Written / Li Guoping
EAI technology background
EAI (Enterprise Application Integration) Enterprise Application Integration Recently, with the growth of enterprise information systems, it is rapidly warming. In the early single-level small C / S application, companies and developers did not integrate the needs of the system; at today, the company applied from OA to MIS, from Call Center to Enterprise Portal, ERP / CRM / SCM, etc. The distributed system STEP BY STEP across the intranet / Internet is established, and the information systems of these Si Division lack the ability of Internet interoperability data sharing transaction collaboration, forming information about the network era. Abstract summary, if the desired information system has one or more requirements:
1. There is more than one information system in the system.
2. Each system can be established in different periods or different platforms.
3. Information systems can work relatively independently.
4. Data sharing or business collaboration and cross-platform transaction processing are required.
5. Statistical analysis query information data can cover the entire system or from a particular system.
6. Sometimes you need to add or replace some systems and smoothly work with other old systems.
7. With the interaction of the system and the system, just like the system can do.
8. Extend the life cycle of the system and system, improve availability and reduce coupling complexity and maintenance costs.
Then, inevitably enterprises will face this technical topic for information systems.
EAI is driven by the IT Technology Stage under such demand. The main principle of EAI is to reduce the cost, risk and complexity of enterprise application integration, and establish a multi-system architecture of an orderly cooperative collaborative. Before the EAI concept, companies have some traditional information exchange and system integration methods to meet the above needs to resolve interaction issues, such as custom formats, EDI and XML format data file exchange, shared database, calling a specific manufacturer's API or Component interface, etc., EAI is actually not replacing the former technology, but is integrated with existing application integration technology and means to provide analytical design thinking and architectural models for enterprise application integration. This article will gradually introduce EAI technology to all aspects of EAI's analysis orientation, architecture mode, implementation technology, security strategy, product analysis.
EAI analysis orientation
EAI's analysis orientation is not a guide to the decision makers or architects to provide an EAI implementation, but transfers a way of thinking of EAI system analysis. It is exactly that there are multiple sides of different levels that need to be grasp and balanced in planning and guiding EAI systems. EAI analysis guides should be the description and establishment of the criteria should be trained before the entire EAI project system planning architecture design. And run through the entire EAI project.
To establish a sound and reliable EAI technology model, we should weigh the analysis and meet the needs of the following aspects:
a. Application Integration-Oriented)
Reflections on how to integrate existing and future application systems for integration of existing and future applications to achieve resource sharing and information interconnection. First, you need to clarify the business that each system is in the time and space of enterprise information. Establishing a wide range of available enterprise applications between one or more systems, integrating dispersed, isolated applications by enterprise business needs and information system planning. Application integration can be carried out in accordance with enterprise demand and system characteristics. The IHE (Integrating The Healthcare Enterprise) target in the medical industry is to integrate HIS, RIS / PACS, LIS, CIS, ICU / CCU and other application systems in the medical institution system.
b. Process Automation-Oriented process automation orientation is to realize automation of enterprise processes, shorten the process time, improve work efficiency and reduce work costs and human error chances. Complete the business flow of documents, information, or tasks in more than two systems, reduce unnecessary artificial interventions and workloads, and establish a collaborative process automation system. Nowadays, the popular BMP (Business Process Management) Business Process Management is automated with BPA (Business Process Automation business process). If the WFMC (Workflow Management Coalition workflow management alliance specification, its core value is embodied in interoperability.
C. Transaction-Oriented
The transaction-oriented focus is the process of transaction, first clarifying the distribution of transaction processing in different systems in different systems, and conducts role division on transaction-treated participants, and performs abstraction of transaction, establishing business processing The development and adjustment mechanism of the strategy is to have the ability to adjust the adaptive capabilities, realize the functions and interfaces of the collaborators of the transaction, providing the available transaction collaboration elements and ensuring the establishment, assignment, review, execution of the transaction, and retractable. The distribution system is completed.
d. Distributed object-oriented (Distributed Object-Oriented)
Distribution object-oriented is an object-oriented thinking manner to provide distributed information systems, providing distributed calculations on the basic element-component (Component) of the information system, and abstracting the business logic and functions in the distributed system A specific object, and through the communication rules between the objects and the associated relationship to constitute the overall framework of the distributed system. Such as RPC, CORBA, EJB, DCOM ,. NET and other object models are applications based on distributed objects.
Each implementation orientation is not mutually exclusive and isolated, but a gradual analysis process from a macro to a micro. Multiple business processes are required in each application integration project, each of which may be combined by one to a plurality of transactions, while each of the types of transactions can be described by a large number of distributed objects. And collaboration. In the actual EAI system architecture design, it should be considering a variety of guide ideas, taking into account applications, processes, and business objects, etc., to distribute application collaboration issues, can apply from thousands of business applications The key links of the EAI system architecture are seized, and the distribution of the company's distribution application system is clear and the system is provided to provide precautions for the design planning of the system. Finally reach the interrelation of application system, reduce system interaction, and integration complexity, optimize and improve existing business processes, improve automation, reduce human intervention and error chance, establish a strong independence, good delay the goal of.
EAI architecture mode
Architecture Pattern is the concept of design mode (Design Pattern), the design mode is to improve software flexibility and reuse, and develop changes in projects and design for a certain type of specific problem in design. Incident with the idea of achieving, it is also known as the micro architecture pattern, and the architecture mode has many common works with the design model, but it is a more macro-level design, which is a design pattern. Thought amplification and concept deepening, is a global program model for the entire system architecture.
The EAI architecture mode is to provide a set of basic technical theory support for EAI, which is to solve the specific modal structural model of several issues in EAI architecture design, and correctly apply EAI architectural mode, which is EAI project. Important guarantees for success, just like a firm and perfect building rooted in scientific theory and precisely calculated construction framework: a. Integras Adapter mode
意图: Convert existing application interface to the expected interface
Participants: One or more client applications, integrated adapters, and a service server application
Figure 1: Integrated adapter mode
The integrated adapter mode provides a flexible method for exporting the reusable application service. This architecture mode is the same as the integrated mode of the adapter mode in the design mode. Another intention of the integrated adapter mode is a reusable interface for multiple clients. . The client application calls the server application by integrated adapter, and integrated adapter converts the exported public API is the server-side API. The adapter does not know the existence of client applications. In the adapter design of NoninTrusive, the adapter is transparent to the server side, and in the Intrusive Adapter design, server applications need to be modified in some cases.
As the article is depicted, corporate informationization is a phased development, and a large number of basic data in the process often need to be obtained from the old system during this process. Integrated adapter mode, compares collaborative integration issues that solve new and old systems. The JAVA Connector Architecture, Java Connector Architecture, which is introduced in J2EE1.3, is compliant with integrated adapter mode. The JCA's goal is to pass CCI between Java New World and Old EIS (Enterprise Information System) Enterprise Information System (CommON) CLIENT Interface Establishing a General Integration Adaptation Specification.
b. Integrated Message (Integration Messenger) mode
Title: Describe how to reduce communication association between application
Participants: Integrated Applications, Integrated Meaning
Figure 2: Integrated Messure Mode
The integrated message is a distributed logic entity on a physical layer. Integrated Messure Mode Description Reduces Application Integration Architecture of Application Interactive Logic, which is to reduce communication dependence between applications, establish a more flexible integrated mechanism, deliver messages between applications, and provide location transparent services. Integrated messaging mode supportable communication methods are:
1. A pair of steps (request / response) consists of a client application and a server application, and the client is waiting for the server in the blocking mode.
2. One-on-one asynchronous (message queue). Composed of a client application and a server application, the client is waiting for the server in the non-block mode.
3. A pair of asynchronous (release and booking). Composed of one client and one or more serve, multiple predetermined people can subscribe to the same issuance event.
Here, it involves interacting in the application, conceptual related concepts - Application Interaction Model, including the following three modes:
1. Message Broker
2. Message queen (Message Queuing)
3. Publish@xubscribe
In this mode, the application is responsible for implementing the application interactive logic, the semantics of the application interaction is completely transparent to the integrated donsors. The communication model is diversified, but its purpose is consistent - minimizes communication dependence between applications. The advantage of asynchronous mode comparison synchronization mode is that asynchronous mode ensures that data is safely reliable, not worrying about data loss caused by network or other abnormalities; disadvantages are asynchronous mode, resulting in transaction splitting It became a message to send / enter the team, the message receives / queues two segmentation transactions, real-time and interactive experiences are poor than synchronous mode. Since the integrated datcher is a mess-based loose coupling technique, the message is maintained in the application of the sender and the receiver, and it is easy to achieve integration of cross-platform systems. In addition, specific functions such as data conversion, message distribution, routing, buffering, storage, etc. can also be completed by message proxy mechanisms. The JMS (Java Message Service) Java message service reflects the architectural idea of integrated duplicate mode. c. Integrauation Facade mode
意图: Reduce the association of the client and the server application, provide a simplified interface connected to the background application
Participants: one or more client applications, integration appearance and one or more server applications
Figure 3: Integrated appearance mode
The integrated appearance architecture mode is consistent with the intent of the design mode, but the integrated appearance architecture mode provides a simplified interface for reusable application and server application, providing flexible applications and application integration services. The integrated appearance provides a simplified interface for one or more clients. The client application calls integrated appearance simplified service, integrating the appearance of the abstract server-side function and converts the interface of the integrated appearance to the server application interface, making the server application easier to use. The client application completes the actual work, and the integrated appearance converts its own interface into a server application interface. Its interaction model is one-way interaction between one of the client or one of the clients. The integrated appearance does not know the existence of the customer, and the server application does not know the existence of integrated appearance. By abstract unified appearance interface from multiple server applications, you can simplify the integrated difficulty of the client, reaching the method of consistency for multiple service applications, shielding its original complexity.
d. Integrated MediaTor mode
Interest: Packaging Application Interaction Logic, Minimize Application Relationship
Participants: Integrated Intermediarics, Participation Applications (Particle Applications)
Figure 4: Integrated intermediarometer mode
The integrated intermediarging mode is an application integrated architecture method for encapsulating application interaction logic and reducing applications. Its important advantages are:
1. Minimizes the dependence and the influence of the old system.
2. The complexity and maintenance workload of distributed interaction is simplified by centralized application interaction logic.
3. Easy to establish reusable services based on the application interaction logic of the package.
These advantages provide more flexible integration methods for the implementors and improve the agility of business. Compared to the integrated dowr, the integrated intermediarry knows what applications exist. The integrated intermediarcon includes application interaction logic, responsible for interacting between control and coordination applications, interacting with integrated intermediaries without having to face different applications. Each apparatus reducing the complexity of the application inter-application intercom with the direct interaction of the integrated intermediar, reaching the purpose of minimizing application association. Compared with the integrated appearance, the integrated intermediarcon is provided to the application is the two-way access function of the customer and the service. And integrated intermediaries are typically implemented by physical servers, not just unified abstract interface logic.
e. Process Automator mode
Intention: Repairing Architectural Method Description of Process Automation Logic and Application
Participants: Activity Service, Process Controller and Applications
Figure 5: Process Automation Mode Process Automation Mode Description Maximum Method for Minimizing Process Automation Control Logic and Information System Dependent Relationships, thereby hidden from the activity abstraction from the flow controller by this system interaction (and human interaction) .
The main advantages are:
1. Can economically achieve powerful process automation solutions.
2. An unprecedented business process analysis capabilities (such as process bottlenecks, statistical information, error information, and resource utilization, etc.).
3. This architecture obtains unprecedented redefine and fast deployment process automation applications.
4. Similar to integrated appearance mode and integrated intermediard mode, application integrated logic is packaged and can be shared.
5. Process Automation Applications Near the perspective of the manager, reducing the discrimination of business perspectives and IT world, minimizing incorrectly from business needs to IT solutions.
Process Automation Mode The flexibility of the transaction can be improved through a flexible system integration architecture, and the transaction requires high quality business processes, reducing the reduction of business cycles, and reducing processing costs. The same process is repeated every day, and the process automation can automatically establish an active sorting mechanism for these processes. The core of the process automaton is the ordering and control of the activity (automatic or manual). Based on the process automation mode, it will be greatly reduced in realization of business process management and business process automation under the enterprise distributed system.
These five modes in the EAI architectural mode have a common goal: reduce the coupling between the applications. Different patterns are always decoupled at different levels. The integrated adapter is in the interface layer, the integrated gabyer is in the communication layer, integrated appearance, and integrated intermediarconic in the application layer. The process automation is a logical layer in the business. Appropriate decoupling at the architecture level is the essence of a rugged and flexible EAI solution. By flexibly applying EAI architecture mode in a complex enterprise system, it is possible to integrate complicated and chaotic dispersion applications into huge but orderly distribution applications, which lays a solid and robust implementation of the successful implementation of the entire EAI project and project cutting. basis. In a reasonable successful building frame, add bricks in the framework, it will be more reliable than the air-building pavilion that is built in the city's embarrassment in the desert.
EAI implementation technology
The level of EAI technology is currently more important to see the benevolent, wise see a wisdom, if there is a three-layer, from low to high, the infrastructure layer, an Interoperability Service Layer, and File Layer (Content) Layer; Many application developers divide EAI to divide the integrated resources into low-to-high data (DATE) layers, Application layers and business process layers, and other views think in these three On the basis of the layer, there is an integration of the user interface layer. In addition, at least three levels of layers can be found, and hundreds of flowers will arise from the prosperity of the academic community and the industry. Different starting points and analytical perspectives will naturally have a distinct conclusion, the author is no coming The intention, only three levels of EAI technology implementation means only according to their own work experience: the bottom-level protocol layer consists of various communication protocols that support the same / asynchronous message, and the asynchronous data-exchanged data layer and by synchronization The application layer of the real-time distributed component technology (including the interface layer and the business layer is achieved by these applications), the more the underlying technology, the lower the coupling degree, the more integrated flexibility Strong, but the weakening of operability / interaction ability; in turn, adopts the upper layer technology to achieve better interaction capabilities and operating experience, but the coupling degree will increase, the integrated flexibility will be limited. In fact, each of the superior techniques is a package special example and comprehensive application of one or more techniques of its low layer. Figure 6: Information system interaction / integration pathway and EAI implementation technology layers
a. protocol layer
The protocol is mainly composed of communication protocols that implement the Internet reference model of OSI (Open System Interconnection). On both ends of the information exchange need to complete the request / response in accordance with the protocol agreement, there is no restriction on the operating system and application software of the two. The protocol layer mainly includes the TCP / IP, which is widely used by the Internet, FTP / HTTP / POP3 / SMTP (where some upper protocols can be achieved through the transaction segmentation of the receipt, such as FTP, POP3, SOCKET-based technology (Socket is even more communication between Socket connection) (Socket or even between service and application), including IPX / SPX, NetBIOS, etc. in small Ethernet time, In addition, the PIPE technology is also a system communication, such as the NAMED PIPE data connection provided by the SQL Server and other databases; the operating system can also provide Anonymous PIPE, etc.). Using the implementation means of the protocol layer, more flexibility can be provided for the development and application of information integration, but to meet the upper needs of the application interoperability will have to pay a large workload and cost price.
b. Data (DATA) layer
The data layer is mainly transmitted by the delivery of data in asynchronously, and the transmission / reception of the data is exchanged by the completion of information of the write / read out of the data. Including a database (such as universal database connection such as ODBC, JDBC, OLE DB), message queue (the message queue mechanism of the operating system is actually a special case of the message queue, but it is in the application and application completion of messaging) and Direct file exchange (such as file exchange in FLAT File, EDI and XML) three ways, these three modes are not limited to the operating system and application software of the exchange, and asynchronous mode can also be processed and offline Homework provides good support, with small development work, low technical difficulty, and many early primitive information exchanges are implemented in the implementation technology of data. C. Application Layer
The application layer is mainly composed of various popular distributed objects, which has an objective development and application model. The simple real-time performance is good, operability / interaction ability, but the platform is unrelated, and the early distribution object technology, most It is from RPC technology to evolution, and it is also widely supported by the Corba (Common Object Request Broker Architecture platform) platform, and it is widely supported; RMI, EJB and DCOM ,. NET and other components are also widely used under their respective distributed platforms; the XIxing of Web Service / SOAP in the past two years is due to both objective operational capabilities and large integration flexibility (limited to SOAP protocol) It is very popular among the industry, the reason is that it is well balanced and grasped interactive and integrated double-edged sword. In recent years, a large number of middleware vendors have flexible packaging business logic to establish a redefineable distributed commercial information system for enterprises, and the integration of enterprise application levels has played positively promoted.
In February 2002, it is designed to ensure cross-platform, cross-applying, cross-programming language, interoperability, WS-I (Web Services Interoperability Organization) Web service interoperability organizations, from different vendors, is currently available. Most manufacturers of Microsoft, IBM, SUN, SAP, BEA, ORACLE, SYBASE, Intel, Borland, HP; standard BPEL4WS (Business Process), which is aimed at unified Web Service Business Process Collaboration and Integration During August Execution Language for Web Services) Web Service's business process executive language specification is also widely supported, initiated from the original IBM, Microsoft, and BEA three vendors, current members include Oracle, PeopleSoft, SAP, Sun, Tibco, Business Process Management Initiative Companies and institutions such as Workflow Management Coalition (WFMC); and UDDI, WSDL, WS-CORINATION, WS-Transaction, WS-Security, WS-Attachment, WS-License, etc. These for fulfilling the roads of Web Service to the world's platform applications and low coupling interoperability, Web Service has truly entered the mature commercialization stage, and will be in the company's application and system integration. .
EAI security strategy
The information system is a modern enterprise's lifeblood, information system data loss, information leakage, content tampering, and accessibility will be unbearable. Enterprise Application Integration Due to the complicated network links such as intranet / Internet, security factors can not be ignored. In the life cycle of the entire EAI application system, design development, test deployment, and application running from the EAI project, the safety should be the most important part. Building safety electronic trading model should meet the following five aspects, which is also the five standard safety services specified in OSI: 1. Data Secure: Prevent information from being intercepted or illegally accessed.
2. Object authentication: The communication between the communication objects is confirmed to prevent the third party to counterfeit.
3. Data Integrity: Blocking illegal entities from modifying, inserting, deleting, and preventing data loss of exchange data.
4. Defense Defense: It is used to confirm that the operation has occurred and the transaction is prevented from replying to the behavior.
5. Access control: Prevent unauthorized users from illegally use system resources.
Establish a secure corporate information platform should start from the following aspects:
a. Pay attention to the safety system from management
People are the most active factors in social activities and production activities. To establish a safe enterprise information system, first, we should pay attention to the information security of the company. Enterprises to go to the leadership to the operator in the company, they should recognize the security of the company. It is important to be aware that there is a concern and investment in security. Introduction can reduce security hidden dangers from enterprises by establishing management system, employee operation training, user strategy, access, etc., etc., etc., the external security risks can be avoided by establishing confidentiality system and technology investment to ensure enterprise information system Safety.
b. Establish a security system with technical means
Several aspects of safety hazards through technical means:
Network Security: The security application system can only be established on the security base platform. Enterprise information planning and architecture should be fully taken into account for information security issues, establish built-in system-level security strategies, such as inside and outsight, Subnet division, firewall, domain permissions, etc. provide basic network security.
Application Safety: Safety Applications should meet the needs of integrity, consistency, confidentiality, and effectiveness of information exchange. If the information system is analyzed, design, developed, test, acceptance, deployment, application, etc., grasping the safety criterion, discovery and makes up the vulnerability that may be maliciously utilized; using SSL (Secure Socket Layer), SET (Secure Electronic Transaction) Technologies such as PKI (Public Key Infrastructure) guarantees the safety of electronic transactions.
Safety: The setting of system operation rights should follow the principle of minimization, that is, provide minimum use permissions that can meet their work needs, avoid errors and overhearted access; in addition, the system log mechanism record application operation and user operation Case.
c. There is a legal system guarantees the safety system
In addition to management and technical systems, legal support is also important, and there is a sound and improvement of legal systems to provide reliable guarantees for industrial construction industry, e-government. For example, the Chinese government has recently been considered draft "The E-Signment Law" of the People's Republic of China, I believe that the development of China's electronic transactions will play a profound impact; in addition, establish and improve the legislative work of my country's computer and online crime as soon as possible. It is also imperative, and there is a national law to do the back shield to play the Internet's black hand to shock and discipline.
EAI product
J2EE / UNIX / Linux and. Net / Windows is currently two major camps in the enterprise application platform, two systems are competitively integrity in maturity and ease of use, high performance and low cost, openness and compatibility, share, and growth rates. EAI's numerous technical products and solution providers are also mainly surrounding these two corporate application platforms to die. a. IBM WebSphere Business Integration
WebSphere is the core of IBM's J2EE-based electronic commercial platform. The entire software family offers a set of solutions such as development, deployment, application, management. WebSphere Business Integration is in the field of enterprise application integration and process automation. Software products, mainly including the commercial communication middleware service MQSeries, which is renamed WebSphere MQ, and EAI / BPM software vendor Crossworlds and Holosofx, which have been acquired by IBM heavy gold, in 2002, integrated WebSphere Business Integration Overlay model, integrated , Connection, monitoring, and management of nearly 20 software modules, and provides a large number of mature industries and inter-banking solutions. Its goal is to connect applications and implementation process automation, establish a single-system unified and modern enterprise infrastructure. All applications can share data across different environments, develop language, transmission methods, and data formats. Business processes running independently or interacting with others can be designed and planned. Enterprise information systems can be achieved in accordance with business needs, intelligently, intelligently routing and delivering information. Can help enterprise simulation industry-specific business processes in the company's internal and partners, the traffic of business activities between customers, integrate these processes between customs and suit applications. Connect your business process with suppliers and customers, and provide the function of business process monitoring and business management. In the latest V
4.2.2
In the version of Business Integration, synchronous connection capability, monitoring, and debugging tracking and other functions have been greatly strengthened. Business Integration is just like its huge WebSphere system, has the characteristics of product line, clear functional segmentation, strong combination, flexible solution, platform integration, etc., Blue Giant Poly, Software Model and Solution System It can also be seen.
b. bea weblogic integration
WebLogic was originally an independent company. In 1998, it became a bea WebLogic Platform after the acquisition of BEA. Before 2002, Weblogic was a leader in the J2EE application server. It was helpless to be "on demand" WebSphere, which captured the laurel, only to flexion. BEA WebLogic Platform and IBM WebSphere have a lot of common points, such as J2EE platforms, are all sets of software systems, the same market positioning of commercial application service software. Although it is more weak than IBM WebSphere product lines, BEA WebLogic Platform is a bit weak, from the system architecture, functional module, solution, technical support forces, but can be in this "only the first second, no third "Survival in the cruel competitive environment, and it is also there. In the latest layout of BEA WebLogic Integration 8.1, Bea WebLogic Integration is one of its important products, providing a relatively complete business system integration solution, including application servers, business process management, application integration, and B2B integration. Providing an intuitive and powerful implementation method for the development, integration, and management business processes, which enables IT technology to apply in a single solution training for all applications, with greater flexibility and scalability when deploying resources across different projects. And provide the development and runtime framework, unify all business integration components under a single, flexible environment. These components cover business process management, data conversion, business partner integration, connectivity, message proxy, application monitoring, and user interaction. BEA is of course "small witch,", but the flexibility is relatively strong, such as the product response speed supported by EJB and other standards, and IBM can have nearly a hundred years of development history, the wind and rain, can't move, step by step Sorcerer is a magic weapon for its survival and development. c. Microsoft BizTalk Server
Microsoft has always been an overlord of desktop applications, and from. At the beginning of the Net Enterprise Servers concept, it tries to change the image of desktop app providers that have established in the past, formally enterprises in enterprise applications that have great potential for market potential. Although the Microsoft's Business Solutions department is still in a loss, the referral of the Microsoft commercial service software system of Windows Server System is continuously growing. The BizTalk Server is server products for enterprise EAI / BPA. Recently, the third version of BizTalk Server, who has just begged, is relatively mature. Although it is only "lightweight players" compared to IBM WebSphere, but in China's small and medium-sized enterprises, It is more competitive products. On the one hand, because most of these companies are deployed in the Windows environment, the underlying support will be relatively smooth. On the one hand, Microsoft's so-called "Do More With Less" market strategy is indeed in line with China 's enterprise informationization requirements. status quo. However, the price of BizTalk Server (Enterprise Edition is $ 5,000, Standard Edition is $ 7,000, and Partner Edition is $ 1,000) seems not high, but "water" is not small: First, BizTalk Server can only depend on SQL Server / Windows runs, the new BizTalk Server 2004 is embedded in Visual Studio, which is the development, configuration, deployment, and management environment. Net, these prices, the price of platform software Bill, is of course, will give you a lot of sheets. From the perspective, it is officially based on. NET and support Web Service, the integration capacity of the company and the trading partners, the process management and automation, business rules formulation and monitoring have increased, followed by BPEL4WS and provides flexible industry accelerator and adapter, etc. Give a look. A message from Microsoft's internal person is the three major characteristics of Longhorn, Indigo, Winfs. Winfs is based on the yukon database engine (principle is similar to adding a layer of MSDE
to sum up
Enterprise Informationization is a long-term development of progressive processes, and EAI technology is a problem that it is impossible in the process of rise. The key to establishing a strong and flexible enterprise information system is through EAI technology, connecting the isolated dispersion in an enterprise and an enterprise partner application system, forming a distributed business application system of resource sharing and business collaboration.
Whether it is EAI's orientation, or architectural mode, it is to successfully solve all kinds of problems in enterprise information system integration, and provide scientific methods and theoretical basis. The introduction and practice of EAI concept will definitely reduce the cost and risk of information investment, improve business competitiveness and enterprise strain ability, and establish a bridge that communicates into communication between information is island, which distributed cross-app, cross-enterprise business The establishment of collaborative system provides powerful technical foundation and theoretical reference. Note: This article covers a wide range of technologies and products, and the author refers to the many technical information at home and abroad in writing, thank you. In addition, some views of this paper stem from the author's own experience, for reference only.