Paper Title:
A New Approach for Enterprise Application Integration
  Abstract

In the last few years, there is a significant growth in enterprise computing. In a typical large enterprise, more than thousands major application systems are logically interconnected to support enterprise’s business process. With the Internet technology grows explosively, most enterprise organizations adopt e-business strategy. Enterprises sometimes have to merge with other enterprise, reorganize their internal structure, and adopt new technologies and platform as they strive for competitive advantages. Enterprise application integration(EAI) provides enterprise with the option to leverage their existing systems and integrate them with new application to enhance functionality. Connector, which is a software component, is an essential layer in the EAI architecture. It provides connectivity between application and integration server.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
1031-1035
DOI
10.4028/www.scientific.net/AMR.204-210.1031
Citation
W. Lu, D. Y. Zhang, "A New Approach for Enterprise Application Integration", Advanced Materials Research, Vols. 204-210, pp. 1031-1035, 2011
Online since
February 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Guo Jun Yang, Ying Zheng
Abstract:Aiming at the disadvantages like the enterprise application system scalability, integration and interoperability is not strong, neglecting...
729
Authors: Dan Ren, Yuan Ren, Yang Fan
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:It first reviews the characteristic of manufacturing enterprises. Then it discusses the features and advantages of .Net smart client...
300
Authors: Zhuang Wu, Yan Li
Chapter 4: Automation, Control, System Modeling and Simulation
Abstract:In essence, Service Oriented Architecture (SOA) is distributed and shall not have any centralized control point. Any application can access...
960
Authors: Guang Hong Yang, Qing Zhang, Ding Yong Tang, Cong Min Huang
Chapter 5: Control and Detection Technology
Abstract:We design a data exchange platform with the joint topology , based on data exchange and file encryption technology of messaging middleware...
898
Authors: Chuan Sheng Zhou
Chapter 12: Applications of Information Technology and Computer in Industry
Abstract:During web applications developed and deployed in many and many enterprises today, how to make sure their web applications satisfied to their...
1661