SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
A Resource Oriented Framework for
Context-Aware Enterprise Applications

                 WS-REST 2011
                 Hyderabad, India
                  March 28, 2011


                       Dave Duggal
               Consilience International LLC
                    dave@ideate.com

                       William Malyk
               Consilience International LLC
                      bill@ideate.com




            Copyright 2011, Consilience International LLC
Presentation Flow

1. Background
    •   A Resource-Oriented Framework
    •   Out-of-Band Context
    •   Connectedness - It’s a Small World After All
    •   READ-WRITE-EXECUTE
    •   Emergent Process
    •   Implementations


2. System Design
    •   Everything is a Resource
    •   Distributed
    •   Virtualized Information Layer
    •   A Canonical Method
    •   Conceptual Architecture


3. Relationship to REST
    •   Alignment with REST Constraints


4. References


        Copyright 2011, Consilience International LLC   2
A Resource-Oriented Framework

A Context-Aware Information System implemented as a RESTful
Intermediary.

All system communications are based on a Uniform Interface.

Clients traverse links consistent with HATEOS.

Generative - all payloads, including generalized next steps, are
generated dynamically

No Domain Specific Languages, just generalized capabilities from
coordinated Resources.

A Framework for Situationally-Aware Composite Applications and
Emergent Process.



                     Copyright 2011, Consilience International LLC   3
Out-of-Band Context

The System exploits out-of-band context to return targeted responses
that optimize business relevance and support precise in-flight
application of policies (i.e. business rules; system governance;
transaction controls).

Out-of-Band context includes any URI accessible to the system via its
virtual information layer (e.g. data; business entities; program code;
RESTful Services; RESTfully encapsulated legacy systems; etc.).

Since context is temporal URIs are volatile; responses are run-time
constructions – clients cannot cache.

The System provides Lifecycle Management of all system Resources
with automatic version control and roll-back capability. Version is part
of context, applications co-evolve with their constituent Resources.



                     Copyright 2011, Consilience International LLC         4
Connectedness - It’s a Small World After All

     Virtual Information layer induces a graph information model, the
     system is a ‘Small World Network’.

     An Agent fetches Out-of-Band Context based on machine and user
     generated metadata tags as guided by Metaprograms and policies.




                         Copyright 2011, Consilience International LLC   5
READ-WRITE-EXECUTE

Coordinates loosely-coupled Resources (Nouns) to act like Services
(Verbs) without the cost, indirection, or latency of middleware-centric
approaches (i.e. no ESB, BPEL, BPMN, CEP, etc).

Interoperability with the opportunity to consolidate patterns by
devolving capabilities from middleware to generalizable capabilities of a
system of systems.

Moves web from Read/Write (CRUD) to Read/Write/Execute, where
execute is RESTful coordination of loosely-coupled distributed Resources.

                                Read               Write                Execute

              Web 1.0            Yes                 No                   No

              Web 2.0            Yes                 Yes                  No

              Web 3.0            Yes                 Yes                  Yes


                        Copyright 2011, Consilience International LLC             6
Emergent Process

Interaction-driven system supports emergent processes without
limitations of finite state map.

The degree of structure (i.e. control logic) is a runtime variable. The
system balances interests, as flexible as possible for business relevance
and as procedural as necessary for compliance.

Addresses a gap in process collaboration technologies; current product
offerings are either structured/procedural (e.g. ERP; Expert Systems;
BPMS; etc.) or unstructured/ad hoc (e.g. activity streams; email; case
management) that offer flexibility, but cannot provide for reporting or
compliance.




                     Copyright 2011, Consilience International LLC          7
Implementations

Targeted at complex, long-running, human-centered, indeterminate
goal-driven work that are impacted by events and characterized by
exceptions – ‘knowledge-work’.

Initially focused on R&D sector with deployments and test sites around
the world, and in discussions with Enterprise Architects at Financial
Companies, Hotel Chains, and other Industries.




                    Copyright 2011, Consilience International LLC        8
Everything is a Resource


      A Sole First-Class Citizen

                     Data/Entities

                     Program Code/Meta-Programs

                     Services

                     Legacy Systems




     Copyright 2011, Consilience International LLC   9
Distributed



                                                Data/Entities

                                                Program Code

                                                Services

                                                Legacy Systems




Copyright 2011, Consilience International LLC                   10
Virtualized Information Layer



                                                        Data/Entities

                                                        Program Code

                                                        Services

                                                        Legacy Systems




        Copyright 2011, Consilience International LLC                   11
A Canonical Method

           Mashup as Information Integration Model


Request




 Custom
Response
                                Intermediary               ∞            Resourcesn




                                Resource
                                                                         Utilitiesn
                              Representation


Step 1: Serial Mash-up to Progressively Evaluate what Generalized Action is Required

Step 2: Serial Mash-up to Progressively Customize Generalized Action

Step 3: Serial Mash-up to Identify Valid Transitions (Next Possible Generalized Actions)

Deliver Custom System Response, Update Resource Lifecycles, Dissolve Container

                        Copyright 2011, Consilience International LLC                      12
Conceptual Architecture




     Copyright 2011, Consilience International LLC   13
Alignment with REST Constraints
         Constraint           Support                                                     Notes
Client-Server (5.1.2)           Full

                                        All state is maintained as Resource state. Application state is not separately persisted by
State-less (5.1.3)            Partial
                                        server or client. System uses Out-of-Band context to enrich system response.


Cache-ability (5.1.4)         Partial   Intermediary can cache during execution, but no client caching due to volatility of URIs.


Uniform Interface (5.1.5)      Full

Identification of Resources    Full     All Resources addressed by URIs.

Manipulation of Resources
                               Full
through Representations

Self-descriptive messages      Full


                                        All state is maintained in Resources. Application state is not separately persisted by server
Hypermedia as the engine of
                               Full     or client. Client does not maintain application state. Client is supplied with a set of next
application state
                                        valid transitions as part of the payload of each interaction.


Layered System (5.1.6)         Full     The agent acts as a client to any additional intermediaries required.


Code-On-Demand (5.1.7)
                               Full
optional

                                          Copyright 2011, Consilience International LLC                                        14
References

1.    Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M. and Steggles, P. 1999. “Towards a Better Understanding of Context and Context-
      Awareness”, Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, p.304-307, September 27-29, 1999,
      Karlsruhe, Germany.
2.    Beer, S. 1972. “Brain of the Firm”. ISBN: 978-0-471-94839-1.
3.    Box, G. E. P. 1979. "Robustness in the Strategy of Scientific Model Building", Robustness in Statistics: Proceedings of a Workshop. Launer RL,
      Wilkinson GN, eds. New York: Academic Press; 1979:40.
4.    Chakravorty, S. S. 2010. “Where Process-Improvement Projects Go Wrong”. Wall Street Journal, January 25, 2010.
5.    Chase, R B., Jacobs, F. R., Aquilano, N. J. 2006. Operations Management for Competitive Advantage (11th ed.). New York: McGraw-Hill/Irwin.
6.    DeGarmo, T. 2010. “Message from the Editor”, TechnologyForecast, 2010, Issue 1. Copyright PricewaterhouseCoopers LLP.
7.    Drucker, P. F. 1966. The Effective Executive.
8.    Duggal, D. and Malyk, W. 2009. Resource Processing Using an Intermediary for Context-Based Customization of Interaction Deliverables. USPTO
      Patent application and EPO PCT.
9.    Fielding, R.T. 2000. “Architectural Styles and the Design of Network-based Software Architectures”, PhD Dissertation.
10.   Flynn, T. P. 2011. “Cutting through complexity”, KPMG International Annual Review 2010. Copyright 2011, KPMG International Collaborative.
11.   Hagel III, J., Seely Brown, J. 2010. Designing for Propensity. Blog: http://blogs.hbr.org/bigshift/2010/12/designing-for-propensity.html

12.   Kulkarni, D. and Tripathi, A. R. 2010. “A Framework for Programming Robust Context-Aware Applications”, IEEE Trans. Software Eng. 36(2): 184-
      197 (2010).
13.   Le Clair, C. and Miers, D. 2010. Forrester Update: Dynamic Case Management.
14.   McCoy, D. W. 2010. Context-Enhanced Performance: Reducing Process Stagnation and Chaos. Gartner analyst report, September 20, 2010.
15.   Ploesser, K, Recker, J., and Rosemann, M. 2010, “Supporting Context-Aware Process Design: Learnings from a Design Science Study”, 6th
      International Workshop on Business Process Design (BPD’10).
16.   Taylor, F. W. 1911. The Principles of Scientific Management.
17.   Tseng, M.M., Jiao, J. 2001. Mass Customization, in: Handbook of Industrial Engineering, Technology and Operation Management (3rd ed.). New
      York, NY: Wiley. ISBN 0-471-33057-4.
18.   van der Aalst, W. M. P., Adams, M., ter Hofstede, A. H. M., Pesic, M. and Schonenberg, H. 2009. “Flexibility As a Service”, Proceedings of the 1st
      International Workshop on Mobile Business Collaboration (MBC’09), volume 5667 of Lecture Notes in Computer Science, pages 319-333,
      Brisbane, Australia, April 2009. Springer.
19.   Walid, T. 2007. “Resource Aware Programming”. GoogleTechTalks, http://www.youtube.com/watch?v=7MIK_ppEXno.




                                                    Copyright 2011, Consilience International LLC                                                      15
Dave Duggal
Consilience International LLC
     dave@ideate.com

        William Malyk
Consilience International LLC
       bill@ideate.com

         www.ideate.com




   Copyright 2011, Consilience International LLC

Contenu connexe

Tendances

Management High-level overview of the OMG Data Distribution Service (DDS)
Management High-level overview of the OMG Data Distribution Service (DDS)Management High-level overview of the OMG Data Distribution Service (DDS)
Management High-level overview of the OMG Data Distribution Service (DDS)Gerardo Pardo-Castellote
 
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
 
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical SystemsA DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systemsijseajournal
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1Robert Donald
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and DiagnosisVideoguy
 
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSijgca
 
DS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdfDS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdfVarshaBaini
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsAhmed Hammam
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...Conference Papers
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review IJECEIAES
 

Tendances (16)

Final report
Final reportFinal report
Final report
 
Management High-level overview of the OMG Data Distribution Service (DDS)
Management High-level overview of the OMG Data Distribution Service (DDS)Management High-level overview of the OMG Data Distribution Service (DDS)
Management High-level overview of the OMG Data Distribution Service (DDS)
 
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
 
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical SystemsA DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis
 
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 
DS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdfDS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdf
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
software architecture
software architecturesoftware architecture
software architecture
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review
 

En vedette

Xtremekeratincare.com
Xtremekeratincare.comXtremekeratincare.com
Xtremekeratincare.comxtremekeratin
 
Wsrest13 gilherme keynote
Wsrest13 gilherme keynoteWsrest13 gilherme keynote
Wsrest13 gilherme keynoteruyalarcon
 
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...ruyalarcon
 
IT復興円卓会議資料
IT復興円卓会議資料IT復興円卓会議資料
IT復興円卓会議資料Ishii Miho
 
ISPPについて
ISPPについてISPPについて
ISPPについてIshii Miho
 
Cspd san fran2011
Cspd san fran2011Cspd san fran2011
Cspd san fran2011tbg-designs
 
XML Technologies for RESTful Services Development
XML Technologies for RESTful Services DevelopmentXML Technologies for RESTful Services Development
XML Technologies for RESTful Services Developmentruyalarcon
 
RestFS: Resources and Services are Filesystems, Too
RestFS: Resources and Services are Filesystems, TooRestFS: Resources and Services are Filesystems, Too
RestFS: Resources and Services are Filesystems, Tooruyalarcon
 
Hecate, Managing Authorization with RESTful XML
Hecate, Managing Authorization with RESTful XMLHecate, Managing Authorization with RESTful XML
Hecate, Managing Authorization with RESTful XMLruyalarcon
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardChristian Frahm
 
IT復興円卓会議資料
IT復興円卓会議資料IT復興円卓会議資料
IT復興円卓会議資料Ishii Miho
 

En vedette (20)

Xtremekeratincare.com
Xtremekeratincare.comXtremekeratincare.com
Xtremekeratincare.com
 
Wsrest13 gilherme keynote
Wsrest13 gilherme keynoteWsrest13 gilherme keynote
Wsrest13 gilherme keynote
 
English class 4
English class 4English class 4
English class 4
 
The Red Sea Crossing
The Red Sea CrossingThe Red Sea Crossing
The Red Sea Crossing
 
Life Support
Life SupportLife Support
Life Support
 
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
 
Propuesta grupal
Propuesta grupal Propuesta grupal
Propuesta grupal
 
Xtremekeratincare
XtremekeratincareXtremekeratincare
Xtremekeratincare
 
Meetup intro presentation
Meetup intro presentationMeetup intro presentation
Meetup intro presentation
 
2015 State of the Industry - LOGA Don Briggs
2015 State of the Industry - LOGA Don Briggs2015 State of the Industry - LOGA Don Briggs
2015 State of the Industry - LOGA Don Briggs
 
IT復興円卓会議資料
IT復興円卓会議資料IT復興円卓会議資料
IT復興円卓会議資料
 
Presentación ingles evet2edu
Presentación ingles evet2eduPresentación ingles evet2edu
Presentación ingles evet2edu
 
ISPPについて
ISPPについてISPPについて
ISPPについて
 
Cspd san fran2011
Cspd san fran2011Cspd san fran2011
Cspd san fran2011
 
XML Technologies for RESTful Services Development
XML Technologies for RESTful Services DevelopmentXML Technologies for RESTful Services Development
XML Technologies for RESTful Services Development
 
RestFS: Resources and Services are Filesystems, Too
RestFS: Resources and Services are Filesystems, TooRestFS: Resources and Services are Filesystems, Too
RestFS: Resources and Services are Filesystems, Too
 
Hecate, Managing Authorization with RESTful XML
Hecate, Managing Authorization with RESTful XMLHecate, Managing Authorization with RESTful XML
Hecate, Managing Authorization with RESTful XML
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS Standard
 
S1 intro
S1 introS1 intro
S1 intro
 
IT復興円卓会議資料
IT復興円卓会議資料IT復興円卓会議資料
IT復興円卓会議資料
 

Similaire à A Resource Oriented Framework for Context-Aware Enterprise Applications

Ideate Framework WS-REST 2011
Ideate Framework  WS-REST 2011Ideate Framework  WS-REST 2011
Ideate Framework WS-REST 2011Dave Duggal
 
Orleans: Cloud Computing for Everyone - SOCC 2011
Orleans: Cloud Computing for Everyone - SOCC 2011Orleans: Cloud Computing for Everyone - SOCC 2011
Orleans: Cloud Computing for Everyone - SOCC 2011Jorgen Thelin
 
Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...
Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...
Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...Compuware APM
 
Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Julie Tsai
 
From Valleys to Clouds
From Valleys to CloudsFrom Valleys to Clouds
From Valleys to CloudsPeter Coffee
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems fromingenioustech
 
Hibernate Interview Questions
Hibernate Interview QuestionsHibernate Interview Questions
Hibernate Interview QuestionsSyed Shahul
 
Hibernate reference1
Hibernate reference1Hibernate reference1
Hibernate reference1chandra mouli
 
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018UX Antwerp Meetup
 
Lecture 04 - Loose Coupling
Lecture 04 - Loose CouplingLecture 04 - Loose Coupling
Lecture 04 - Loose Couplingphanleson
 
Reactive Architecture
Reactive ArchitectureReactive Architecture
Reactive ArchitectureKnoldus Inc.
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009subramanian K
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 
MICE: Monitoring and modelIng of Context Evolution
MICE: Monitoring and modelIng of Context EvolutionMICE: Monitoring and modelIng of Context Evolution
MICE: Monitoring and modelIng of Context EvolutionLuca Berardinelli
 
An agent based approach for building complex software systems
An agent based approach for building complex software systemsAn agent based approach for building complex software systems
An agent based approach for building complex software systemsIcaro Santos
 
Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Stephane Fellah
 

Similaire à A Resource Oriented Framework for Context-Aware Enterprise Applications (20)

Ideate Framework WS-REST 2011
Ideate Framework  WS-REST 2011Ideate Framework  WS-REST 2011
Ideate Framework WS-REST 2011
 
Orleans: Cloud Computing for Everyone - SOCC 2011
Orleans: Cloud Computing for Everyone - SOCC 2011Orleans: Cloud Computing for Everyone - SOCC 2011
Orleans: Cloud Computing for Everyone - SOCC 2011
 
Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...
Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...
Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...
 
Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4
 
From Valleys to Clouds
From Valleys to CloudsFrom Valleys to Clouds
From Valleys to Clouds
 
Intro ds 1
Intro ds 1Intro ds 1
Intro ds 1
 
Ch10
Ch10Ch10
Ch10
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems from
 
Hibernate Interview Questions
Hibernate Interview QuestionsHibernate Interview Questions
Hibernate Interview Questions
 
Hibernate reference1
Hibernate reference1Hibernate reference1
Hibernate reference1
 
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
 
Lecture 04 - Loose Coupling
Lecture 04 - Loose CouplingLecture 04 - Loose Coupling
Lecture 04 - Loose Coupling
 
Reactive Architecture
Reactive ArchitectureReactive Architecture
Reactive Architecture
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 
MICE: Monitoring and modelIng of Context Evolution
MICE: Monitoring and modelIng of Context EvolutionMICE: Monitoring and modelIng of Context Evolution
MICE: Monitoring and modelIng of Context Evolution
 
An agent based approach for building complex software systems
An agent based approach for building complex software systemsAn agent based approach for building complex software systems
An agent based approach for building complex software systems
 
Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management
 
Software Engineering 101
Software Engineering 101Software Engineering 101
Software Engineering 101
 

Plus de ruyalarcon

A Framework for Self-descriptive RESTful Services
A Framework for Self-descriptive RESTful ServicesA Framework for Self-descriptive RESTful Services
A Framework for Self-descriptive RESTful Servicesruyalarcon
 
Distributed affordance: An Open-World Assumption for Hypermedia
Distributed affordance: An Open-World Assumption for HypermediaDistributed affordance: An Open-World Assumption for Hypermedia
Distributed affordance: An Open-World Assumption for Hypermediaruyalarcon
 
Teaching Old Services New Tricks: Adding HATEOAS Support as an Afterthought
Teaching Old Services New Tricks: Adding HATEOAS Support as an AfterthoughtTeaching Old Services New Tricks: Adding HATEOAS Support as an Afterthought
Teaching Old Services New Tricks: Adding HATEOAS Support as an Afterthoughtruyalarcon
 
Modeling RESTful applications
Modeling RESTful applicationsModeling RESTful applications
Modeling RESTful applicationsruyalarcon
 
A Framework for Obligation Fulfillment in REST Services
A Framework for Obligation Fulfillment in REST ServicesA Framework for Obligation Fulfillment in REST Services
A Framework for Obligation Fulfillment in REST Servicesruyalarcon
 
REST and Linked Data: a match made for domain driven development?
REST and Linked Data: a match made for domain driven development?REST and Linked Data: a match made for domain driven development?
REST and Linked Data: a match made for domain driven development?ruyalarcon
 

Plus de ruyalarcon (6)

A Framework for Self-descriptive RESTful Services
A Framework for Self-descriptive RESTful ServicesA Framework for Self-descriptive RESTful Services
A Framework for Self-descriptive RESTful Services
 
Distributed affordance: An Open-World Assumption for Hypermedia
Distributed affordance: An Open-World Assumption for HypermediaDistributed affordance: An Open-World Assumption for Hypermedia
Distributed affordance: An Open-World Assumption for Hypermedia
 
Teaching Old Services New Tricks: Adding HATEOAS Support as an Afterthought
Teaching Old Services New Tricks: Adding HATEOAS Support as an AfterthoughtTeaching Old Services New Tricks: Adding HATEOAS Support as an Afterthought
Teaching Old Services New Tricks: Adding HATEOAS Support as an Afterthought
 
Modeling RESTful applications
Modeling RESTful applicationsModeling RESTful applications
Modeling RESTful applications
 
A Framework for Obligation Fulfillment in REST Services
A Framework for Obligation Fulfillment in REST ServicesA Framework for Obligation Fulfillment in REST Services
A Framework for Obligation Fulfillment in REST Services
 
REST and Linked Data: a match made for domain driven development?
REST and Linked Data: a match made for domain driven development?REST and Linked Data: a match made for domain driven development?
REST and Linked Data: a match made for domain driven development?
 

A Resource Oriented Framework for Context-Aware Enterprise Applications

  • 1. A Resource Oriented Framework for Context-Aware Enterprise Applications WS-REST 2011 Hyderabad, India March 28, 2011 Dave Duggal Consilience International LLC dave@ideate.com William Malyk Consilience International LLC bill@ideate.com Copyright 2011, Consilience International LLC
  • 2. Presentation Flow 1. Background • A Resource-Oriented Framework • Out-of-Band Context • Connectedness - It’s a Small World After All • READ-WRITE-EXECUTE • Emergent Process • Implementations 2. System Design • Everything is a Resource • Distributed • Virtualized Information Layer • A Canonical Method • Conceptual Architecture 3. Relationship to REST • Alignment with REST Constraints 4. References Copyright 2011, Consilience International LLC 2
  • 3. A Resource-Oriented Framework A Context-Aware Information System implemented as a RESTful Intermediary. All system communications are based on a Uniform Interface. Clients traverse links consistent with HATEOS. Generative - all payloads, including generalized next steps, are generated dynamically No Domain Specific Languages, just generalized capabilities from coordinated Resources. A Framework for Situationally-Aware Composite Applications and Emergent Process. Copyright 2011, Consilience International LLC 3
  • 4. Out-of-Band Context The System exploits out-of-band context to return targeted responses that optimize business relevance and support precise in-flight application of policies (i.e. business rules; system governance; transaction controls). Out-of-Band context includes any URI accessible to the system via its virtual information layer (e.g. data; business entities; program code; RESTful Services; RESTfully encapsulated legacy systems; etc.). Since context is temporal URIs are volatile; responses are run-time constructions – clients cannot cache. The System provides Lifecycle Management of all system Resources with automatic version control and roll-back capability. Version is part of context, applications co-evolve with their constituent Resources. Copyright 2011, Consilience International LLC 4
  • 5. Connectedness - It’s a Small World After All Virtual Information layer induces a graph information model, the system is a ‘Small World Network’. An Agent fetches Out-of-Band Context based on machine and user generated metadata tags as guided by Metaprograms and policies. Copyright 2011, Consilience International LLC 5
  • 6. READ-WRITE-EXECUTE Coordinates loosely-coupled Resources (Nouns) to act like Services (Verbs) without the cost, indirection, or latency of middleware-centric approaches (i.e. no ESB, BPEL, BPMN, CEP, etc). Interoperability with the opportunity to consolidate patterns by devolving capabilities from middleware to generalizable capabilities of a system of systems. Moves web from Read/Write (CRUD) to Read/Write/Execute, where execute is RESTful coordination of loosely-coupled distributed Resources. Read Write Execute Web 1.0 Yes No No Web 2.0 Yes Yes No Web 3.0 Yes Yes Yes Copyright 2011, Consilience International LLC 6
  • 7. Emergent Process Interaction-driven system supports emergent processes without limitations of finite state map. The degree of structure (i.e. control logic) is a runtime variable. The system balances interests, as flexible as possible for business relevance and as procedural as necessary for compliance. Addresses a gap in process collaboration technologies; current product offerings are either structured/procedural (e.g. ERP; Expert Systems; BPMS; etc.) or unstructured/ad hoc (e.g. activity streams; email; case management) that offer flexibility, but cannot provide for reporting or compliance. Copyright 2011, Consilience International LLC 7
  • 8. Implementations Targeted at complex, long-running, human-centered, indeterminate goal-driven work that are impacted by events and characterized by exceptions – ‘knowledge-work’. Initially focused on R&D sector with deployments and test sites around the world, and in discussions with Enterprise Architects at Financial Companies, Hotel Chains, and other Industries. Copyright 2011, Consilience International LLC 8
  • 9. Everything is a Resource A Sole First-Class Citizen Data/Entities Program Code/Meta-Programs Services Legacy Systems Copyright 2011, Consilience International LLC 9
  • 10. Distributed Data/Entities Program Code Services Legacy Systems Copyright 2011, Consilience International LLC 10
  • 11. Virtualized Information Layer Data/Entities Program Code Services Legacy Systems Copyright 2011, Consilience International LLC 11
  • 12. A Canonical Method Mashup as Information Integration Model Request Custom Response Intermediary ∞ Resourcesn Resource Utilitiesn Representation Step 1: Serial Mash-up to Progressively Evaluate what Generalized Action is Required Step 2: Serial Mash-up to Progressively Customize Generalized Action Step 3: Serial Mash-up to Identify Valid Transitions (Next Possible Generalized Actions) Deliver Custom System Response, Update Resource Lifecycles, Dissolve Container Copyright 2011, Consilience International LLC 12
  • 13. Conceptual Architecture Copyright 2011, Consilience International LLC 13
  • 14. Alignment with REST Constraints Constraint Support Notes Client-Server (5.1.2) Full All state is maintained as Resource state. Application state is not separately persisted by State-less (5.1.3) Partial server or client. System uses Out-of-Band context to enrich system response. Cache-ability (5.1.4) Partial Intermediary can cache during execution, but no client caching due to volatility of URIs. Uniform Interface (5.1.5) Full Identification of Resources Full All Resources addressed by URIs. Manipulation of Resources Full through Representations Self-descriptive messages Full All state is maintained in Resources. Application state is not separately persisted by server Hypermedia as the engine of Full or client. Client does not maintain application state. Client is supplied with a set of next application state valid transitions as part of the payload of each interaction. Layered System (5.1.6) Full The agent acts as a client to any additional intermediaries required. Code-On-Demand (5.1.7) Full optional Copyright 2011, Consilience International LLC 14
  • 15. References 1. Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M. and Steggles, P. 1999. “Towards a Better Understanding of Context and Context- Awareness”, Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, p.304-307, September 27-29, 1999, Karlsruhe, Germany. 2. Beer, S. 1972. “Brain of the Firm”. ISBN: 978-0-471-94839-1. 3. Box, G. E. P. 1979. "Robustness in the Strategy of Scientific Model Building", Robustness in Statistics: Proceedings of a Workshop. Launer RL, Wilkinson GN, eds. New York: Academic Press; 1979:40. 4. Chakravorty, S. S. 2010. “Where Process-Improvement Projects Go Wrong”. Wall Street Journal, January 25, 2010. 5. Chase, R B., Jacobs, F. R., Aquilano, N. J. 2006. Operations Management for Competitive Advantage (11th ed.). New York: McGraw-Hill/Irwin. 6. DeGarmo, T. 2010. “Message from the Editor”, TechnologyForecast, 2010, Issue 1. Copyright PricewaterhouseCoopers LLP. 7. Drucker, P. F. 1966. The Effective Executive. 8. Duggal, D. and Malyk, W. 2009. Resource Processing Using an Intermediary for Context-Based Customization of Interaction Deliverables. USPTO Patent application and EPO PCT. 9. Fielding, R.T. 2000. “Architectural Styles and the Design of Network-based Software Architectures”, PhD Dissertation. 10. Flynn, T. P. 2011. “Cutting through complexity”, KPMG International Annual Review 2010. Copyright 2011, KPMG International Collaborative. 11. Hagel III, J., Seely Brown, J. 2010. Designing for Propensity. Blog: http://blogs.hbr.org/bigshift/2010/12/designing-for-propensity.html 12. Kulkarni, D. and Tripathi, A. R. 2010. “A Framework for Programming Robust Context-Aware Applications”, IEEE Trans. Software Eng. 36(2): 184- 197 (2010). 13. Le Clair, C. and Miers, D. 2010. Forrester Update: Dynamic Case Management. 14. McCoy, D. W. 2010. Context-Enhanced Performance: Reducing Process Stagnation and Chaos. Gartner analyst report, September 20, 2010. 15. Ploesser, K, Recker, J., and Rosemann, M. 2010, “Supporting Context-Aware Process Design: Learnings from a Design Science Study”, 6th International Workshop on Business Process Design (BPD’10). 16. Taylor, F. W. 1911. The Principles of Scientific Management. 17. Tseng, M.M., Jiao, J. 2001. Mass Customization, in: Handbook of Industrial Engineering, Technology and Operation Management (3rd ed.). New York, NY: Wiley. ISBN 0-471-33057-4. 18. van der Aalst, W. M. P., Adams, M., ter Hofstede, A. H. M., Pesic, M. and Schonenberg, H. 2009. “Flexibility As a Service”, Proceedings of the 1st International Workshop on Mobile Business Collaboration (MBC’09), volume 5667 of Lecture Notes in Computer Science, pages 319-333, Brisbane, Australia, April 2009. Springer. 19. Walid, T. 2007. “Resource Aware Programming”. GoogleTechTalks, http://www.youtube.com/watch?v=7MIK_ppEXno. Copyright 2011, Consilience International LLC 15
  • 16. Dave Duggal Consilience International LLC dave@ideate.com William Malyk Consilience International LLC bill@ideate.com www.ideate.com Copyright 2011, Consilience International LLC