- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Use Best Practice Patterns to Understand and Architect Manageable, Efficient Information Supply Chains That Help You Leverage All Your Data and KnowledgeIn the era of "Big Data," information pervades every aspect of the organization. Therefore, architecting and managing it is a multi-disciplinary task. Now, two pioneering IBM (R) architects present proven architecture patterns that fully reflect this reality. Using their pattern language, you can accurately characterize the information issues associated with your own systems, and design solutions that succeed over both the short- and long-term.Building on the analogy of a supply chain, Mandy Chessell and Harald C. Smith explain how information can be transformed, enriched, reconciled, redistributed, and utilized in even the most complex environments. Through a realistic, end-to-end case study, they help you blend overlapping information management, SOA, and BPM technologies that are often viewed as competitive. Using this book's patterns, you can integrate all levels of your architecture-from holistic, enterprise, system-level views down to low-level design elements. You can fully address key non-functional requirements such as the amount, quality, and pace of incoming data. Above all, you can create an IT landscape that is coherent, interconnected, efficient, effective, and manageable.Coverage IncludesUnderstanding how a pattern language can help you address key information management challenges Defining information strategy and governance for organizations and users Creating orderly information flows you can reuse and synchronize as needed Managing information structure, meaning, and lifecycles Providing for efficient information access and storage when deploying new IT capabilities Moving information efficiently and reliably to support your processes Determining how information should be processed and maintained Improving quality and accessibility, and supporting higher-value analytics Protecting information via validation, transformation, enrichment, correction, security, and monitoring Planning new information management projects in the context of your existing IT resources
Contents
About the Authors xxixChapter 1 Introduction 1Islands of Information 1Introducing MCHS Trading 2Improving an Organization's Information Management 4Patterns and Pattern Languages 7Basic Components in the Pattern Language 11Information Integration and Distribution 12Pattern Language Structure 15Summary 22Chapter 2 The MCHS Trading Case Study 25Introduction 25Building an Information Strategy 26Creating Management Reports 28Creating a Single View of Product Details 30Creating a Single View of Customer Details 37Understanding the Status of Orders 44Delivering Information Quality Improvements 47Connecting MCHS Trading into a B2B Trading Partnership 51Exploiting Predictive Analytics 55Summary of Case Study 67Chapter 3 People and Organizations 69Information Centric Organization Patterns 70Information Centric Organization 73Information Management Obligation 78Information Management Strategy 81Information Management Principle 83Information Governance Program 88Information User Patterns 91Information User 92Variations of the Information User Pattern 95Summary 97Chapter 4 Information Architecture 99Information Element Patterns 100Information Element 101Entity-Level Information Elements 106Information Asset 107Information Activity 110Information Event 113Information Processing Variables 114Information Summary 117Message-Level Information Elements 119Information Payload 119Attribute-Level Information Elements 122Information Link 123Information Metric 124Information Code 126Summary of Information Elements 129Information Identification Patterns 129Information Identification 130Defining Which Information to Manage and How 133Subject Area Definition 134Valid Values Definition 136Information Configuration 139Defining How Information Is Structured 141Information Model 141Information Schema 143Locating the Right Information to Use 145Information Location 146Semantic Tagging 148Semantic Mapping 150Different Reports About Information 153Information Values Report 154Information Values Profile 156Information Lineage 159Summary of Information Identification 161Information Provisioning Patterns 161Information Provisioning 163Localized Provisioning 166User Private Provisioning 167Application Private Provisioning 169Process-Level Provisioning 171Daisy Chain Provisioning 172Service-Level Provisioning 177User Shared Provisioning 178Service Oriented Provisioning 179Linked Information Provisioning 182Cache Provisioning 184Collection-Level Provisioning 185Snap Shot Provisioning 186Mirroring Provisioning 189Peer Provisioning 193Event-Based Provisioning 196Recovery Provisioning 197Summary of Information Provisioning 199Information Supply Chain Patterns 199Information Supply Chain 200Variations of the Information Supply Chain Pattern 209Cascading Information Supply Chain 211Hub Interchange Information Supply Chain 215Single View Information Supply Chain 219Consolidating Information Supply Chain 223Hierarchical Information Supply Chain 225Peer Exchange Information Supply Chain 230Summary of Information Supply Chains 232Summary 232Chapter 5 Information at Rest 235Information Service Patterns 236Information Service 238Information Service Implementation Patterns 243Local Information Service 243Remote Information Service 246Triggering Information Service 250Summary of Information Services 253Information Collection Patterns 253Information Collection 254Location of Information 259Physical Information Collection 260Virtual Information Collection 263Usage of an Information Collection 266Master Usage 267Reference Usage 271Hybrid Usage 274Sandbox Usage 277Scope of an Information Collection 279Complete Scope 280Local Scope 282Transient Scope 284Coverage of an Information Collection 285Complete Coverage 285Core Coverage 286Extended Coverage 286Local Coverage 287Summary of Information Collections 287Information Entry Patterns 288Information Entry 289Identifying Information Using the Information Key 292Information Key 295Local Key 297Recycled Key 300Natural Key 302Mirror Key 305Aggregate Key 307Caller's Key 310Stable Key 312Structures for an Information Entry 316Locking for an Information Entry 317Specialized Operations for an Information Entry 317Summary of Information Entries 318Information Node Patterns 319Information Node 320Business Information Nodes 324Application Node 326Information Content Node 330Search Node 332Information Store 334Information Mart 337Information Cube 340Integration Nodes 343Information Broker 343Queue Manager 349Staging Area 353Look-Up Table Node 356Event Correlation Node 358Operational Data Stores and Hubs 360Information Mirror Store 361Information Event Store 364Operational Status Store 366Information Asset Hub 368Information Activity Hub 372Big Data Information Processing Nodes 376Information Warehouse 377Streaming Analytics Node 380Map-Reduce Node 382Analysis Information Nodes 385Information Analysis Node 386Information Mining Store 389Summary of Information Nodes 393Summary 394Chapter 6 Information in Motion 395Information Request Patterns 396Information Request 396Variations of the Information Request Pattern 398Summary of Information Requests 401Information Flow Patterns 401Information Flow 403Routing Information Flows 406Staged Routing 407Partitioned Routing 410Buffered Routing 413Filtered Routing 416Summarized Routing 418Consolidating Information Flows 420Synchronized Consolidation 421Filtered Consolidation 424Ordered Consolidation 427Independent Consolidation 429Distributing Information Flows 432Synchronized Distribution 433Partitioned Distribution 436Ordered Distribution 439Independent Distribution 441Broadcast Distribution 444Summary of Information Flow Patterns 446Summary 447Chapter 7 Information Processing 449Information Trigger Patterns 450Information Trigger 450Variations of the Information Trigger Pattern 453Manual Information Trigger 453Scheduled Information Trigger 455Information Service Trigger 458Information Change Trigger 460External Sensor Trigger 462Summary of Information Triggers 465Information Process Patterns 465Information Process 466Business Processes 469Bespoke Application Process 471Packaged Application Process 472Agile Business Process 474State Driven Process 476Collaborative Editing Process 479Information Reporting Process 481Quality Information Processes 483Information Profile Tracking Process 484Clerical Review Process 487Information Remediation Process 489Information Validation Process 491Information Matching Process 493Information Ever-Greening Process 496Information Archiving Process 497Provisioning Information Processes 499Information Replication Process 500Information Deployment Process 502Information Relocation Process 505Information Federation Process 507Information Queuing Process 509Information Broadcasting Process 511Information Summarizing Process 513Information Scavenging Process 515Analytics Processes 517Information Pattern Discovery Process 518Information Decision Definition Process 521Information Pattern Detecting Process 523Search Processes 525IT Service Management Processes 526Operational Health Monitoring Process 527Information Node Management Process 528Scheduling Process 530Summary of Information Processes 531Summary 532Chapter 8 Information Protection 533Information Reengineering Step Patterns 534Information Reengineering Step 534Specialist Information Reengineering Steps 538Restructure Data 539Standardize Data 542Enrich Data 545Classify Data 546Check Data 548Correct Data 550Link Entries 553Merge Entries 556Separate Entries 558Derive Value 560Derive Relationship 562Smooth Data 563Sample Data 565Information Guard Patterns 566Information Guard 567Variations of the Information Guard Pattern 570Information Probe Patterns 572Information Probe 572Variations of the Information Probe Pattern 575Summary 576Chapter 9 Solutions for Information Management 577Information Solution Patterns 578Information Solution 578Patterns for Changing Information Nodes 582New Information Node 583Information Node Upgrade 587Patterns for Integrating Information Nodes 590Distributed Activity Status 590Semantic Integration 593Partner Collaboration 597Patterns for Master Data Management 599Shared Master 601Centralized Master 604Information Registry 607Golden Reference 610Synchronized Masters 613Patterns for Big Data and Warehouses 618Historical System of Record 619Workload Offload 624Patterns for Business Intelligence and Analytics 626Performance Reporting 626Operational Analytics 628Next Best Action 630Patterns for Information Protection 633Managed Archive 634Information Access Audit 636Information Monitoring 638Summary of Information Solutions 642Final Thoughts 642Appendix 1 Glossary 643Appendix 2 Summary of MCHS Trading's Systems 649Appendix 3 Related Pattern Languages 651Appendix 4 Bibliography 653Information Centric Organization 653Enterprise Architecture 653Enterprise Application Architecture 654Service-Oriented Architecture and Web Services 655Information Architecture 655Data Models 655Metadata Management 656Information Warehouse 657Information Integration 657Information Quality 658Master Data Management 659Big Data 659Analytics and Reporting 660Information Security and Privacy 660Information Life-Cycle Management 661Patterns Index 663Index 669