Written / Li Guoping
EAI technology background
EAI (Enterprise Application Integration) Enterprise Application Integration Recently, with the growth of enterprise information systems, it is rapidly warming. In the early single-level small C / S application, companies and developers did not integrate the needs of the system; at today, the company applied from OA to MIS, from Call Center to Enterprise Portal, ERP / CRM / SCM, etc. The distributed system STEP BY STEP across the intranet / Internet is established, and the information systems of these Si Division lack the ability of Internet interoperability data sharing transaction collaboration, forming information about the network era. Abstract summary, if the desired information system has one or more requirements:
1. There is more than one information system in the system.
2. Each system can be established in different periods or different platforms.
3. Information systems can work relatively independently.
4. Data sharing or business collaboration and cross-platform transaction processing are required.
5. Statistical analysis query information data can cover the entire system or from a particular system.
6. Sometimes you need to add or replace some systems and smoothly work with other old systems.
7. With the interaction of the system and the system, just like the system can do.
8. Extend the life cycle of the system and system, improve availability and reduce coupling complexity and maintenance costs.
Then, inevitably enterprises will face this technical topic for information systems.
EAI is driven by the IT Technology Stage under such demand. The main principle of EAI is to reduce the cost, risk and complexity of enterprise application integration, and establish a multi-system architecture of an orderly cooperative collaborative. Before the EAI concept, companies have some traditional information exchange and system integration methods to meet the above needs to resolve interaction issues, such as custom formats, EDI and XML format data file exchange, shared database, calling a specific manufacturer's API or Component interface, etc. EAI is actually not replacing the former technology, but integrated existing application integration technology and means, providing an analytical design thinking method and architecture model for enterprise application integration. This article will gradually introduce EAI technology to all aspects of EAI's analysis orientation, architecture mode, implementation technology, security strategy, product analysis.
EAI analysis orientation
EAI's analysis orientation is to transmit a way to analyze different level EAI elements for decision makers or architects, rather than providing an EAI implementation guide. Specifically, in the planning and guidance of the EAI system needs to grasp and balanced different levels of side, EAI analysis is to make a thinking method and establishment of bamboo before the beginning of the system planning architecture design of the EAI project. Standard and run through the entire EAI project.
To establish a sound and reliable EAI technology model, we should weigh the analysis and meet the needs of the following aspects:
1. ???????? Application Integration-Oriented
Thinking of application integration is how to integrate existing and future application systems to achieve resource sharing and information interconnection. First, you need to clarify the business that each system is in the time and space of enterprise information. Establishing a wide range of available enterprise applications between one or more systems, integrating dispersed, isolated applications by enterprise business needs and information system planning. Application integration can be carried out in accordance with enterprise demand and system characteristics. The IHE (Integrating The Healthcare Enterprise) target in the medical industry is to integrate HIS, RIS / PACS, LIS, CIS, ICU / CCU and other application systems in the medical institution system.
2. ???????? Process Automation-Oriented) Flow-Oriented Automation is to achieve automation, shortening process time, improve work efficiency, and reduce work costs and human error chances. . Complete the business flow of documents, information, or tasks in more than two systems, reduce unnecessary artificial interventions and workloads, and establish a collaborative process automation system. Now popular BPM (Business Process Management) Business Process Management and Bpa (Business Process Automation business process automation are all extensions of this concept. If the WFMC (Workflow Management Coalition workflow management alliance specification, its core value is embodied in interoperability.
3. ???????? Transaction-Oriented)
Confedred to transaction is the process of transaction. First, clarify the distribution of transaction processing in different systems in different systems, and conduct role division of transaction-treated participants, and abstract transaction, establish business processing The development and adjustment mechanism of the strategy is to have the ability to adjust the adaptive capabilities, realize the functions and interfaces of the collaborators of the transaction, providing the available transaction collaboration elements and ensuring the establishment, assignment, review, execution of the transaction, and retractable. The distribution system is completed.
4. ???????? Distributed object-oriented
Distributed objects are the ability to use the object-oriented thinking to provide distributed information systems, providing distributed computing from the basic element-component (Component) of the information system, and abstracts the logic and function sets of services in the distributed system. A specific object, and through the communication rules between the objects and the associated relationship to constitute the overall framework of the distributed system. Such as RPC, CORBA, EJB, DCOM ,. NET and other object models are applications based on distributed objects.
Each analytical orientation is not mutually exclusive and isolated, but a gradual analysis process from a macro to a micro. Multiple business processes are required in each application integration project, each of which may be combined by one to a plurality of transactions, while each of the types of transactions can be described by a large number of distributed objects. And collaboration. In the actual EAI system architecture design, it should be considering a variety of guide ideas, taking into account applications, processes, and business objects, etc., to distribute application collaboration issues, can apply from thousands of business applications The key links of the EAI system architecture are seized, and the distribution of the company's distribution application system is clear and the system is provided to provide precautions for the design planning of the system. Finally reach the interrelation of application system, reduce system interaction, and integration complexity, optimize and improve existing business processes, improve automation, reduce human intervention and error chance, establish a strong independence, good delay the goal of.
EAI architecture mode
• The architecture design of the EAI application system can be carried out as much as possible as much as possible and meet the needs of EAI analysis. In this link, the EAI architectural mode can be established for the overall architecture, providing a stronger reference model with strong availability. Architecture Pattern is the concept of design mode (Design Pattern), the design mode is to improve software flexibility and reuse, and develop changes in projects and design for a certain type of specific problem in design. Incident with the idea of achieving, it is also known as the micro architecture pattern, and the architecture mode has many common works with the design model, but it is a more macro-level design, which is a design pattern. Thought amplification and concept deepening, is a global program model for the entire system architecture. The EAI architecture mode is to provide a set of basic technical theory support for EAI, which is to solve the specific modal structural model of several issues in EAI architecture design, and correctly apply EAI architectural mode, which is EAI project. An important guarantee for success, just like a firm and perfect building rooted in scientific theory and precisely calculated construction framework: 1. ???????? Integrated Adapter mode Map: Conversion Excellence Application interface to the expected interface Participant: one or more client applications, integrated adapters, and a service server application
Figure 1: Integrated Adapter Mode Integrated Adapter Mode provides a flexible way to export reusable applications, the same intent of the adapter mode in the design mode, and another intention of the integrated adapter mode is multiple clients Reusable interfaces should be provided. The client application calls the server application by integrated adapter, and integrated adapter converts the exported public API is the server-side API. The adapter does not know the existence of client applications. In the adapter design of NoninTrusive, the adapter is transparent to the server side, and in the Intrusive Adapter design, server applications need to be modified in some cases. As the article is depicted, corporate informationization is a phased development, and a large number of basic data in the process often need to be obtained from the old system during this process. Integrated adapter mode, compares collaborative integration issues that solve new and old systems. The JAVA Connector Architecture, Java Connector Architecture, Java Connector, in J2EE1.3, in line with integrated adapter mode, JCA's goal is to establish universal through CCI (Common Client Interface) in Java New World and Old Enterprise Information System EIS Integrated adaptation specification. 2. ???????? INTEGRATION Messenger mode: Description Method Participant to reduce application communication correlation: Integrated Application, Integrated Messure Diagram 2: Integrated Messure Mode Integrated Denager It is a distributed logic entity on a physical layer. Integrated Messure Mode Description Reduces Application Integration Architecture of Application Interactive Logic, which is to reduce communication dependence between applications, establish a more flexible integrated mechanism, deliver messages between applications, and provide location transparent services. The communication method supportable by the integrated dysplary mode is: a. ??????? One pair one step (request / answer) consists of a client application and a server application, the client waits for the server in blocking mode Process the request. B. ??????? One pair of asynchronous (message queue). Composed of a client application and a server application, the client is waiting for the server in the non-block mode. C. ??????? One pair of asynchronous (release and booking). Composed of one client and one or more serve, multiple predetermined people can subscribe to the same issuance event. Here, it involves interacting in the application, concept-related concepts - Application Interaction Model, including the following three modes: a. ??????? Message Broker B . ??????? Message Queuing) c. ??????? Publishing and Subscribe (Publish\Subscribe)
In this mode, the application is responsible for implementing the application interactive logic, the semantics of the application interaction is completely transparent to the integrated donsors. The communication model is diversified, but its purpose is consistent - minimizes communication dependence between applications. The advantage of asynchronous mode comparison synchronization mode is that asynchronous mode ensures that data is safely reliable, not worrying about data loss caused by network or other abnormalities; disadvantages are asynchronous mode, resulting in transaction splitting It became a message to send / enter the team, the message receives / queues two segmentation transactions, real-time and interactive experiences are poor than synchronous mode. Since the integrated datcher is a mess-based loose coupling technique, the message is maintained in the application of the sender and the receiver, and it is easy to achieve integration of cross-platform systems. In addition, specific functions such as data conversion, message distribution, routing, buffering, storage, etc. can also be completed by message proxy mechanisms. The JMS (Java Message Service) Java message service reflects the architectural idea of integrated duplicate mode. 3. ???????? Integration Facade mode integration: Reduce the association of the client and server application, provide a simplified interface participant connected to the background application: one or more clients Application, integrated appearance and one or more server applications Figure 3: Integrated appearance mode integrated appearance architecture mode is consistent with the intent of the design mode, but integrated appearance architecture mode is provided to reduce the dependency of client applications and server applications A simplified interface of higher levels, providing flexible reusable applications and application integration services. The integrated appearance provides a simplified interface for one or more clients. The client application calls integrated appearance simplified service, integrating the appearance of the abstract server-side function and converts the interface of the integrated appearance to the server application interface, making the server application easier to use. The client application completes the actual work, and the integrated appearance converts its own interface into a server application interface. Its interaction model is one-way interaction between one of the client or one of the clients. The integrated appearance does not know the existence of the customer, and the server application does not know the existence of integrated appearance. By abstract unified appearance interface from multiple server applications, you can simplify the integrated difficulty of the client, reaching the method of consistency for multiple service applications, shielding its original complexity. 4. ???????? INTEGRATION Mediator mode integration: Package Application Interactive Logic, Minimize Application Recognition Participants: Integrated Intermediarics, Participation Applications (Particle Applications) Figure 4: Integrated Mediator The mode integration intermediarcon mode is a package application interactive logic and a reduced application integrated architecture method. Its important advantages are: a. ??????? Minimizes the dependence of the application and the influence of the old system. B. ??????? The complexity and maintenance workload of distributed interaction is simplified by centralized application interaction logic. C. ??????? Easy to establish reusable services based on the application interaction logic of the package. These advantages provide more flexible integration methods for the implementors and improve the agility of business. Compared to the integrated dowr, the integrated intermediarry knows what applications exist. The integrated intermediarcon includes application interaction logic, responsible for interacting between control and coordination applications, interacting with integrated intermediaries without having to face different applications. Each apparatus reducing the complexity of the application inter-application intercom with the direct interaction of the integrated intermediar, reaching the purpose of minimizing application association. Compared with the integrated appearance, the integrated intermediarcon is provided to the application is the two-way access function of the customer and the service. And integrated intermediaries are typically implemented by physical servers, not just unified abstract interface logic.
5. ???????? Process Automator mode Map: Reduce process automation logic and application architectural architectural method Description Participants: Activity Service, Process Controller and Application Diagram 5: Process Automation Mode Process Automation Mode Description Method Method for Minimizing Process Automation Control Logic and Information System Dependency Relationships, thereby hiding in an activity abstracted from the process controller. The main advantages are: a. ??????? Independently implement powerful process automation solutions. B. ??????? Available unprecedented business process analysis capabilities (such as process bottlenecks, statistical information, error messages, and resource utilization, etc.). C. ??????? This architecture can obtain unprecedented redefine and fast deployment process automation applications. D. ?????? Similar to integrated appearance mode and integrated intermediard mode, application integrated logic is packaged and shared. E. ??????? Process Automation Applications Near the perspective of the manager, reducing the business perspective and the Semantic disagreement of the IT world, minimizing the possible conversion from business needs to IT solutions. Process Automation Mode The flexibility of the transaction can be improved through a flexible system integration architecture, and the transaction requires high quality business processes, reducing the reduction of business cycles, and reducing processing costs. The same process is repeated every day, and the process automation can automatically establish an active sorting mechanism for these processes. The core of the process automaton is the ordering and control of the activity (automatic or manual). Based on the process automation mode, it will be greatly reduced in realization of business process management and business process automation under the enterprise distributed system. These five modes in the EAI architectural mode have a common goal: reduce the coupling between the applications. Different patterns are always decoupled at different levels. The integrated adapter is in the interface layer, the integrated gabyer is in the communication layer, integrated appearance, and integrated intermediarconic in the application layer. The process automation is a logical layer in the business. Appropriate decoupling at the architecture level is the essence of a rugged and flexible EAI solution. By flexibly applying EAI architecture mode in a complex enterprise system, it can integrate complicated and chaotic distributed applications into huge but ordered distribution applications, which lays a solid and robust for the technical implementation and project cutting of EAI projects. basis. In a reasonable successful building frame, add bricks in the framework, it will be more reliable than the air-building pavilion that is built in the city's embarrassment in the desert. EAI implementation technology
The level of EAI technology is currently more important to see the benevolent, wise see a wisdom, if there is a three-layer, from low to high, the infrastructure layer, an Interoperability Service Layer, and File Layer (Content) Layer; Many application developers divide EAI to divide the integrated resources into low-to-high data (DATE) layers, Application layers and business process layers, and other views think in these three On the basis of the layer, there is an integration of the user interface layer. In addition, at least three levels of layers can be found, and hundreds of flowers will arise from the prosperity of the academic community and the industry. Different starting points and analytical perspectives will naturally have a distinct conclusion, the author is no coming The intention, only three levels of EAI technology implementation means only according to their own work experience: the bottom-level protocol layer consists of various communication protocols that support the same / asynchronous message, and the asynchronous data-exchanged data layer and by synchronization The application layer of the real-time distributed component technology (including the interface layer and the business layer is achieved by these applications), the more the underlying technology, the lower the coupling degree, the more integrated flexibility Strong, but the weakening of operability / interaction ability; in turn, adopts the upper layer technology to achieve better interaction capabilities and operating experience, but the coupling degree will increase, the integrated flexibility will be limited. In fact, each of the above-mentioned techniques is a special case package and comprehensive application of one or more technologies thereof. Figure 6: Information system interaction / integration pathway and EAI implementation technology layers 1. ???????? Protocol (Protocol) protocol is mainly composed of communication protocols that implement an OSI (Open System Interconnection open system interconnection reference model) On both ends of the information exchange only need to complete the request / response in accordance with the protocol, there is no restrictions on the operating system and application software of the two. The protocol layer mainly includes the TCP / IP, which is widely used by the Internet, FTP / HTTP / POP3 / SMTP (where some upper protocols can be achieved through the transaction segmentation of the receipt, such as FTP, POP3, SOCKET-based technology (Socket is even more communication between Socket connection) (Socket or even between service and application), including IPX / SPX, NetBIOS, etc. in small Ethernet time, In addition, the PIPE technology is also a system communication, such as the NAMED PIPE data connection provided by the SQL Server and other databases; the operating system can also provide Anonymous PIPE, etc.). Using the implementation means of the protocol layer, more flexibility can be provided for the development and application of information integration, but to meet the upper needs of the application interoperability will have to pay a large workload and cost price.
2. ???????? Data (DATA) layer data layer is mainly transmitted by the transmission of data in asynchronously, and the transmission / reception of data is swapped by the write / read out of the data. Including a database (such as universal database connection such as ODBC, JDBC, OLE DB), message queue (the message queue mechanism of the operating system is actually a special case of the message queue, but it is in the application and application completion of messaging) and Direct file exchange (such as file exchange in FLAT File, EDI and XML) three ways, these three modes are not limited to the operating system and application software of the exchange, and asynchronous mode can also be processed and offline Homework provides good support, with small development work, low technical difficulty, and many early primitive information exchanges are implemented in the implementation technology of data. 3. ???????? Application layer application layer is mainly composed of various popular distributed objects, with objective development and application model, easy to call simple real-time performance, operability / interaction ability However, there is a feature of the platform, and the early distribution object technology is from RPC technology to evolution. It is also widely supported by the Corba (Common Object Request Broker Architecture platform, language neutrality, definition is widely supported; RMI , EJB and DCOM ,. NET and other components are also widely used under their respective distributed platforms; the XIxing of Web Service / SOAP in the past two years is due to both objective operational capabilities and large integration flexibility (limited to SOAP protocol) It is very popular among the industry, the reason is that it is well balanced and grasped interactive and integrated double-edged sword. In recent years, a large number of middleware vendors have flexible packaging business logic to establish a redefineable distributed commercial information system for enterprises, and the integration of enterprise application levels has played positively promoted. In February 2002, it is designed to ensure cross-platform, cross-applying, cross-programming language, interoperability, WS-I (Web Services Interoperability Organization) Web service interoperability organizations, from different vendors, is currently available. Most manufacturers of Microsoft, IBM, SUN, SAP, BEA, ORACLE, SYBASE, Intel, Borland, HP; standard BPEL4WS (Business Process), which is aimed at unified Web Service Business Process Collaboration and Integration During August Execution Language for Web Services) Web Service's business process executive language specification is also widely supported, initiated from the original IBM, Microsoft, and BEA three vendors, current members include Oracle, PeopleSoft, SAP, Sun, Tibco, Business Process Management Initiative Companies and institutions such as Workflow Management Coalition (WFMC); and UDDI, WSDL, WS-CORINATION, WS-Transaction, WS-Security, WS-Attachment, WS-License, etc. These for fulfilling the roads of Web Service to the world's platform applications and low coupling interoperability, Web Service has truly entered the mature commercialization stage, and will be in the company's application and system integration. . EAI security strategy
?????? Information system is a modern enterprise's lifeblood, information system data loss, information disclosure, content tampering, and accessibility will be unbearable. Enterprise Application Integration Due to the complicated network links such as intranet / Internet, security factors can not be ignored. In the life cycle of the entire EAI application system, design development, test deployment, and application running from the EAI project, the safety should be the most important part. Building safety electronic trading model should meet the following five aspects, which is also five standard security services specified in OSI: a. ???????? Data confidential: Prevent information from being intercepted or illegally discussed. B. ??????? Object Certification: Communication Both sides confirmed the legality and authenticity of each communication object to prevent third party counterfeit. C. ??????? Data Integrity: Block illegal entities from modifying, inserting, deleting, and preventing data loss of exchange data. D. ?????? Defense Defense: It is used to confirm that the operation has occurred and the transaction is prevented from replying to the behavior. E. ??????? Access control: Prevent unauthorized users from illegal using system resources. Establishing a secure corporate information platform should start from the following aspects: 1. From management highly attach great importance to the security system is the most active factor in social activities and production activities, to establish a safe enterprise information system First, we should pay attention to the information security of the company. Enterprises to go to the leadership to the operator in the enterprise, they should recognize the importance of security to the enterprise, and it is possible to conscious, and there is awareness of security attention and investment. . Introduction can reduce security hidden dangers from enterprises by establishing management system, employee operation training, user strategy, access, etc., etc., etc., the external security risks can be avoided by establishing confidentiality system and technology investment to ensure enterprise information system Safety. 2. ???????? Use technical means to establish a safety system to avoid safety hazards through technical means: network security: security application system can only be established above the security base platform, corporate information planning In the architecture design, you should fully consider information security issues, build a built-in system-level security policy, such as the use of internal and external network isolation, subnet division, firewall, domain permissions, etc., provide basic network security. Application Safety: Safety Applications should meet the needs of integrity, consistency, confidentiality, and effectiveness of information exchange. If the information system is analyzed, design, developed, test, acceptance, deployment, application, etc., grasping the safety criterion, discovery and makes up the vulnerability that may be maliciously utilized; using SSL (Secure Socket Layer), SET (Secure Electronic Transaction) Technologies such as PKI (Public Key Infrastructure) guarantees the safety of electronic transactions. Safety: The setting of system operation rights should follow the principle of minimization, that is, provide minimum use permissions that can meet their work needs, avoid errors and overhearted access; in addition, the system log mechanism record application operation and user operation Case. 3. ???????? The legal system guarantees the safety system in addition to management and technical system, legal support is also important, and there is a sound and improvement of legal system to provide reliable security for e-commerce, e-government. . For example, the Chinese government has recently been considered draft "The E-Signment Law" of the People's Republic of China, I believe that the development of China's electronic transactions will play a profound impact; in addition, establish and improve the legislative work of my country's computer and online crime as soon as possible. It is also imperative, and there is a national law to do the back shield to play the Internet's black hand to shock and discipline. EAI product
J2EE / UNIX / Linux and. Net / Windows is currently two major camps in the enterprise application platform, two systems are competitively integrity in maturity and ease of use, high performance and low cost, openness and compatibility, share, and growth rates. EAI's numerous technical products and solution providers are also mainly surrounding these two corporate application platforms to die. 1. ???????? IBM WebSphere Business Integration WebSphere is the core of IBM's J2EE-based electronic commercial platform, and the entire software family provides a complete set of solutions such as development, deployment, application, and management. WebSphere Business Integration is It is a set of software products that focus on enterprise application integration and process automation, mainly including commercial communication middleware services for WebSphere MQ, MQSeries, EAI / BPM Software Suppliers acquired by IBM heavy gold in 2002 and Holosofx Software products, integrated WebSphere Business Integration covers models, integration, connection, monitoring, and management of nearly 20 software modules, and provides a large number of mature industries and inter-banking solutions. Its goal is to connect applications and implementation process automation, establish a single-system unified and modern enterprise infrastructure. All applications can share data across different environments, develop language, transmission methods, and data formats. Business processes running independently or interacting with others can be designed and planned. Enterprise information systems can be achieved in accordance with business needs, intelligently, intelligently routing and delivering information. Can help enterprise simulation industry-specific business processes in the company's internal and partners, the traffic of business activities between customers, integrate these processes between customs and suit applications. Connect your business process with suppliers and customers, and provide the function of business process monitoring and business management. At the latest V4.2.2
In the version of Business Integration, synchronous connection capability, monitoring, and debugging tracking and other functions have been greatly strengthened. Business Integration is just like its huge WebSphere system, has the characteristics of product line, clear functional segmentation, strong combination, flexible solution, platform integration, etc., Blue Giant Poly, Software Model and Solution System It can also be seen. 2. ???????? Bea WebLogic Integration Weblogic was originally an independent company. In 1998, he became a BEA Weblogic Platform after the acquisition of BEA. Before 2002, Weblogic was a leader in the J2EE application server. It was helpless to be "on demand" WebSphere, which captured the laurel, only to flexion. BEA WebLogic Platform and IBM WebSphere have a lot of common points, such as J2EE platforms, are all sets of software systems, the same market positioning of commercial application service software. Although it is more weak than IBM WebSphere product lines, BEA WebLogic Platform is a bit weak, from the system architecture, functional module, solution, technical support forces, but can be in this "only the first second, no third "Survival in the cruel competitive environment, and it is also there. In the latest version of the BEA WebLogic Integration? 8.1, Bea WebLogic Integration is one of its important products, providing a relatively complete business system integration program, including application servers, business process management, application integration, and B2B integration. Providing an intuitive and powerful implementation method for the development, integration, and management business processes, which enables IT technology to apply in a single solution training for all applications, with greater flexibility and scalability when deploying resources across different projects. And provide the development and runtime framework, unify all business integration components under a single, flexible environment. These components cover business process management, data conversion, business partner integration, connectivity, message proxy, application monitoring, and user interaction. BEA is of course "small witch,", but the flexibility is relatively strong, such as the product response speed supported by EJB and other standards, and IBM can have nearly a hundred years of development history, the wind and rain, can't move, step by step Sorcerer is a magic weapon for its survival and development. 3. ???????? Microsoft BizTalk Server Microsoft has long been the overlord of the desktop application field, and from. At the beginning of the Net Enterprise Servers concept, it tries to change the image of desktop app providers that have established in the past, formally enterprises in enterprise applications that have great potential for market potential. Although the Microsoft's Business Solutions department is still in a loss, the referral of the Microsoft commercial service software system of Windows Server System is continuously growing. The BizTalk Server is server products for enterprise EAI / BPA. Recently, the third version of BizTalk Server, who has just begged, is relatively mature. Although it is only "lightweight players" compared to IBM WebSphere, but in China's small and medium-sized enterprises, It is more competitive products. On the one hand, because most of these companies are deployed in the Windows environment, the underlying support will be relatively smooth. On the one hand, Microsoft's so-called "Do More With Less" market strategy is indeed in line with China 's enterprise informationization requirements. status quo.
However, the price of BizTalk Server (Enterprise Edition is $ 5,000, Standard Edition is $ 7,000, and Partner Edition is $ 1,000) seems not high, but "water" is not small: First, BizTalk Server can only depend on SQL Server / Windows runs, the new BizTalk Server 2004 is embedded in Visual Studio, which is the development, configuration, deployment, and management environment. Net, these prices, the price of platform software Bill, is of course, will give you a lot of sheets. From the perspective, it is officially based on. NET and support Web Service, the integration capacity of the company and the trading partners, the process management and automation, business rules formulation and monitoring have increased, followed by BPEL4WS and provides flexible industry accelerator and adapter, etc. Give a look. A message from Microsoft's internal person is the three major characteristics of Longhorn, Indigo, Winfs. Winfs is based on the yukon database engine (principle is similar to adding a layer of MSDE