Resolution serves lookups from a store of connected names and addresses. +
Alerting serves to notify clients of, and/or trigger other services/functions on, certain predefined conditions or events. +
This function offers a run-time environment for applications. +
This function provides preservation with retention policies as add-on to another storage function. +
This function offers to hold collections of data that are duplicated from elsewhere, or buffer data in transit. +
The Configuration Register function retains sets of configuration parameters for one or more IT facilities. +
This function collects a service or (sub)system's configuration, and sends it to a consumer. +
This function covers all behaviour associated with the management of one end of a communication session. +
The Content Handling function provides intelligence to manage and manipulate digital content in an automated fashion. +
Function that can ''change'' a facility's actual behaviour, the way it is ''configured''. +
This function offers the ability to process strictly structured data. +
This function aims to replicate stored data that resides in one (logical or physical) storage location to another one. +
The Data Scanning function scans through data searching for certain characteristics, and taking actions upon finding them. +
This function aims to preserve data that resides in a particular (logical or physical) location in the state that it is at a specific point in time. +
The Deploying function can automatically install and configure (software) objects on a specified (remote) location. +
Distribution routes incoming data to one or more destinations. +
This function takes care of the encryption and/or decryption of data. +
This function handles storage, retrieval and manipulation of loosely structured data. +
The Filtering function scans through data, matching it against patterns or rules, and either passing it on or not. +
This Generic Function enables message exchange between senders and receivers that use different messaging protocols/encapsulations. +
This function offers to store digital identities together with information that can serve as credentials. +
The Identity Validation function offers the ability to validate a digital identity. +
This function provides the possibility to translate physical information into digital information for use in IT facilities +
An Interconnection function offers to transport data over relatively long distances +
The Load Balancing functionality accepts data en route, and intelligently directs it to travel to one of several destinations. +
This function provides a (logical) location where logs can be written and consulted, and the ability to do so. +
This function offers to direct messages between and/or within instances of the Message Handling facility. +
This function can receive, process and/or send messages. +
The Message Filtering function checks message handling transactions, matching it against patterns or rules, and either passing messages on or not. +
This function is used to format messages for exchange between a facility and a message handling service. +
The Message Responding function provides feedback to senders regarding message delivery failures and/or recipient status. +
This function preserves and organizes digital messages. +
Converts/changes content of a message based on predefined rules during exchange. +
The Name Resolution serves lookups from a store of connected names and addresses. +
This function conveys digital information for use in the physical world, by converting digital information into events and/or physical information. +
This function offers a means to store and publish permissions (technical representations of business rules about infrastructural actions like reading or writing information). +
This function offers the ability to decide on allowing or disallowing a proposed action by a digital identity on a specified resource. +
This function provides a single point of access to a variety of information and/or applications. +
This function processes input to and output from an infrastructure facility. +
Provides the ability to process traffic based various queuing policies. +
Function that handles storing/retrieving/updating/deleting unstructured data such as bits and bytes. +
This function encodes data using fewer bits than the original representation, and/or restores it to its original form if so requested. +
A Reporting function can take data from a connected source, process it, and then deliver focused, salient content to its clients. +
Function that restores a secondary copy of data to the original, or to an alternative, location. +
This function offers intelligent handling of data at the "unstructured data" abstraction level. +
This function can have the infrastructure perform actions based on rules. +
This Function provides control over tasks, based on schedules, events, triggers, and other control information. +
Informing its user of the state of some object, system, or (infrastructure) facility. +
This function collects a service or (sub)system's status, and sends it to a consumer. +
This function supports the retention of "strictly structured data", e.g. a database. +
This function is used to coordinate series of transactions that involve two or more distinct services. +
This function makes ICT functionality available at a specific physical location and in a specific manner. +
This function offers a run-time environment for applications that require direct input from, and/or output to, the physical world. +
This function serves to increase the maximum load that a given resource can handle, and/or allowing access to instances of the resource spread over multiple sites. +
An implementation of this Pattern can be used to secure access to back-end resources. +
The Application Hosting function can accommodate (business) application services. +
Helps to secure IT facilities and applications by validating digital identities and permissions. +
This pattern hosts relatively static content, and makes it available to authorized users in a suitable form. +
This Pattern provides the ability to manage and make use of "strictly structured data", i.e. it controls the organization, querying, and retrieval of sets of organized data. +
This Pattern can help to realize a level of data protection for sets of data and/or convert these sets into archives. +
This Pattern provides the means to transport digital data between automated systems. +
This Pattern realizes a security separation between different Data Transport zones. +
This Function can deploy the software part of an IT (sub)system, and/or configurations thereof. +
This Pattern helps Operations and Security personnel to monitor other facilities for noteworthy events. +
This Pattern offers functionality to manipulate (store, retrieve and modify et cetera) data in loosely structured form (e.g. files). +
Instances of this Generic Pattern are able to maintains the propagation and consistency of digital identities and digital permissions that are recognized within the organization. +
This Pattern provides a means to transport loosely structured data from a source to one or more targets, either ad hoc or structurally.. +
This Pattern accepts messages from senders, and then handles transport, storage, and delivery to recipients. +
This Pattern offers functionality for the storage and retrieval of unstructured data at a single, logical location; it may also provide "intelligence" to administrators and/or consumers. +
This Pattern models a gateway between the physical and digital world, such as a user workspace. +
This service serves to increase the maximum load that an IT resource can handle, and/or to allow access to instances of the resource spread over multiple sites. +
This service is used to secure access to back-end resources. +
Application Hosting provides functionality to accommodate (business) application services. +
This service provides the ability to create and use archives. +
This service can validate an identity claim, and it can validate the permissions required for an action, as part of an Authentication & Authorization process. +
This service provides the ability to create and manage backups, and to restore (parts of) those backups. +
This service hosts relatively static content, and makes it available to authorized users in a suitable form. +
This service provides its consumers the ability to manage strictly structured data. +
This service provides the ability to protect data against accidental or wilful corruption. +
This service transports data between automated systems. +
This service satisfies relevant security requirements while passing data between different Data Transport services. +
This Service can deploy the software part of an IT systems, and/or configurations thereof. +
This service allows its users to monitor IT facilities with the aim of guarding operational continuity or security. +
This service offers clients the ability to store, retrieve and modify data in loosely structured form. +
This service maintains the propagation and consistency of digital identities and digital permissions that are recognized within the organization. +
This service provides a means to transport loosely structured data from a source to one or more targets, either ad hoc or structurally. +
This service handles transport, storage and delivery of messages between senders and recipients. +
This service offers to store, manipulate and read data at the level of "unstructured data". +
This Service delivers a (generic) digital workspace, which acts as a gateway between the digital and physical world. +
P
This Pattern provides the function layout to model "strictly structured data" handling, in a relational fashion. +
S
This service provides a data store for applications with a predefined structure +
This service offers databases the ability to store, retrieve and modify database data +
This service enables business application execution and usage. +