Enterprise Service Bus (ESB) – Explanation, Role, and Functions

Before the emergence of service-oriented architecture (SOA), the term middleware would often be equated with an application server. However, today with the degree of progress on service-oriented architecture the term middleware will often be equated with Enterprise Service Bus (ESB). This is because if the application server is the foundation for middleware then ESB represents the largest and most important part of middleware in Service Oriented Architecture. Enterprise Service Bus (ESB) is a term used to describe a wide variety of products whose primary goal is to extend the simple messaging capabilities of an application server to allow the inclusion of enterprise functionality needed to support SOA. It has also been observed that a major difference between ESB and middleware is the fact that ESB is Service-Oriented whereas middleware has functions that are applicable outside the realm of services in a distributed system. The ESB can accomplish business communication by Continue reading

Classification of Security Threats in Information Systems

As use of internet and related telecommunications technologies and systems has become pervasive, use of these networks now creates a new vulnerability for organizations or companies. These networks can be infiltrated or subverted a number of ways. As a result, organizations or companies will faced threats that affect and vulnerable to information system security. Threats to information system can come from a variety of places inside and external to an organizations or companies. In order to secure system and information, each company or organization should analyze the types of threats that will be faced and how the threats affect information system security. Examples of threats such as unauthorized access (hacker and cracker), computer viruses, theft, sabotage, vandalism and accidents. Unauthorized Access (Hacker and Cracker): One of the most common security risks in relation to computerized information systems is the danger of unauthorized access to confidential data. The main concern comes Continue reading

Introduction to File Organization

As in our daily life, huge amount of data has to be collected and processed, so it is very difficult to handle it. But this can be handled fast and easily by using files. Files are the mega byte data structure used in information processing. Actually, a file itself is a bunch of bytes stored on some storage devices like magnetic disk, magnetic drum and magnetic tape etc. A file is a collection of records. Each record is made up of fields. The various fields consists of groups of characters, say the decimal digits 0 through 9 and alphabet A through Z. Group of fields are combined to form a logical record. This logical record contains all the data of interest about some entity. Different application requires a variety of record types and file structure; one basic distinction is between fixed and variable length records. A fixed length record has Continue reading

Open Systems Interconnection (OSI) Model

Open Systems Interconnection (OSI) model is a reference model developed by ISO (International Organization for Standardization) in 1984, as a conceptual framework of standards for communication in the network across different equipment and applications by different merchants. It is now considered the primary architectural model for inter-computing and inter-networking communications.  There are seven layers within the OSI model that serve to differentiate the various hardware and software functions that a network provides. Each layer depends on the proper functioning of the layer immediately below it to provide its raw functionality, which is enhanced and then passed to the next higher layer. Status messages may be communicated up or down the various layers, although each layer only communicates with its immediate neighbors. As each layer is solely dependent on the layer below it for lower-level services, higher layers are shielded from system, hardware, and software implementation details. This leads to the Continue reading

Major Perspectives of Information Organization

People understand information organization from four main perspectives, viz. data, relationship, operating system, and application architecture. The data perspective of information organization In the data perspective, people consider the organization of data in terms of their descriptive and graphical elements. Therefore, the two elements possess distinctive features necessitating different storage requirements as well as storage options. A person thus needs to understand the correct sequence in which entities occur and build up until they eventually form a data file. A data item that falls under descriptive data is one of the most basic elements in the organization of information. It is the smallest unit of storage in a database and it goes by the term ‘stored field’ in the database terminology. It may appear in the form of a number, date, an expression, or character string. A group of related data items forms a record and often appears in the Continue reading

New Trends In E-Business

E-business changed the way business was being done over the years. It created more and more avenues and opportunities. E-business changed the competitive platform. While the old competitive barriers are diminishing it created new entry and competitive barriers. The hard competitive barriers are becoming weak while the soft competitive barriers became more and more prominent. It is believed that not even 50% of the potential of e-business is to be unleashed yet. This definitely indicates that e-business has lot more to offer. E-business has appealed the businesses and customers from all segments. E-business increased the connectivity among different businesses. The integration among departments, different businesses, and different sectors through e-business made it possible to offer variety of services to customers. The new technologies, high speed internet made the transactions possible. Improved integration and interoperability needs of next generation e-business systems are met by new e-business solution architectures. New technologies of Continue reading