11 INTRODUCTION TO WEB SERVICES PROTOCOLS …………………………… 97 11.1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 BEEP …………………………………………………………………………………. 97 EBUSINESSXML …………………………………………………………………….. 98 HESSIAN ……………………………………………………………………………… 98 HTTP…………………………………………………………………………………. 98 JSON-RPC ………………………………………………………………………….. 99 SOAP ………………………………………………………………………………… 99 UDDI……………………………………………………………………………….. 100 CONCLUSION TO WEB SERVICES PROTOCOLS ………………………………….. 100 12 13 WRAPPING THE WEB RESOURCES SURVEY ………………………………… 101 APPLYING WEB APPLICATION DEVELOPMENT TO BUSINESS PRACTICES 105 13.1 DEVELOPING BUSINESS CENTRIC WEB APPLICATIONS ………………………… 109 14 15 APPLYING CONTROL TO WEB APPLICATION OFFERINGS ………………. 113 USING ITIL IN WEB APPLICATIONS ……………………………………………. 117 15.1 ADAPTING SERVICE STRATEGY …………………………………………………… 119 15.2 ADAPTING SERVICE DESIGN ……………………………………………………… 121 15.2.1 Capacity Management ……………………………………………… 123 15.2.2 Availability Management ………………………………………….. 124 15.2.3 Service Level Management ……………………………………….. 124 15.3 ADAPTING SERVICE TRANSITION ………………………………………………… 125 15.3.1 Release Management ………………………………………………. 127 15.3.2 Configuration Management………………………………………. 129 4 Web Applications – A Complete Guide 15.3.3 Change Management……………………………………………….. 130 15.4 ADAPTING SERVICE OPERATION …………………………………………………. 130 15.4.1 Incident Management ………………………………………………. 131 15.4.2 Problem Management ……………………………………………… 132 15.5 CONTINUAL SERVICE IMPROVEMENT …………………………………………… 134 16 17 18 19 20 USING THE WEB TO PROMOTE ITIL …………………………………………… 135 HOSTING APPLICATIONS ON THE WEB ……………………………………… 143 BENEFITS FOR WEB APPLICATIONS …………………………………………… 147 SUMMARY ……………………………………………………………………………. 151 REFERENCES …………………………………………………………………………. 153 5 Web Applications – A Complete Guide 6 Web Applications – A Complete Guide 1 Introducing Applications on the Web The task of computing has always to apply logic to inputs in order to provide a consistent and acceptable output.
Programming code is set up to create a processing method that can be used and reused.
In early days, the code may have been self-contained by individual machines, where one machine would provide processing for one task while another machine is used for another task.
Eventually, programming code become self-contained into files called applications.
The advantage to computing was that multiple applications could be found on a single machine.
Use of the application was derived by accessing the file that contains the desired programming code.
The primary focus of applications in these early days was used to aid scientific research and statistical analysis.networking allowed programming code to be shared by multiple users.
To do this, the application sat on a single machine that was connected to each of the users.
To access the application, the users simply needed to be connected to the server and access the file on the single machine, usually called a server.
The machine that the 7 Web Applications – A Complete Guide — 111 Web Applications – A Complete Guide 112 Web Applications – A Complete Guide 14 Applying Control to Web Application Offerings Whether a company has decided to develop a web application for internal use or to market that application for use by other companies, there is still a need for control over the infrastructure and support of the application.
To properly support a web application, process and procedures must be developed to handle any number of situations that may arise during the life of product.
Though many methodologies may exist to assist the company in supporting the application, the first recommendation is to find a method that is recognizable and its use is encouraged as a standard.
Specifically for applications that are used in institutions of finance, health, and government, the regulations surrounding IT support are extensive and are in place to ensure availability, confidentiality, and integrity of the systems.
One of the increasingly recognized methods is ITIL.
The Information Technology Infrastructure Library (ITIL) is a series of books covering the each major topic of IT management under Service Support and Delivery.
Rather than being a methodology of instructions and how to, it is a framework of concepts and policies for managing the infrastructure, development and operations of information 113 Web Applications – A Complete Guide technology.
The practices that it entails are considered best practices for supporting IT and include components such as checklists, tasks, and procedures that can be tailored by any IT organization.
Certification in ITIL by an organization means that their IT processes adhere to the concepts and policies provided by ITIL.
From a business perspective, ITIL certification is a marketing advantage because it provides a foundation for understanding the positioning of the IT focus for both the customer and the supplier.
Within the subject of developing web applications, there are two directions that can be taken when approaching the topic ITIL.
The first approach is the ensuring that the infrastructure supporting the application is ITIL compliant.
The second is the creation of web applications that allow the management of the infrastructure using ITIL concepts and policies.
Almost immediately the lines seemed to blur between the approaches, but they are distinct.
The key to the distinction is the web application that needs to be supported.
If the application is based on supporting IT management, there is definitely a blur, but not all web applications support the management of IT.
Some support the financial aspect of the business, others the supply chain, others the customer relationship, human resources, or project management.
Unfortunately in almost every example listed here and others that were possible, some form of IT can be found that manages these business functions or need to be 114 Web Applications – A Complete Guide managed itself.
So to make the distinction very clear, let’s use an application that has the least amount of IT management requirements attached to it at least from a business perspective, the online game.
A game is built on an infrastructure comprises of hardware, software, and network components.
To support the success of the game, the infrastructure needs to be managed.
This is the first approach.
In order to successfully manage the infrastructure used by the game a series of process and procedures are developed.
To make the management of these processes and procedures more effective and efficient, a set of tools are created to support them.
To these tools automation is added, as well as reporting mechanisms for understanding the current condition of the infrastructure.
This set of tools eventually become a suite of applications sued to manage the infrastructure used to support the game.
This is the second approach and does not take into much account the reason for the infrastructure, the game, but rather the processes and procedures for the infrastructure.
Where the distinctions tend to complicate themselves is when the game is actually an application for a specific IT solution, like incident management.
Now you have the incident management application, the infrastructure supporting incident management, and the process and procedures supporting the infrastructure which will include incident management and may in fact be using the same application it’s supporting. 115 Web Applications – A Complete Guide 116 Web Applications – A Complete Guide 15 Using ITIL In Web Applications As mentioned, ITIL is a series of books covering every major topic of IT management.
Since its inception, the library grew to over 30 volumes.
The release of ITIL version 3 consolidated the volumes into five core titles: ? Service Strategy pertain to the processes used to identify market opportunities where services can be developed to meet a requirement.
The key areas of this title are Service Portfolio Management and Financial Management. ? Service Design pertain to all the activities required to develop the strategy in a design document covering every aspect of the propose service.
The key areas of this tile contain Availability Management, Capacity Management, Continuity Management, and Security Management. ? Service Transition pertains to the implementation of the service design and implementation of a production service or modification to an existing service.
The key areas found under this tile are Change Management, Release Management, Configuration Management, and Service Knowledge Management. ? Service Transition pertains to the activities 117 Web Applications – A Complete Guide ? necessary to operate the service and maintain functionality.
Key areas in this title are Incident Management, Problem Management, Request Fulfilment, and Event Management.
Continual Service Improvement pertains to creating the ability to deliver improvements to the existing services.
This title covers the key areas of Service Reporting, Service Measurement, and Service Level Management. ITIL is a management protocol that change IT management from being IT bound to being business bound and is one of the most used Business Driven IT Management (BDIM) tools.
As mentioned, Web services have become another major driver for how business is done.
Cloud computing services for platforms, applications, even storage, have become available to provide a low cost, low maintenance solution to traditional in-house solutions that consume much of a company’s IT budget as well as their overall business finances.
These services are marketed as pay-as-you-use solutions that have the possibility to fit nicely into a company’s IT strategy either to replace or extend the current infrastructure.
Whether a company is looking to utilize one of these services or are providing these services themselves, the opportunity of ITIL is equally important for their focus on effective delivery of IT services.
The problem with applying ITIL principles to the support of web applications is the nature of web application being an interwoven set of 118 Web Applications – A Complete Guide resources, web pages, and services.
The problem escalates the more systems that are tied into the web application.
The underlining problem is based on the concern of who to call when a failure occurs.
With traditional network problems, the application administrator was usually the last person to call, having most incidents being routed to network or server administrators to resolve the applicable network or server problems.
Since many web applications are portals for viewing the results of business logic which may reside in those more traditional systems, the incident routing tables may be more convoluted.
However, with careful planning, the adaption of ITIL to meet the requirements for supporting web applications is both possible and highly advantageous. 15.1 Adapting Service Strategy The Service Strategy is an important aspect of ITIL for companies looking to utilize the web infrastructure to hosting or utilize applications on the web.
The framework focuses on implementing the best practices for developing a long term service strategy.
For enterprises looking to utilize the web, this means identifying the potential benefits to utilizing the web for all or part of their IT strategy.
In cases where it is a transition from a traditional approach to using web services, the decision needs to be made pertaining to the transition period from one approach to the next.
But why would a 119 Web Applications – A Complete Guide company want to take a web approach to deliver IT services.
Most reasons for such a move for into one of three areas: Scalability, Availability, and Cost.
Web services are highly scalable.
This is one of the selling points for the many pay-as-you-go services available on the web.
For using web applications, the company can pay for a single instance of use or multiple instances.
For most business applications, storage is required to house any data that is used with the applications.
The more that application is used, the more storage that is required.
Storage-as-a-service solutions allow companies to define how much storage they need progressively increase their storage as time continues.
The same concept is applied to the data throughput of the network.
Every company will experience spikes in usage every once and while due to increased workloads, new releases, or even effective marketing campaigns.
Web services can scale those increases appropriately to handle those spikes automatically or with prior communication.
One of the primary concerns of companies is the availability of their applications and the data used by those applications.
When of the benefits of using the web is inherent ability to increase availability: anyone can access the web at any time or from any location.
This provides a great advantage for a company because they don’t have to increase their current infrastructure to increase availability.
Additionally, proper implementation of workload balancing, backup and restore, and redundancy procedures can 120 Web Applications – A Complete Guide provide additional assurances to availability.
Typically, these procedures are part of the service, though additional requirements may be available through a custom design.
The greatest benefit of cloud computing solutions is the cost to businesses.
To provide the scalability and availability mentioned, companies traditionally needed to expand their existing infrastructures to provide the physical support required and build traditional fat applications to take over or expand existing software capabilities.
These solutions take on a great cost in time and money for companies.
By utilizing the web, the costs of these solutions are shared with the provider of the service.
In fact, the cost is drastically because the service provider absorbs the buck of the cost with the intention of sharing those portions of the cost with other companies requiring the services.
For the company seeking these services, they simply need to understand what they need and find the service provider who is willing to provide it. 15.2 Adapting Service Design Designing the infrastructure and applications required to provide companies with a solution that works for their needs falls heavily on the service provider, though the customer should have a clear understanding of the process and requirements of IT design.
This is especially true for 121 Web Applications – A Complete Guide regulated industries seeking ITIL compliance.
Simply because they have place the buck of IT concerns on the shoulders of a service provider does not prevent the company from removing themselves from the process.
Service design is particularly interested in all aspects of the architecture, processes, policies, documentation, and requirement handling.
Each of these components have some control in how the entire infrastructure behaves to ensure that it meets the greatest benefit to the customer.
ITIL topics which have oversight to these components are the processes and concepts of Service Catalogue Management, Service Level Management, Capacity Management, IT Service Continuity, Security Management, Supplier Management, and Availability Management.
For service providers, concentration in developing each of these concepts provide a greater understanding of the capabilities and limitations of the service they offer.
It also allows greater flexibility in parsing out the required bandwidth, storage, and server platforms for their customers.
This isn’t just a technical support concern, but a marketing strategy.
Understanding the design of the implemented infrastructure and applications that are being provided allow the sales team the much needed information required to satisfied even the most difficult customer.
Since the remaining disciplines of ITIL fall entirely on the shoulders of the service provider, the topic of service design became the most important topic for the customer.
These are the topics are greatest concern to the basic customer: am I getting the right service, will it meet my 122 Web Applications – A Complete Guide needs, will I have enough capacity, will my data and applications be available, is it all secure? Applying ITIL disciplines serves two purposes.
As a framework for delivering IT services, it provides the concepts and processes that can ensure that every aspect of the offering is working independently sufficient and interdependently with other processes appropriately.
The result is a solution that in theory should consistently meet the requirements of the customer.
This point is theoretical because designs require the proper implementation for it to effectively deliver.
The other purpose for applying ITIL disciplines is essentially a customer service and marketing purpose: customers who are hoping to comply with ITIL standardization require the service providers of their IT technologies to be ITIL.
Three processes are of considerable note: Capacity Management, Availability Management and Service Level Management. 15.2.1 Capacity Management For ensuring that resources are properly optimized and provisioned according to the organizations requirements in a manner that provide a high level of performance and is cost effective, the process of Capacity Management is used.
The high level activities define how applications are sized, workloads are managed, capacity is planned, and resources are managed, as well as performance. 123 Web Applications – A Complete Guide 15.2.2 Availability Management Availability Management is concerned with delivery the highest level of systems availability at a justifiable cost.
In particular, the process attempts to ensure that an IT component performs at a specific level over a period of time as agreed to between customer and supplier.
To maintain availability, the IT department needs to monitor the following points: ? Reliability – how well does the component function under normal and described conditions? ? Maintainability – how well can the component remain in or be restored to its operational state? ? Serviceability – how well can a component be maintained by an external supplier under a third party contract? ? Resilience – how well can the component resist operational failure? ? Security – How well can the component maintain confidentiality, integrity, and availability? — ? ? ? expected.
Working with the processes of Availability Management, Capacity Management, Incident Management, and Problem Management to ensure that the quality and effectiveness of the services are being met with the resources agreed with the process of Financial Management.
Production and maintenance a Service Catalogue.
Ensuring that an appropriate IT Service Continuity Plan is in place. 15.3 Adapting Service Transition Service Transition from the ITIL perspective is a series of disciplines that consistent takes design into production.
The topics found within this area consist of Configuration Management, Release Management, Change Management, and Knowledge Management.
In each of these disciplines, the requirement for clear and current information is of utmost concern.
Mapping the distinct parts of the information to each other is similar opportunity for ensuring that cross-process relationships are cemented properly.
Some of the concepts introduced in this area might be difficult to superimpose onto the transition or development of applications.
The governing body over ITIL has seen this difficulty as well and introduced an additional set of best practices for improving the quality of IT software development and support called ITIL Application Management.
With this new discipline is another topic 125 Web Applications – A Complete Guide called Software Asset Management which provides a framework for integrating people, processes, and technology to ensure that software licenses and usage are appropriately tracked, evaluated and managed.
In terms of supporting a web application, the lines can be even more difficult.
Configurations within a web environment provides considerable amounts of virtualization.
The level that is this is done requires a high level of detailed awareness of the environment, an awareness that is completed supported by the ITIL discipline.
Knowledge related to the application and its support is also required and supported.
Where a problem persists is in the area of release management and change management.
The root of the problem is in the nature of applications on the web and the problem is not only a challenge to these disciplines but also a call for greater effort within them.
Many web applications are considered open source solutions: that is that they are presented to the community to use and manipulate as they see fit to provide the functionality and features that are most important to them .In some instances this means that the company owns and supports only the core code: the resources, plugins and API may be developed and owned by third parties.
All of these pieces breakdown to the basic fact: there is very few “releases” of applications and “changes” can be made to the functionality and behaviours of the application without actually “changing” the application.
Unfortunately the 126 Web Applications – A Complete Guide success or failure of these additional “changes” can have an impact on the success and failure on the core applications.
Additionally, some developers have decided to explore what customers really want by adding new functionality to an application every day.
If the new function is used, it remains; if it isn’t, the functionality is removed.
Therefore, clear documentation on the release and changes to the core application code and the “approved” developers of additional code should be meticulously tracked.
Some companies own web applications that are developed and released on cloud platforms that are provided by a third party.
In these cases, the service provider is responsible for the infrastructure and its support of the application.
The company is responsible for the support of the application itself.
For this reason, it behoves the company to adopt processes that support and manage changes to the application as well as its use.
In particular are three processes that require some notice: Release Management, Configuration Management and Change Management. 15.3.1 Release Management Release Management covers the distribution of software without limitation on platform or method of distribution.
The discipline concerns itself with ensuring that the software is properly developed and tested before being introduced to the production environment.
Release management also 127 Web Applications – A Complete Guide — Web Applications – A Complete Guide 15.5 Continual Service Improvement Service Improvement practices are implemented to ensure that IT services are aligned and realigned to the changing needs of the business.
When an IT organization is established, it must decide what services can and will be provided.
The infrastructure, applications, configurations, and processes required to deliver those services are designed and implemented into the environment.
Unfortunately, simply implementing the components for delivering the services is not enough; the organization has to utilize those resources effectively.
Additionally, the requirements the business has its IT support is constantly changing, requiring the services to be revaluated and changed accordingly.
Starting from scratch is not practical, so the goal is to continually apply improvements to the environment to meet and exceed service expectations.
However, continual improvement is not something that happens.
It must be supported by every person within the organization and manage appropriately through well defined goals, processes, procedures, and roles and responsibilities.
Continual improvements for web applications, particularly those that are open source driven, may not lack in the continual improvement aspect but may be lapse in the control of such improvements.
The result may be stringent controls on improvements to the core application code and guidelines to code which is attachable to the application to add features and functionality. 134 Web Applications – A Complete Guide 16 Using the Web to Promote ITIL The technology of the web is very conducive for implementing and monitoring the disciplines of ITIL.
Three types of applications can be built to support the processes: ? Monitoring ? Workflow ? Documentation Libraries ITIL is a standard which to manage the IT environment effectively and efficiently.
A possibility of being evaluated for ITIL compliance adds a certain assurance that the disciplines will be properly implemented.
As a standard, some guarantees are in place.
The first guarantee is that data is available to show how the different aspects of the IT solution are working to meet the service requirements place on them.
The second guarantee is that the processes and its components are clearly defined, including roles and responsibilities and cross process relationships.
The third guarantee is that the required databases are in place to support the IT service.
These guarantees all mention the existence of the components that make up the requirement framework for effective ITIL implementation, but their 135 Web Applications – A Complete Guide existence does not guarantee that the components are being used effectively.
Fortunately with these guarantees in place, the foundation for creating web application around ITIL are also in place.
The first type of application possible is monitoring the services required by the customer.
One of the web technologies for applications is the mashup.
With this technology, three possibilities can be fulfiller: the ability to monitor two or more distinct functions in parallel; the ability to combine the data for two or more distinct functions together to do trend analysis, for instance, combining measurements for availability and capacity to identify the relationship between the two; and the ability to combine the data of two of more distinct functions in a cause and effect relationship, for instance the number of changes that are the result of problems.
The advantage of the mashup for monitoring the IT infrastructure lies in the user interface.
In mashups, the user defines what they want to see in the interface and, ultimately, the interface can be different for each user.
This promotes supporting the diverse responsibilities in business.
For instance, a system administrator will want to see more detail in what they are monitoring than the overview statistics appropriate to an executive manager.
It the same comparison, the system administrator is wants to map data to ensure that the operation is intact, while the executive is looking to map the data to finances.
For each user, how the information is interpreted is just as important 136 Web Applications – A Complete Guide as having the information available and the ability to build their own interface only serves to have the data interpreted in the desire way.
Additionally if the mashup component that allows the data to be interpreted in the desire way does not exist, the development of such a component is made simpler using web technologies.
Even if the system from which the data is retrieved is a traditional non-web implementation, the technologies of the web hold the keys for tapping into these applications and retrieving the data necessary for monitoring.
And the web technologies do not stop there.
If they can be used to retrieve information, they can also be used to enter information into the system.
One of the problems faced in any IT organization is the diverse range of applications in place to ensure that operations are maintained.
These applications are diverse in the languages they use, their handling of data, and their functional purposes.
To have two or more of these applications communicating with each other used to require a bridge that was extensively developed and acting as a third application between the two primary systems.
Web development can create this bridge as a add-on to both applications and maybe even all the applications used within the environment.
In creating these “bridges,” the possibility of creating applications that contribute to workflow management are realized. 137 Web Applications – A Complete Guide Workflow management specifically focuses on moving work through several process and in doing so identifying bottlenecks for work and improvements to the support infrastructure or processes.
For IT support, workflow opportunities are everywhere.
For instance, when a incident happens, a “ticket” is created and routed to the first level of support.
If a resolution cannot be applied at this level, the ticket is routed to the next level of support.
This routing usually involves moving the ticket from one support team’s queue to the next.
Depending on the context of the incident and its severity, further notification may be required.
Furthermore, if the incident is caused by a known error, the resolution may be attached to the ticket for purposes of understanding how often a particular resolution is utilized.
If a the incident is not caused by a known error, then the resolution or workaround will be placed in the ticket when it is found, allowing the database holding all known errors and resolutions to be populated with the new information.
But the workflow doesn’t necessarily end at this point.
If a incident is unresolved, it is now taken over by the problem management process where the problem is diagnosed and a resolution sought out.
Once a resolution is found, the change management process is now initiated to implement the resolution accordingly.
And since all changes are essentially changes to one or more configuration items, the process configuration management process is not evoked to complete the change.
The work can continue depending on the impact of the problem and resolution, but this short 138 Web Applications – A Complete Guide description will suffice.
Essentially, a single ticket can move through the incident management, the problem management, the change management, and the configuration processes.
Unfortunately since the processes are different, the likelihood exists that the databases supporting the processes are different and may not communicate between each other.
Using web technologies, a ticket can be created and based on sufficient checkpoints be automatically routed through the processes, updating the appropriate databases along the way.
Every ticket has specific information that can act as triggers for how it should be handled.
Severity, which describes the potential impact on the business from critical to minor, will require that ticket be handled as a major event even a disaster if the severity is considered critical.
The normal processes for handling incidents are not bypassed, only that additional processes are invoked that run in parallel.
In a critical disruption of service, the technical support teams are still attempting to resolve the incident and potential problem and, at the same time, business management is attempting to minimize the impact of the disruption.
Tracking the activities of both groups may be necessary for ensuring that everything that is being done is communicated and the results can be analysed at a later time.
So not only is workflow necessary but some capability around collaboration.
Web applications have already shown some success in build components that allow successful collaboration. 139 Web Applications – A Complete Guide Finally, a number of databases exist within the IT support environment with the goal of supporting the processes.
Each of these databases serve a specific purpose and are typically assigned to a specific process.
For instance, the Configuration Management Database is assigned to the process called configuration management.
Change records are housed in a change management database that is assigned to change management.
Known errors are stored in their own database and assign to both the incident management and problem management processes.
These databases usually consist of information that is similar and as such have relationships that are not usually exploited by a service organization.
Web application development can create a solution that can assist in establishing their relationships, retrieving the information from several databases to compile into a single record and updating the databases when new information is created.
However simply connecting databases and displaying the results are not the only advantages available using the web for documentation purposes.
First of all, the web has always been a documentation centric technology, using hyperlinks as a way to holistically apply relationships inherent with information.
With the advent of Web 2.0 technologies, the area of document management are advanced with blogs and wikis.
A combination of the two provide a method to distribute technical support information through subscriptions and encourage obtaining technical information from every person supporting IT.
What if change management was essentially a blog with forms and 140 Web Applications – A Complete Guide the reviewers and approvers could cater their subscriptions to allow only different types of changes? What if the Known Error database was a wiki that fed the problem management database and vice versa; so that resolutions would be readily available depending on the problem description or the wiki could be updated and refined where no resolution was found.
The benefits attributed to any web application are present with applications designed to promote ITIL.
Tapping into the collective intelligence of the entire technical support group provides the foundation for collaboration during and in between incidents.
In traditional support architectures, the different levels of support are distinct and often uncommunicative.
This is typically due to the skill set difference and the organization of the department.
Tapping into the collective intelligence provides an opportunity to not only communicate information but seek out information when knowledge is not known or published.
The object is to create a richer set of support knowledge to understand the application and the customer better. 141 Web Applications – A Complete Guide 142 Web Applications – A Complete Guide 17 Hosting Applications on the Web Applications on the web insinuate that some hosting is required.
There are a couple of avenues available to developers who have web applications.
Of course, the very first avenue is to provide the hosting environment themselves but this can be a very costly endeavor simply in purchasing the server, storage and necessary components to successfully host on the web.
In addition, the developer has to be concerned with the costs and benefits of hosting the application within the development lab.
The Second avenue is to find a service provider that has the infrastructure in place to host the application.
Several new businesses are now available who provide such infrastructures as a service.
These services cost the developer only what they used, as the infrastructures are typically built to farm out resources to multiple companies with the same desire: to host their application.
Unfortunately, some of these service providers will only host the application in production.
Development must still be done separate from the hosting environment.
Still other service providers provide the opportunity to host the application during development and the customer has to find another hosting environment for production. 143 Web Applications – A Complete Guide — 153 Web Applications – A Complete Guide Perfetti, Christine.
Deconstructing Web Applications.
August 11, 2005; User Interface Engineering.
Http://www.uie.com/articles/deconstructing_web_application s/ Adamson, Chris.
What is Java ? March, 08, 2006.
Mashups: Understanding Mashup Building Platforms for Business Applications.
Www.protosw.com/static/pdf/proto-mashupwhitepaper.pdf JackBe Corporation.
Introduction to Enterprise Mashups.
Http://www.jackbe.com/downloads/An%20Introduction%20t o%20Enterprise%20Mashups.pdf wiseGeek.
What is a Web Application Framework? http://www.wisegeek.com/what-is-a-web-applicationframework.htm Smith, Michael.
What is ColdFusion? http://www.fusionauthority.com/cfintro.cfm Glover, Andrew.
Feeling Groovy: Introducing a new standard language for the Java platform.
Http://www128.ibm.com/developerworks/java/library/j-alj08034.html 154 Web Applications – A Complete Guide Collins, Chris.
Adapting ITIL to Distributed Web Applications.
December 6, 2007.
Http://ccollins.wordpress.com/2007/12/06/adapting-itil-todistributed-web-applications/ Wily Technology.
How to Adapt ITIL to Distributed Web Applications.
May 1, 2006.
Http://securitypark.bitpipe.com/detail/RES/1154707956_630 .html Wikipedia.
Web Application Framework.
Http://en.wikipedia.org/wiki/ARPANET Wikipedia.network Control Program.
Http://en.wikipedia.org/wiki/CERN 155 Web Applications – A Complete Guide Wikipedia.
World Wide Web.
Read more about 113 USING ITIL IN WEB APPLICATIONS :