Web信息系统毕业论文_中英文资料外文翻译文献

合集下载

MVC框架中英文对照外文翻译文献

MVC框架中英文对照外文翻译文献

MVC框架中英⽂对照外⽂翻译⽂献中英⽂对照外⽂翻译⽂献(⽂档含英⽂原⽂和中⽂翻译)译⽂:Web 2.0下的Spring MVC框架摘要 - 当要建⽴丰富⽤户体验的WEB应⽤时,有⼤量的WED应⽤框架可以使⽤,却很少有该选择哪⼀种的指导。

WEB 2.0应⽤允许个体管理他们⾃⼰的在线⽹页,并能与其他在线⽤户和服务器共享。

这样分享需要访问控制器来实现。

然⽽,现有的访问控制器解决⽅案不是令⼈很满意。

因为在开放且由⽤户主导的WEB环境下,它满⾜不了⽤户的功能需求。

MVC框架是在所有的WEB开发框架中最受欢迎的。

模型-视图-控制器(MVC)是⼀种软件架构,如今被认为是⼀种体系结构在软件⼯程模式中使⽤。

该模式从⽤户界⾯(输⼊和演⽰)分离出了“领域逻辑”(基于⽤户的应⽤逻辑),它允许独⽴地开发,测试和维护每个分离的部分。

模型-视图-控制器(MVC)模型创建的应⽤分离为不同的层次应⽤,同时在每两者之间建⽴松散的耦合。

关键字 - Spring MVC, 结构, XStudio, SOA, 控制器I.绪论如何确切地定义⼀个⽹站为“WEB 2.0”的呢?关于这有着许多不同见解,使它很难精确地下⼀个确切的定论。

但当我们将所有的WEB开发框架过⼀遍之后它就会变得清晰了。

各种基于WEB开发的架构如下:●Ntier架构(Ntier Architecture)在软件⼯程中,多层架构(常被称为n-tier架构)是⼀种表⽰层,应⽤处理层和数据管理层在逻辑上分开处理的客户端-服务器架构。

例如,⼀个应⽤在⽤户与数据库之间使⽤中间件提供数据请求服务就⽤到了多层体系结构。

最为⼴泛应⽤的多层体系结构是三层架构。

N-tier 应⽤架构为开发者提供了⽤来创建了⼀个灵活且可复⽤的模型。

通过打破应⽤层次,开发者只需修改或添加⼀个特定的层,⽽不是要去重写⼀遍整个应⽤。

它需要有⼀个表⽰层,⼀个业务层或者数据访问层和⼀个数据层。

层(layer)和层(tier)之间的概念常常是可以互换的。

毕设三项文档之-外文翻译

毕设三项文档之-外文翻译

本科生毕业设计 (论文)
外文翻译
原文标题
Worlds Collide:
Exploring the Use of Social Media Technologies for
Online Learning
译文标题
世界的碰撞:
探索社交媒体技术在在线学习的应用
作者所在系别计算机科学与工程系作者所在专业计算机科学与技术作者所在班级
作者姓名
作者学号
指导教师姓名
指导教师职称讲师
完成时间2013年2月
北华航天工业学院教务处制
注:1. 指导教师对译文进行评阅时应注意以下几个方面:①翻译的外文文献与毕业设计(论文)的主题是否高度相关,并作为外文参考文献列入毕业设计(论文)的参考文献;②翻译的外文文献字数是否达到规定数量(3 000字以上);③译文语言是否准确、通顺、具有参考价值。

2. 外文原文应以附件的方式置于译文之后。

MVC设计模式THE-MVC-WEB-DESIGN-PATTERN大学毕业论文外文文献翻译及原文

MVC设计模式THE-MVC-WEB-DESIGN-PATTERN大学毕业论文外文文献翻译及原文

毕业设计(论文)外文文献翻译文献、资料中文题目:MVC设计模式文献、资料英文题目:THE MVC-WEB DESIGN PATTERN文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14MVC设计模式Ralph F. Grove计算机科学,詹姆斯麦迪逊大学,哈里森堡,美国弗吉尼亚州***************Eray Ozkan计算机科学,詹姆斯麦迪逊大学,哈里森堡,美国弗吉尼亚州*****************关键字:web,web框架,设计模式,模型-视图-控制器模式摘要:模型-视图-控制器模式被引用为许多web开发框架的基础架构。

然而,用于web开发的MVC 版本随着原来的Smalltalk的MVC的演变而发生了一些改变。

本文介绍了对这些变化的分析,并提出了一种独立的Web-MVC模式,用于更准确的描述MVC是如何在web框架中实现的。

1.介绍模型-视图-控制器(Modle-View-Controller,MVC)设计模式被一些web应用框架作为基础架构,例如,Rails,以及Struts。

MVC最初是在施乐帕克研究中心(Goldberg和Robson,1985)开发的Smalltalk编程环境中实现的。

为了适应web框架,MVC已经演变成了另一种方式,最终成为一种不同于其他任何设计模式,也与原始的Smaltalk完全不同的模式的实现。

本文的第一个目标是介绍MVC设计模式,其中包括它的原始形态(第2节)以及现代众所周知的用于web应用框架的变更后的形态(第3节)。

第二个目标是对这个模式演变后发生的变化进行评估,同时呈现演变后版本的有效性(第3节)。

最后,我们提出了一个标准的MVC-Web设计模式的描述,用于反映目前在web框架中模式的使用,同时又能保持原始的MVC中令人满意的特性。

基于MVC的web应用框架的修订版本已经被提出了(Chun, Yanhua, 和Hanhong, 2003) (Barrett和Delaney, 2004)。

英文论文(外文文献)翻译成中文的格式与方法

英文论文(外文文献)翻译成中文的格式与方法

英文论文(外文文献)翻译成中文的格式与方法英文论文(外文文献)翻译成中文的格式与方法本文关键词:外文,英文,中文,翻译成,文献英文论文(外文文献)翻译成中文的格式与方法本文简介:在撰写毕业设计(论文)或科研论文时,需要参考一些相关外文文献,了解国外的最新研究进展,这就需要我们找到最新最具代表性的外文文献,进行翻译整理,以备论文写作时参考,外文文献中英文文献占绝大多数,因此英文论文准确的翻译成中文就显得尤为重要!一、外文文献从哪里下载1、从知网国际文献总库中找英文论文(外文文献)翻译成中文的格式与方法本文内容:在撰写毕业设计(论文)或科研论文时,需要参考一些相关外文文献,了解国外的最新研究进展,这就需要我们找到最新最具代表性的外文文献,进行翻译整理,以备论文写作时参考,外文文献中英文文献占绝大多数,因此英文论文准确的翻译成中文就显得尤为重要!一、外文文献从哪里下载1、从知网国际文献总库中找,该数据库中包含14,000多家国外出版社的文献,囊括所有专业的英文文献资料。

2、一些免费的外文数据库或网站,为了方便大家查找,编者整理成文档供大家下载:国外免费文献数据库大全下载3、谷歌学术检索工具,检索时设置成只检索英文文献,键入与专业相关的关键词即可检索。

二、英文论文翻译格式与要求翻译的外文文献的字符要求不少于1.5万(或翻译成中文后至少在3000字以上)。

字数达到的文献一篇即可。

翻译的外文文献应主要选自学术期刊、学术会议的文章、有关着作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。

并在每篇中文译文首页用"脚注"形式注明原文作者及出处,中文译文后应附外文原文。

需认真研读和查阅术语完成翻译,不得采用翻译软件翻译。

中文译文的编排结构与原文同,撰写格式参照毕业论文的格式要求。

参考文献不必翻译,直接使用原文的(字体,字号,标点符号等与毕业论文中的参考文献要求同),参考文献的序号应标注在译文中相应的地方。

计算机网络中英文对照外文翻译文献

计算机网络中英文对照外文翻译文献

中英文资料外文翻译计算机网络计算机网络,通常简单的被称作是一种网络,是一家集电脑和设备为一体的沟通渠道,便于用户之间的沟通交流和资源共享。

网络可以根据其多种特点来分类。

计算机网络允许资源和信息在互联设备中共享。

一.历史早期的计算机网络通信始于20世纪50年代末,包括军事雷达系统、半自动地面防空系统及其相关的商业航空订票系统、半自动商业研究环境。

1957年俄罗斯向太空发射人造卫星。

十八个月后,美国开始设立高级研究计划局(ARPA)并第一次发射人造卫星。

然后用阿帕网上的另外一台计算机分享了这个信息。

这一切的负责者是美国博士莱德里尔克。

阿帕网于来于自印度,1969年印度将其名字改为因特网。

上世纪60年代,高级研究计划局(ARPA)开始为美国国防部资助并设计高级研究计划局网(阿帕网)。

因特网的发展始于1969年,20世纪60年代起开始在此基础上设计开发,由此,阿帕网演变成现代互联网。

二.目的计算机网络可以被用于各种用途:为通信提供便利:使用网络,人们很容易通过电子邮件、即时信息、聊天室、电话、视频电话和视频会议来进行沟通和交流。

共享硬件:在网络环境下,每台计算机可以获取和使用网络硬件资源,例如打印一份文件可以通过网络打印机。

共享文件:数据和信息: 在网络环境中,授权用户可以访问存储在其他计算机上的网络数据和信息。

提供进入数据和信息共享存储设备的能力是许多网络的一个重要特征。

共享软件:用户可以连接到远程计算机的网络应用程序。

信息保存。

安全保证。

三.网络分类下面的列表显示用于网络分类:3.1连接方式计算机网络可以据硬件和软件技术分为用来连接个人设备的网络,如:光纤、局域网、无线局域网、家用网络设备、电缆通讯和G.hn(有线家庭网络标准)等等。

以太网的定义,它是由IEEE 802标准,并利用各种媒介,使设备之间进行通信的网络。

经常部署的设备包括网络集线器、交换机、网桥、路由器。

无线局域网技术是使用无线设备进行连接的。

网页设计与制作外文翻译文献

网页设计与制作外文翻译文献

网页设计与制作外文翻译文献(文档含中英文对照即英文原文和中文翻译)翻译:网页设计与制作摘要论文将对个人网页设计与制作的方法、工具等展开研究和探讨。

在介绍网页设计与制作语言的基础上,着重使用JavaScript作为工具语言进行网页设计与制作的实际操作,分别对基于对象的JavaScript语言、内部对象系统的使用及WEB页面信息交互——窗口和框架进行详细描述,并利用具体的实例进行验证。

1.前言随着21世纪的到来,人们更深切地感受到计算机在生活和工作中的作用越来越重要,越来越来的职业需要具有计算机的应用技能。

掌握计算机是职业的需要,更是事业发展的需要。

网页设计与制作是计算机能力的具体表现,本章主要介绍网页设计的相关知识。

1.1 网页设计概述网站是企业向用户和网民提供信息(包括产品和服务)的一种方式,是企业开展电子商务的基础设施和信息平台,离开网站(或者只是利用第三方网站)去谈电子商务是不可能的。

企业的网址被称为“网络商标”,也是企业无形资产的组成部分,而网站是INTERNET 上宣传和反映企业形象和文化的重要窗口。

1.2 网页设计的要素网页设计的两大要素是:整体风格和色彩搭配。

一、确定网站的整体风格第二章HTML网页设计技术的应用2.1 HTML语言介绍HTML(HyperText Mark-up Language)即超文本标记语言或超文本链接标示语言,是目前网络上应用最为广泛的语言,也是构成网页文档的主要语言。

HTML文本是由HTML命令组成的描述性文本,HTML命令可以说明文字、图形、动画、声音、表格、链接等。

HTML的结构包括头部(Head)、主体(Body)两大部分,其中头部描述浏览器所需的信息,而主体则包含所要说明的具体内容。

2.1.1 HTML语言的特点HTML文档制作不是很复杂,且功能强大,支持不同数据格式的文件镶入,这也是WWW盛行的原因之一,HTML语言的特点如下:1、简易性,HTML版本升级采用超集方式,从而更加灵活方便。

毕业设计(论文)外文资料翻译(学生用)

毕业设计(论文)外文资料翻译(学生用)

毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。

程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。

一般地,我们需要理解连网协议中不同的“层”(Layer)。

而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。

这是一项令人痛苦的工作。

但是,连网本身的概念并不是很难。

我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。

这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。

Java最出色的一个地方就是它的“无痛苦连网”概念。

有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。

我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。

除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。

本章将用一系列易懂的例子解释Java的连网支持。

15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。

早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。

但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。

为达到这个目的,我们采用了IP(互联网地址)的概念。

IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。

我自己的域名是。

所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。

信息管理与信息系统论文中英文资料外文翻译文献

信息管理与信息系统论文中英文资料外文翻译文献

信息管理与信息系统论文中英文资料外文翻译文献Construction of Network Management Information System of Agricultural Products Supply Chain Based on 3PLsAbstractThe necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed, showing that 3PLs can improve the overall competitive advantage of agricultural supply chain. 3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain. Network management information system structure of agricultural products supply chain based on 3PLs is constructed, including the four layers (the network communication layer, the hardware and software environment layer, the database layer, and the application layer) and 7 function modules (centralized control,transportation process management, material and vehicle scheduling, customer relationship, storage management, customer inquiry, and financial management).Framework for the network management information system of agricultural products supply chain based on 3PLs is put forward. The management of 3PLs mainly includes purchasing management, supplier relationship management, planning management, customer relationship management, storage management and distribution management. Thus, a management system of internal and external integrated agricultural enterprises is obtained. The network management information system of agricultural products supply chain based on 3PLs has realized the effective sharing of enterprise information of agricultural products supply chain at different nodes, establishing a long-term partnership revolving around the 3PLs core enterprise, as well as a supply chain with stable relationship based on the supply chain network system, so as to improve the circulation efficiency of agricultural products, and to explore the sales market for agricultural products.Key words3PLs (third party logistics),Agricultural products supply chain, Network management information system, China3PLs means that production enterprises entrust the logistics activity to the professional logistics service firms in order to concentrate efforts on core business, to keep close contact with logistics enterprise through information system, and to achieve a logistics operation and management mode with full control in logistics. According to the 3PLs requirements forinformation technology, supply chain management information system based on 3PLs is a supply chain management mode with 3PLs enterprises as the core, using EDI technology, GIS/GPS system, B/S mode and other technologies. Integration, processing and application of 3PLs enterprises in supply chain management information system are fully applied in order to reduce the cost of logistics and to improve the service level of logistics.At present, management information technology in China is just at the initial stage. The existing management information system offers insufficient information for the 3PLs enterprises which are engaged in the circulation of agricultural products.Besides, its construction of logistics data processing system is imperfect, having not realized the truly professional 3PLs enterprises for the circulation of agricultural products with information technology. At the same time, 3PLs enterprise for agricultural products has just started in China. And logistics applied in the agricultural supply chain with 3PLs enterprise as the core is time-consuming, inefficient and low-level, which can hardly meet the needs of the rapid development of rural market and social productive forces. Therefore, it is particularly important and urgent to construct a management information system for agricultural products supply chain under the current Internet environment. Problems in the management of the supply chain of agricultural products are analyzed, and a network management information system of agricultural products supply chain based on 3PLs is constructed in order to offer references for the information management in the supply chain of agricultural products in China.1 Necessity of constructing the network management information system of agricultural products supply chain based on 3PLsAgricultural products are seasonal, perishable and vulnerable. With the improvement of income level,consumers have increasingly high requirements for the diversification, personalization, just-in-time nature, and environment protection of agricultural products, which requires faster, more professional,and better organized logistics. At the same time, supply chain of agricultural products has the characteristics of the special purpose of funds, the uncertainty of market, and the unbalanced development of market. Thus, the support of supply chain management information system is needed during the circulation of agricultural products. Construction of market integration,as well as the integration of production, supply and marketing,urgently needs a new management information system of agricultural products, as well as an accompanying legal support system, in order to reduce the cost and to increase the profit for agricultural enterprises. And the application of 3PLs in the supply chain of agricultural products can solve this problem.Therefore, we should give full play to the central hub function of 3PLs enterprises in agricultural products supply chain, increase the input in the informationization of agricultural products supply chain, and promote the construction of logistics operation system and management information system.1 .1 Improving the overall competitive advantage of agricultural products supply chain by 3PLs3PLs is a new logistics organizational form established by modern information technology, as well as a kind of complementary and win-win strategic alliance by signing contract with the party being served. Taking 3PLs as the professional and core enterprise in the production and circulation of agricultural products can help to realize resource consolidation of the construction and organization of the whole supply chain of agricultural products. The specialization of raw materials and the service for product distribution have greatly improved the logistics efficiency of traditional enterprise. At the same time, construction of the management information system ofagricultural products supply chain based on 3PLs has made up for the shortage of information in agricultural market, has improved the efficiency of the flow of agricultural products, has connected all the links in the supply chain into an organic whole in an reasonable and effective way,and has enhanced the overall competitive advantage and economic benefits. 3PLs platform has greatly brought down the production and circulation processes of traditional agricultural enterprises, and has reduced the costs in raw material procurement and product distribution, so as to better adapt to the changes in market demand, to realize the rational distribution of resources, and to improve the overall competitiveness of the supply chain of agricultural products.1 .2 Changing the homogeneity management to specialized operation of logistics service by 3PLsDue to the characteristics of agricultural products, market requirement for logistics varies widely. Since traditional enterprises try to obtain the competitive advantage, there is fierce market competition in commodity circulation. Therefore, behavior of logistics market shows the characteristics of homogeneity and the profit is getting lower and lower. In order to seize the customer, some enterprises even take a loss. 3PLs enterprises share business risk with partners and carry out operation according to the items number, time and cost of customer by integration and utilization of resources. As a means of the supply chain integration of agricultural products, specialized operation of 3PLs can help the stakeholders of supply chain to obtain more demand information of agricultural products, and can reduce the circulation cost of agricultural products.1 .3 Alliance of the subjects in supply chain nodes of agricultural products by 3PLs3PLs stresses the relationship of “mutual complementarity, benefit sharing, information sharing” among the stakeholders in different nodes of supply chain. Development of the agricultural producer, supplier and retailer is limited if they rely only on their own resources. 3PLs enters into the outside service market, integrates the resources through the way of strategic alliances, ensures that the subject focuses its attention on core business, reduces the cost by scale effect, enhances the anti-risk strength, and helps to achieve quick response to market demand by information sharing.At the same time, contract-0riented 3PLs enterprises unify the interests of all subjects in supply chain of agricultural products, emphasize the strategic partnership of both parties,and alleviate market competition of related industries in agricultural markets. Subjects in both downstream and upstream of the supply chain share information and establish long-term partnership with 3PLs enterprises as the core.2 Construction of the network management information system of agricultural supply chain based on 3PLs2.1 Construction of structural system3PLs platform is used to offer network communications and system services to the subjects in agricultural supply chain. Fig. 1 illustrates the structural system of network management information system of agricultural supply chain based on 3PLs.Fig.1 Structural system of network management information system of agricultural supplychain based on 3PLsFig. 1 illustrates that the basic hardware of the system is combined by the network transmission media and network equipment, that is the network communication layer. Hardware facilities, corresponding system software, operation system and netmanager software together constitute the software and hardware environment layer.This layer provides necessary software and hardware facilities for 3PLs enterprises during the data storage and management of agricultural products. Database layer is responsible for the management of data source in agricultural information resources and network systems, and offers data integration to the application layer. 3PLs standard system includes the overall standard, network infrastructure standard, application support standard, application standard, information security standard, and management standard. Safety system of 3PLs includes the security management, security infrastructure, and security service.This system is composed of 7 function modules, such as the centralized control module, transportation process management module, material and vehicle scheduling module, customer relationship module, storage management module, customer query module, and financial management module(Fig. 2),the function of which is to ensure the information fluency and system security of 3PLs enterprises during the operation and integration of resources. These modules have improved the service module of different nodes in agricultural supply chain and have reduced the operation risk of system, so that the system becomes more structured, perfect, and rational.2.2 Framework of management systemBased on the existing research result,the business and module of modern logistics management,and the management information systems,Fig.3 reports the management system of internal and external integrated agricultural enterprises according to the circulation of agricultural products from the manufacturer,supplier,and retail terminal to the consumer.Fig.2 Function modules of 3PLs network management information systemFig.3 The management system of internal and external integrated agricultural enterprises Fig.3 shows the framework of network management information system of agricultural supply chain based on 3PLs. The whole system, running under an open 3PLs, is formed by four layers of network communication layer, software and hardware environment layer, database layer and application layer. In the application layer, 3PLs, as the core of management information system of agricultural supply chain, plays the role of information processing center. It mainly manages the plan, inventory, and other subsystems, supervises subsystem through supplier relationship, conducts information interaction with procurement management subsystem and the supplier, and carries out information interaction with the supplier, producer and consumer through customer relationship management subsystem and sales management subsystem. Besides, 3PLs is also responsible for logistics management and control through the distribution management subsystem. Management of 3PLs mainly includes the 7 modules of purchasing management, supplier relationship management, planning management, customer relationship management, sales management, inventory management and distribution management. Through the effectiveintegration and coordination between 3PLs and the business with partner at the downstream and upstream of agricultural supplier chain, management system of internal and external integrated agricultural enterprises is formed using the logistics information system to realize the integration of logistics and information flow.In general,3PLs enterprise is still in the initial stage in China. Management information system of agricultural supply chain is not perfect, which can not meet the current needs of the rapid development and agricultural products circulation in rural China. Thus, there is an urgent need to build a new mode of agricultural logistics, so as to reduce the process of sales turnover, to lower the production cost of 3PLs enterprises, to improve the circulation efficiency of agricultural products, and to expand the sales market of agricultural products.3 ConclusionDeveloping modern 3PLs is an inevitable trend of market development. Design and development of management information system based on 3PLs can bring spillover benefits to the producer, supplier and retailer of agricultural products.Under the current Internet environment, management information system of agricultural supply chain based on 3PLs must be established based on the specific characteristics of operation mode and the actual business situation of 3PLs enterprises, so as to establish a management information system suitable for a given enterprise. From the perspective of overall integration of resources, the network management information system of agricultural supply chain based on 3PLs established has connected the interests of different nodes in agricultural supply chain into an organic whole, has effectively eliminated the barriers to information flow, and has increased the profits of agriculture-related enterprises and farmers. At the same time, according to the characteristics of agricultural enterprises in China, a rational agricultural products logistics mode of internal and external integrated agricultural enterprise is established, which offers a reference for the management of agricultural supply chain in China.基于第三方物流的农产品供应链网络管理信息系统的建设摘要本文对构建网络农业第三方物流供应链管理信息系统的必要性进行了分析,表明第三方物流可以提高农产品供应链的整体竞争优势。

计算机专业毕业设计论文外文文献中英文翻译——java对象

计算机专业毕业设计论文外文文献中英文翻译——java对象

1 . Introduction To Objects1.1The progress of abstractionAll programming languages provide abstractions. It can be argued that the complexity of the problems you’re able to solve is directly related to the kind and quality of abstraction。

By “kind” I mean,“What is it that you are abstracting?” Assembly language is a small abstraction of the underlying machine. Many so—called “imperative” languages that followed (such as FORTRAN,BASIC, and C) were abstractions of assembly language。

These languages are big improvements over assembly language,but their primary abstraction still requires you to think in terms of the structure of the computer rather than the structure of the problem you are trying to solve。

The programmer must establish the association between the machine model (in the “solution space,” which is the place where you’re modeling that problem, such as a computer) and the model of the problem that is actually being solved (in the “problem space,” which is the place where the problem exists). The effort required to perform this mapping, and the fact that it is extrinsic to the programming language,produces programs that are difficult to write and expensive to maintain,and as a side effect created the entire “programming methods” industry.The alter native to modeling the machine is to model the problem you’re trying to solve。

Internet中英文资料对照外文翻译文献综述

Internet中英文资料对照外文翻译文献综述

中英文资料对照外文翻译文献综述Internet的历史起源——ARPAnetInternet是被美国政府作为一项工程进行开发的。

这项工程的目的,是为了建立远距离之间点与点的通信,以便处理国家军事范围内的紧急事件,例如核战争。

这项工程被命名为ARPAnet,它就是Internet的前身。

建立此工程的主要应用对象就是军事通讯,那些负责ARPAnet的工程师们当时也没有想到它将成为“Internet”。

根据定义,一个“Internet”应该由四或者更多的计算机连接起来的网络。

ARPAnet是通过一种叫TCP/IP的协议实现连网工作的。

此协议最基础的工作原理是:如果信息在网络中的一条路径发送失败,那么它将找到其他路径进行发送,就好象建立一种语言以便一台计算机与其他计算机“交谈”一样,但不注意它是PC,或是Macintosh。

到了20世纪80年代,ARPAnet已经开始变成目前更为有名的Internet了,它拥有200台在线主机。

国防部很满意ARPAnets的成果,于是决定全力将它培养为能够联系很多军事主机,资源共享的服务网络。

到了1984年,它就已经超过1000台主机在线了。

在1986年ARPAnet关闭了,但仅仅是建立它的机构关闭了,而网络继续存在与超过1000台的主机之间。

由于使用NSF连接失败,ARPAnet才被关闭。

NSF是将5个国家范围内的超级计算机连入ARPAnet。

随着NSF的建立,新的高速的传输介质被成功的使用,在1988年,用户能通过56k的电话线上网。

在那个时候有28,174台主机连入Internet。

到了1989年有80,000台主机连入Internet。

到1989年末,就有290,000台主机连入了。

另外还有其他网络被建立,并支持用户以惊人的数量接入。

于1992年正式建立。

现状——Internet如今,Internet已经成为人类历史上最先进技术的一种。

每个人都想“上网”去体验一下Internet中的信息财富。

计算机网络技术中英文对照外文翻译文献

计算机网络技术中英文对照外文翻译文献

中英文资料外文翻译网站建设技术1.介绍网络技术的发展,为今天全球性的信息交流与资在建立源共享和交往提供了更多的途径和可能。

足不出户便可以知晓天下大事,按几下键盘或点几下鼠标可以与远在千里之外的朋友交流,网上通信、网上浏览、网上交互、网上电子商务已成为现代人们生活的一部分。

Internet 时代, 造就了人们新的工作和生活方式,其互联性、开放性和共享信息的模式,打破了传统信息传播方式的重重壁垒,为人们带来了新的机遇。

随着计算机和信息时代的到来,人类社会前进的脚步在逐渐加快。

近几年网页设计发展,快得人目不暇接。

随着网页设计技术的发展,丰富多彩的网页成为网上一道亮丽的风景线。

要想设计美观实用的网页就应该深入掌握网站建设技术。

在建立网站时,我们分析了网站建立的目的、内容、功能、结构,应用了更多的网页设计技术。

2、网站的定义2.1 如何定义网站确定网站的任务和目标,是建设网站所面临的最重要的问题。

为什么人们会来到你的网站? 你有独特的服务吗? 人们第一次到你的网站是为了什么? 他们还会再来吗? 这些问题都是定义网站时必须考虑的问题。

要定义网站,首先,必须对整个网站有一个清晰认识,弄清到底要设计什么、主要的目的与任务、如何对任务进行组织与规划。

其次,保持网站的高品质。

在众多网站的激烈竞争中,高品质的产品是长期竞争的最大优势。

一个优秀的网站应具备:(1)用户访问网站的速度要快;(2)注意反馈与更新。

及时更新网站内容、及时反馈用户的要求;(3)首页设计要合理。

首页给访问者留下的第一印象很重要,设计务必精美,以求产生良好的视觉效果。

2.2 网站的内容和功能在网站的内容方面,就是要做到新、快、全三面。

网站内容的类型包括静态的、动态的、功能的和事物处理的。

确定网站的内容是根据网站的性质决定的,在设计政府网站、商业网站、科普性网站、公司介绍网站、教学交流网站等的内容和风格时各有不同。

我们建立的网站同这些类型的网站性质均不相同。

【计算机专业文献翻译】信息系统的管理

【计算机专业文献翻译】信息系统的管理
基本上每一台计算机都能连接到网络中,一台计算机要么是客户端,要么就是服务器。服务器更具强大和区别性,因为它存储了网络中其他机器需要使用的数据。个人计算机的客户端在需要数据的时候随时都可以访问服务器。网络中既是服务器又是客户端的计算机称作点对点网络。
传播媒体必须经过仔细选择,平衡每个媒体的优点和缺点,这个选择决定网络的速度。改变一个已经安装好的网络媒体通常非常昂贵。最实用的传播媒体是电缆,光纤,广播,光,红外线。
本科生毕业设计(论文)外文资料译文
(2009届)
论文题目
基于Javamail的邮件收发系统
学生姓名
学号
专业
计算机科学与技术
班级
指导教师
职称
讲师、副教授
填表日期
2008年 12月 10 日
信息科学与工程学院教务科制
外文资料翻译(译文不少于2000汉字)
1.所译外文资料:信息系统的管理Managing Information Systems
数据共享是网络的重要应用之一。网络可以共享交易数据,搜索和查询数据,信息,公告板,日历,团队和个人信息数据,备份等。在交易的时候,连接一个公司的电脑的中央数据库包括现有库存信息和出售的数据信息。如果数据被储存在一个中央数据库中,搜查结果便可从中获取。电子邮件的发送已经成为同事之间最常用的信息共享的方式之一。
自从信号在空中传输后,广播,光以及红外线作为传播媒体已经不需要电缆。
传输能力,即一个传播媒体一次性传输的数据量,在不同的媒体中,材料不同,安装时付出的劳动不同,传输的能力有很大的区别。传播媒体有时候被合并,代替远地域之间的高速传播媒体,速度虽慢,但是成本低,在一幢大楼中进行信息传播。
连接设备包括网络连接卡NICS,或者在计算机和网络间进行传输和信号传递的局域网LAN卡。其他常用的设备连接不同的网络,特别是当一个网络使用不用的传输媒体的时候。使用一个对很多用户都开放的系统很重要,比如windows/NT,Office2000,Novell,UNIX.

信息技术发展趋势研究论文中英文外文翻译文献

信息技术发展趋势研究论文中英文外文翻译文献

信息技术发展趋势研究论文中英文外文翻译文献本文旨在通过翻译介绍几篇关于信息技术发展趋势的外文文献,以帮助读者更全面、深入地了解该领域的研究进展。

以下是几篇相关文献的简要介绍:1. 文献标题: "Emerging Trends in Information Technology"- 作者: John Smith- 发表年份: 2019本文调查了信息技术领域的新兴趋势,包括人工智能、大数据、云计算和物联网等。

通过对相关案例的分析,研究人员得出了一些关于这些趋势的结论,并探讨了它们对企业和社会的潜在影响。

2. 文献标题: "Cybersecurity Challenges in the Digital Age"- 作者: Anna Johnson- 发表年份: 2020这篇文献探讨了数字时代中信息技术领域所面临的网络安全挑战。

通过分析日益复杂的网络威胁和攻击方式,研究人员提出了一些应对策略,并讨论了如何提高组织和个人的网络安全防护能力。

3. 文献标题: "The Impact of Artificial Intelligence on Job Market"- 作者: Sarah Thompson- 发表年份: 2018这篇文献研究了人工智能对就业市场的影响。

作者通过分析行业数据和相关研究,讨论了自动化和智能化技术对各个行业和职位的潜在影响,并提出了一些建议以适应未来就业市场的变化。

以上是对几篇外文文献的简要介绍,它们涵盖了信息技术发展趋势的不同方面。

读者可以根据需求进一步查阅这些文献,以获得更深入的了解和研究。

企业门户网站中英文对照外文翻译文献

企业门户网站中英文对照外文翻译文献

中英文对照外文翻译文献(文档含英文原文和中文翻译)Corporate portal: a tool for knowledge managementsynchronizationAbstractAs the basis of value creation and success of organizations increasingly depends on the leverage of knowledge available internally, knowledge management systems(KMS)are emerging as vital tools for competitive advantage. Among these KMS, corporate portals present the potential of providing organizations with a rich and complex shared information workspace for the generation, exchange, and use of knowledge. But developing corporate portals and building the critical mass of users required to make them successful is not an easy task. In this paper, drawing upon theliterature review and an analysis of early adopters of corporate portals, we address the strength of this tool which consists mainly in synchronizing and supporting knowledge processes, put the emphasis on factors inhibiting its adoption by companies and finally propose some perspectives for a successful implementation.1.IntroductionThe widespread adoption of networks and information technology has vas tly increased our ability to store, transfer and generate knowledge, enabling a nd accelerating the emergence of an economic, organizational and technologic al landscape, that is knowledge-based(Schwartz, Eamonn,&Boyer,1999;Romano, Elia,&Passiante,2001).This perspective builds upon and extends the resource-ba sed view(RBV)of the firm initially promoted by Penrose(1959)and expanded b y others(Barney,1986;Chandler,1992;Prahalad&Hamel,1990;Teece,Pisano,&Shuen, 1997).The premise of the RBV is that organizations employ a mix of acquisit ion and configuration of resources to change how their business is accomplish ed. Knowledge is often the basis for the effective utilization of many importa nt resources. In this context, Information and Communication technologies ma y play an important role in effectuating the knowledge-based view of the fir m by enhancing the firm’s capability to manage the knowledge it possesses. This awareness is one of the main reasons for the exponential growth of kno wledge management systems(KMS).KMS are technologies that support knowle dge management in organizations, specifically, knowledge generation, codificati on, and transfer(Ruggles,1997).In fact, a 2000 survey conducted by KPMG sh ows that the use of KMS is common in organizations worldwide and has nu merous benefits(KPMG,2000).However, despite the potential benefits from KM S, the report also finds that companies were experiencing difficulties in effect ively using these technologies. To address this issue, this paper focuses on a particular type of KMS, which is corporate portal, that presents the potential of providing organizations with a rich and complex shared information works pace for the generation, exchange, and use of knowledge. Building upon a lar ge literature review, insights from eight case studies of early adopters and ourown experience in dealing with some aspects of the implementation phase of STMicroelectronics portal, we address the strengths of this tool which consist mainly in supporting knowledge development phases and focus on challenges and problems that organizations may face during its implementation.The paper is organized as follows: Section 1 presents a review on knowledge, knowledge management processes and systems. The following section focuses on a particular tool of KMS, that is the corporate portal; we present a comprehensive view of definitions and characteristics of this tool based on a comparative analysis of eight case studies in order to identify the potential role of corporate portal features in the various stages of the knowledge management processes. We then focus on the major barriers limiting its adoption and use by organizations. In the final section, building on the factors identified, we provide some perspectives for a successful implementation.2.Knowledge management processes and systemsBefore focusing on portals as KMS, its necessary to define knowledge and knowledge management processes.2.1.Knowledge definitionsMultiple definitions of knowledge have been proposed in the literature, and debates about this concept have been expressed from a variety of perspectives and positions. In fact, ever since the ancient Greek period ,the quest of philosophy has been to find what knowledge is. Early thinkers such as Plato and Aristotle were followed by Hobbes and Locke to name just a few of the more prominent western philosophers. It seems we have no choice but to return to the question that has kept philosophers occupied for thousands of years. However, we should not approach it from a philosophical perspective. As observed by Alavi and Leidner(2001),the knowledge-based theory of the firm was never built on a universal truth of what knowledge really is but on a pragmatic interest in being able to manage organisational knowledge. In recent years, we have witnessed a booming interest in knowledge also from other disciplines. Mainly two perspectives are dominant, an Information Technology view and a Strategic management view. While the IT viewmakes the distinction between data, information and knowledge, and considers the ambiguity existing between these three concepts, the strategic management perspective views knowledge as a state of mind, a capability or a process. In fact, data is mainly considered as raw numbers that once processed becomes information, and when put in specific context this information becomes knowledge(Vance,1997).Whereas, the perspective of knowledge as a state of mind posits that individuals expand their personal knowledge through the inputs received from their environment. Further, the view of knowledge as a capability to act suggests that it is not the specific actions of knowledge ‘‘per se’’, but the ability to interpret and use information and experience that influences decisions(Watson,1999). Finally knowledge as a process, focuses on applying expertise, i.e. simultaneously knowing and acting(Zack,1999).In this article, we emphasize the view of knowledge as a ‘‘capability to act effectively ’’.Knowledge is seen as a justified personal belief that increases an individual’s capacity to take effective action. Knowledge management in this view is best understood by considering knowledge management as the systemic and organizationally specified process of acquiring, organizing and communicating knowledge of employees so that other employees may make use of it to be more effective and productive in their work(Alavi&Leidner,1999).2.2.Knowledge processesWe can describe knowledge management life cycle as an iterative sequence of activities (Nissen, 2000).Building upon this notion, we outlined from knowledge management frameworks, key elements of several life cycle models.Several key points emerge from our review of the analyzed knowledge management frameworks:(1)There is no single or commonly accepted definition of what constitutes a knowledge management framework.(2)There are many concepts that are similar in the frameworks analyzed, but their ordering or structure varies.For example, while the majority of the frameworks refer to the first phase as knowledge creation, Davenport and Prusak use the term generate knowledge,whereas Van der Spek and Spijkervet title this analogous phase knowledge development. In general, the different frameworks proposed share considerable similarities. Most of the life cycles are articulated in four phases where the first one is a ‘‘create’’ phase. The second phase corresponds to the organization of knowledge. Phase three uses different term across the models, but they all address some mechanism for making knowledge formal. Finally, the fourth phase concerns the ability to share and use knowledge in the enterprise. Therefore, in this article, the knowledge development cycle is defined as the process of knowledge generation, knowledge storage, knowledge distribution and knowledge application. A detailed definition of these processes will be presented when linking them with the different tools of the corporate portal that support them.3.Portals support for knowledge management processes3.1.Portal definitionsPortals enable e-business by providing a unified application access, information management and knowledge management both within enterprises, and between enterprises and their trading partners, channel partner and customers(Gartner Group,1998).From this definition, we can distinguish two types of corporate portals: extranet portals which provide depth content rather than breadth of content, offer special advantages for business-to-business, e-commerce because they can provide something closer to a solution; and enterprise intranet portals that support knowledge management and internal communications and they are emerging as home bases for employees. In this article, we will focus on the second type of portals. A portal can be viewed as away to access disseminated information within a company since information chunks can be stored in various systems using different formats. One of the major differences between a traditional web site and a portal resides in the fact that the portal is usually tailored according to the user s’ need. A portal is consequently, a single point of access to Internet resources, an integration platform focusing on unification oriented towards the business processes of the company. Therefore, portals synchronize knowledge and applications, creating a single view into the organization’s intellectual capital. Portals have seen anevolutionary approach, the first ones were search engines, that evolved by integrating a variety of services such as virtual communities, real time chat, i.e. the best example in this category is Yahoo; Today the term is used widely to describe many different types of products with different purposes. The terms Employees Portals, Enterprise Intranet Portals, Corporate Portals, Business-to- Employees Portals and Business-to-Employees Systems are sometimes used interchangeably as synonyms to refer to the category of portals, which aim at providing employees with in-time relevant information they need to perform their duties and make efficient business decisions.4.Perspectives for a successful implementationBased upon the earlier analysis, we can offer some perspectives in order to define, implement and execute effective corporate portals.mitment and support of the CEOMany authors suggest that leadership commitment is a key challenge for the success of any knowledge management initiative(Nonaka&Takeuchi,1995).If management spends a significant amount of resources on either purchasing or developing and implementing such technology, employees could interpret this as a sign of management’s support for this ideal, and act accordingly. However, as Martinsons(1991)acknowledges, if employees perceive that management is not very committed to implementing this new technology, then the initiative to promote a strong knowledge sharing culture is not likely to be successful.4.2.Motivation and commitment for adoption of these technologiesUnderstanding what motivates people to apply their expertise is key to avoiding the trap of building technology marvels that no one uses. Frequently, a critical mass of employees end up not using the applications because they are not convinced the applications will benefit them. Managers should not assume that they know what employees want. They must research the needs and latent dissatisfactions of their employees, much as they do those of their customers and then create a compelling offering that encourages employees to use the new online tools.4.3.Linking knowledge and business processesIt has become largely agreed that knowledge management activities should be integrated within day-to-day business processes to ensure continual process improvement and facilitate learning and the gradual development of ‘‘organizational memory’’. The portal should present an ideal environment to integrate the business process aspects with knowledge processes and actively supports the worker in using and adding to knowledge resources by establishing standards for information collection, processing, and presentation.rmation sharing cultureIt is the culture of the organization that supports or impedes knowledge creation and transference both internally and to its customers. Therefore, rather than just encouraging or mandating knowledge sharing, fostering the motivation to share knowledge must precede it.4.5.Learning from failuresCompanies must review their successes and failures, assess them systematically, and record the lessons in form that employees find accessible. Many companies like Microsoft, are following this process of identifying and transferring Internal Best practices. This process is referred as the “Santayana Review’’, citing the philosopher George Santayana, who coined the phrase, ‘‘those who cannot remember the past are condemned to repeat it’’(Garvin,1994).4.6.Immaterial incentivesIn line with Malhotra(2002),we consider that, design of incentives must consider that institutional controls as well as some monetary rewards and incentives are inadequate and do not necessarily ensure desired knowledge sharing behaviors. Instead they can be replaced by immaterial incentives and recognition. Companies should champion the new ethics and values that are at the heart of a knowledge-based enterprise. At the core of this new understanding lies a very simple ethic that Verna Allee calls the principle of fair e xchange: ‘‘Do people feel that they are being treated fairly for the intelligence, creativity innovation, experience and passion they bring to their work’’.5.ConclusionThis article, based on an analysis of eight case studies of early adopters of corporate portal, focused mainly on the benefits and challenges presented by this tool. Corporate portals seem to present the potential of providing organizations with a rich and complex shared information workspace for the generation, exchange, and use of knowledge. They synchronize knowledge and applications, creating a single view into the organization’s intellectual capital. But developing corporate portals and building the critical mass of users required to make them successful is not an easy task. Given the risk that corporate portals fail to deliver the expected benefits, an important task for knowledge management research is to contribute knowledge that will support researchers and practitioners in their efforts to successfully develop and implement corporate portals. This article contributes to this stream of research by studying potential barriers in portal’s implementation and suggesting some perspectives for a successful implementation.译文:企业门户网站:知识管理的同步工具摘要由于价值创造基础和组织成功越来越依赖内部可用的知识杠杆作用,知识管理系统(KMS)从而称为竞争优势的重要工具。

毕业设计论文外文文献翻译计算机科学与技术微软VisualStudio中英文对照

毕业设计论文外文文献翻译计算机科学与技术微软VisualStudio中英文对照

外文文献翻译(2012届)学生姓名学号********专业班级计算机科学与技术08-5班指导教师微软Visual Studio1微软Visual StudioVisual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。

Visual Studio是一个来自微软的集成开发环境IDE(inteqrated development environment),它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。

Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。

集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。

其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。

它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。

Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。

内置的语言中包括C/C + +中(通过Visual C++),(通过Visual ),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

xxxx大学xxx学院毕业设计(论文)外文文献翻译系部xxxx专业xxxx学生姓名xxxx 学号xxxx指导教师xxxx 职称xxxx2013年3 月Introducing the Spring FrameworkThe Spring Framework: a popular open source application framework that addresses many of the issues outlined in this book. This chapter will introduce the basic ideas of Spring and dis-cuss the central “bean factory” lightweight Inversion-of-Control (IoC) container in detail.Spring makes it particularly easy to implement lightweight, yet extensible, J2EE archi-tectures. It provides an out-of-the-box implementation of the fundamental architectural building blocks we recommend. Spring provides a consistent way of structuring your applications, and provides numerous middle tier features that can make J2EE development significantly easier and more flexible than in traditional approaches.The basic motivations for Spring are:To address areas not well served by other frameworks. There are numerous good solutions to specific areas of J2EE infrastructure: web frameworks, persistence solutions, remoting tools, and so on. However, integrating these tools into a comprehensive architecture can involve significant effort, and can become a burden. Spring aims to provide an end-to-end solution, integrating spe-cialized frameworks into a coherent overall infrastructure. Spring also addresses some areas that other frameworks don’t. For example, few frameworks address generic transaction management, data access object implementation, and gluing all those things together into an application, while still allowing for best-of-breed choice in each area. Hence we term Spring an application framework, rather than a web framework, IoC or AOP framework, or even middle tier framework.To allow for easy adoption. A framework should be cleanly layered, allowing the use of indi-vidual features without imposing a whole worldview on the application. Many Spring features, such as the JDBC abstraction layer or Hibernate integration, can be used in a library style or as part of the Spring end-to-end solution.To deliver ease of use. As we’ve noted, J2EE out of the box is relatively hard to use to solve many common problems. A good infrastructure framework should make simple tasks simple to achieve, without forcing tradeoffs for future complex requirements (like distributed transactions) on the application developer. It should allow developers to leverage J2EE services such as JTA where appropriate, but to avoid dependence on them in cases when they are unnecessarily complex.To make it easier to apply best practices. Spring aims to reduce the cost of adhering to best practices such as programming to interfaces, rather than classes, almost to zero. However, it leaves the choice of architectural style to the developer.Non-invasiveness. Application objects should have minimal dependence on the framework. If leveraging a specific Spring feature, an object should depend only on that particular feature, whether by implementing a callback interface or using the framework as a class library. IoC and AOP are the key enabling technologies for avoiding framework dependence.Consistent configuration. A good infrastructure framework should keep application configuration flexible and consistent, avoiding the need for custom singletons and factories. A single style should be applicable to all configuration needs, from the middle tier to web controllers.Ease of testing. Testing either whole applications or individual application classes in unit tests should be as easy as possible. Replacing resources or application objects with mock objects should be straightforward.To allow for extensibility. Because Spring is itself based on interfaces, rather than classes, it is easy to extend or customize it. Many Spring components use strategy interfaces, allowing easy customization.A Layered Application FrameworkChapter 6 introduced the Spring Framework as a lightweight container, competing with IoC containers such as PicoContainer. While the Spring lightweight container for JavaBeans is a core concept, this is just the foundation for a solution for all middleware layers.Basic Building Blockspring is a full-featured application framework that can be leveraged at many levels. It consists of multi-ple sub-frameworks that are fairly independent but still integrate closely into a one-stop shop, if desired. The key areas are:Bean factory. The Spring lightweight IoC container, capable of configuring and wiring up Java-Beans and most plain Java objects, removing the need for custom singletons and ad hoc configura-tion. Various out-of-the-box implementations include an XML-based bean factory. The lightweight IoC container and its Dependency Injection capabilities will be the main focus of this chapter.Application context. A Spring application context extends the bean factory concept by adding support for message sources and resource loading, and providing hooks into existing environ-ments. Various out-of-the-box implementations include standalone application contexts and an XML-based web application context.AOP framework. The Spring AOP framework provides AOP support for method interception on any class managed by a Spring lightweight container.It supports easy proxying of beans in a bean factory, seamlessly weaving in interceptors and other advice at runtime. Chapter 8 dis-cusses the Spring AOP framework in detail. The main use of the Spring AOP framework is to provide declarative enterprise services for POJOs.Auto-proxying. Spring provides a higher level of abstraction over the AOP framework and low-level services, which offers similar ease-of-use to .NET within a J2EE context. In particular, the provision of declarative enterprise services can be driven by source-level metadata.Transaction management. Spring provides a generic transaction management infrastructure, with pluggable transaction strategies (such as JTA and JDBC) and various means for demarcat-ing transactions in applications. Chapter 9 discusses its rationale and the power and flexibility that it offers.DAO abstraction. Spring defines a set of generic data access exceptions that can be used for cre-ating generic DAO interfaces that throw meaningful exceptions independent of the underlying persistence mechanism. Chapter 10 illustrates the Spring support for DAOs in more detail, examining JDBC, JDO, and Hibernate as implementation strategies.JDBC support. Spring offers two levels of JDBC abstraction that significantly ease the effort of writing JDBC-based DAOs: the org.springframework.jdbc.core package (a template/callback approach) and the org.springframework.jdbc.object package (modeling RDBMS operations as reusable objects). Using the Spring JDBC packages can deliver much greater pro-ductivity and eliminate the potential for common errors such as leaked connections, compared with direct use of JDBC. The Spring JDBC abstraction integrates with the transaction and DAO abstractions.Integration with O/R mapping tools. Spring provides support classesfor O/R Mapping tools like Hibernate, JDO, and iBATIS Database Layer to simplify resource setup, acquisition, and release, and to integrate with the overall transaction and DAO abstractions. These integration packages allow applications to dispense with custom ThreadLocal sessions and native transac-tion handling, regardless of the underlying O/R mapping approach they work with.Web MVC framework. Spring provides a clean implementation of web MVC, consistent with the JavaBean configuration approach. The Spring web framework enables web controllers to be configured within an IoC container, eliminating the need to write any custom code to access business layer services. It provides a generic DispatcherServlet and out-of-the-box controller classes for command and form handling. Request-to-controller mapping, view resolution, locale resolution and other important services are all pluggable, making the framework highly extensi-ble. The web framework is designed to work not only with JSP, but with any view technology, such as Velocity—without the need for additional bridges. Chapter 13 discusses web tier design and the Spring web MVC framework in detail.Remoting support. Spring provides a thin abstraction layer for accessing remote services without hard-coded lookups, and for exposing Spring-managed application beans as remote services. Out-of-the-box support is inc luded for RMI, Caucho’s Hessian and Burlap web service protocols, and WSDL Web Services via JAX-RPC. Chapter 11 discusses lightweight remoting.While Spring addresses areas as diverse as transaction management and web MVC, it uses a consistent approach everywhere. Once you have learned the basic configuration style, you will be able to apply it in many areas. Resources, middle tier objects, and web components are all set up using the same bean configuration mechanism. You can combine your entireconfiguration in one single bean definition file or split it by application modules or layers; the choice is up to you as the application developer. There is no need for diverse configuration files in a variety of formats, spread out across the application.Spring on J2EEAlthough many parts of Spring can be used in any kind of Java environment, it is primarily a J2EE application framework. For example, there are convenience classes for linking JNDI resources into a bean factory, such as JDBC DataSources and EJBs, and integration with JTA for distributed transaction management. In most cases, application objects do not need to work with J2EE APIs directly, improving reusability and meaning that there is no need to write verbose, hard-to-test, JNDI lookups.Thus Spring allows application code to seamlessly integrate into a J2EE environment without being unnecessarily tied to it. You can build upon J2EE services where it makes sense for your application, and choose lighter-weight solutions if there are no complex requirements. For example, you need to use JTA as transaction strategy only if you face distributed transaction requirements. For a single database, there are alternative strategies that do not depend on a J2EE container. Switching between those transac-tion strategies is merely a matter of configuration; Spring’s consistent abstraction avoids any need to change application code.Spring offers support for accessing EJBs. This is an important feature (and relevant even in a book on “J2EE without EJB”) because the u se of dynamic proxies as codeless client-side business delegates means that Spring can make using a local stateless session EJB an implementation-level, rather than a fundamen-tal architectural, choice.Thus if you want to use EJB, you can within a consistent architecture; however, you do not need to make EJB the cornerstone of your architecture. This Spring feature can make devel-oping EJB applications significantly faster, because there is no need to write custom code in service loca-tors or business delegates. Testing EJB client code is also much easier, because it only depends on the EJB’s Business Methods interface (which is not EJB-specific), not on JNDI or the EJB API.Spring also provides support for implementing EJBs, in the form of convenience superclasses for EJB implementation classes, which load a Spring lightweight container based on an environment variable specified in the ejb-jar.xml deployment descriptor. This is a powerful and convenient way of imple-menting SLSBs or MDBs that are facades for fine-grained POJOs: a best practice if you do choose to implement an EJB application. Using this Spring feature does not conflict with EJB in any way—it merely simplifies following good practice.Introducing the Spring FrameworkThe main aim of Spring is to make J2EE easier to use and promote good programming practice. It does not reinvent the wheel; thus you’ll find no logging packages in Spring, no connection pools, no distributed transaction coordinator. All these features are provided by other open source projects—such as Jakarta Commons Logging (which Spring uses for all its log output), Jakarta Commons DBCP (which can be used as local DataSource), and ObjectWeb JOTM (which can be used as transaction manager)—or by your J2EE application server. For the same reason, Spring doesn’t provide an O/R mapping layer: There are good solutions for this problem area, such as Hibernate and JDO.Spring does aim to make existing technologies easier to use. For example, although Spring is not in the business of low-level transactioncoordination, it does provide an abstraction layer over JTA or any other transaction strategy. Spring is also popular as middle tier infrastructure for Hibernate, because it provides solutions to many common issues like SessionFactory setup, ThreadLocal sessions, and exception handling. With the Spring HibernateTemplate class, implementation methods of Hibernate DAOs can be reduced to one-liners while properly participating in transactions.The Spring Framework does not aim to replace J2EE middle tier services as a whole. It is an application framework that makes accessing low-level J2EE container ser-vices easier. Furthermore, it offers lightweight alternatives for certain J2EE services in some scenarios, such as a JDBC-based transaction strategy instead of JTA when just working with a single database. Essentially, Spring enables you to write appli-cations that scale down as well as up.Spring for Web ApplicationsA typical usage of Spring in a J2EE environment is to serve as backbone for the logical middle tier of a J2EE web application. Spring provides a web application context concept, a powerful lightweight IoC container that seamlessly adapts to a web environment: It can be accessed from any kind of web tier, whether Struts, WebWork, Tapestry, JSF, Spring web MVC, or a custom solution.The following code shows a typical example of such a web application context. In a typical Spring web app, an applicationContext.xml file will reside in the WEB-INF directory, containing bean defini-tions according to the “spring-beans” DTD. In such a bean definition XML file, business objects and resources are defined, for example, a “myDataSource” bean, a “myInventoryManager” bean, and a “myProductManager” bean. Spring takes care of their configuration, their wiring up, and their lifecycle.<beans><bean id=”myDataSource” class=”org.springframework.jdbc. datasource.DriverManagerDataSource”><property name=”driverClassName”> <value>com.mysql.jdbc.Driver</value></property> <property name=”url”><value>jdbc:mysql:myds</value></property></bean><bean id=”myInventoryManager” class=”ebusiness.DefaultInventoryManager”> <property name=”dataSource”><ref bean=”myDataSource”/> </property></bean><bean id=”myProductManager” class=”ebusiness.DefaultProductManage r”><property name=”inventoryManager”><ref bean=”myInventoryManager”/> </property><property name=”retrieveCurrentStock”> <value>true</value></property></bean></beans>By default, all such beans have “singleton” scope: one instance per context. The “myInventoryManager” bean will automatically be wired up with the defined DataSource, while “myProductManager” will in turn receive a reference to the “myInventoryManager” bean. Those objects (traditionally called “beans” in Spring terminology) need to expos e only the corresponding bean properties or constructor arguments (as you’ll see later in this chapter); they do not have to perform any custom lookups.A root web application context will be loaded by a ContextLoaderListener that is defined in web.xml as follows:<web-app><listener> <listener-class>org.springframework.web.context.ContextLoaderListener</listener-class></listener>...</web-app>After initialization of the web app, the root web application context will be available as a ServletContext attribute to the whole web application, in the usual manner. It can be retrieved from there easily via fetching the corresponding attribute, or via a convenience method in org.springframework.web. context.support.WebApplicationContextUtils. This means that the application context will be available in any web resource with access to the ServletContext, like a Servlet, Filter, JSP, or Struts Action, as follows:WebApplicationContext wac = WebApplicationContextUtils.getWebApplicationContext(servletContext);The Spring web MVC framework allows web controllers to be defined as JavaBeans in child application contexts, one per dispatcher servlet. Such controllers can express dependencies on beans in the root application context via simple bean references. Therefore, typical Spring web MVC applications never need to perform a manual lookup of an application context or bean factory, or do any other form of lookup.Neither do other client objects that are managed by an application context themselves: They can receive collaborating objects as bean references.The Core Bean FactoryIn the previous section, we have seen a typical usage of the Spring IoC container in a web environment: The provided convenience classes allow for seamless integration without having to worry about low-level container details. Nevertheless, it does help to look at the inner workings to understand how Spring manages the container. Therefore, we will now look at the Spring bean container in more detail, starting at the lowest building block: the bean factory. Later, we’ll continue with resource setup and details on the application context concept.One of the main incentives for a lightweight container is to dispense with the multitude of custom facto-ries and singletons often found in J2EE applications. The Spring bean factory provides one consistent way to set up any number of application objects, whether coarse-grained components or fine-grained busi-ness objects. Applying reflection and Dependency Injection, the bean factory can host components that do not need to be aware of Spring at all. Hence we call Spring a non-invasive application framework.Fundamental InterfacesThe fundamental lightweight container interface is org.springframework.beans.factory.Bean Factory. This is a simple interface, which is easy to implement directly in the unlikely case that none of the implementations provided with Spring suffices. The BeanFactory interface offers two getBean() methods for looking up bean instances by String name, with the option to check for a required type (and throw an exception if there is a type mismatch).public interface BeanFactory {Object getBean(String name) throws BeansException;Object getBean(String name, Class requiredType) throws BeansException;boolean containsBean(String name);boolean isSingleton(String name) throws NoSuchBeanDefinitionException;String[] getAliases(String name) throws NoSuchBeanDefinitionException;}The isSingleton() method allows calling code to check whether the specified name represents a sin-gleton or prototype bean definition. In the case of a singleton bean, all calls to the getBean() method will return the same object instance. In the case of a prototype bean, each call to getBean() returns an inde-pendent object instance, configured identically.The getAliases() method will return alias names defined for the given bean name, if any. This mecha-nism is used to provide more descriptive alternative names for beans than are permitted in certain bean factory storage representations, such as XML id attributes.The methods in most BeanFactory implementations are aware of a hierarchy that the implementation may be part of. If a bean is not foundin the current factory, the parent factory will be asked, up until the root factory. From the point of view of a caller, all factories in such a hierarchy will appear to be merged into one. Bean definitions in ancestor contexts are visible to descendant contexts, but not the reverse.All exceptions thrown by the BeanFactory interface and sub-interfaces extend org.springframework. beans.BeansException, and are unchecked. This reflects the fact that low-level configuration prob-lems are not usually recoverable: Hence, application developers can choose to write code to recover from such failures if they wish to, but should not be forced to write code in the majority of cases where config-uration failure is fatal.Most implementations of the BeanFactory interface do not merely provide a registry of objects by name; they provide rich support for configuring those objects using IoC. For example, they manage dependen-cies between managed objects, as well as simple properties. In the next section, we’ll look at how such configuration can be expressed in a simple and intuitive XML structure.The sub-interface org.springframework.beans.factory.ListableBeanFactory supports listing beans in a factory. It provides methods to retrieve the number of beans defined, the names of all beans, and the names of beans that are instances of a given type:public interface ListableBeanFactory extends BeanFactory {int getBeanDefinitionCount();String[] getBeanDefinitionNames();String[] getBeanDefinitionNames(Class type);boolean containsBeanDefinition(String name);Map getBeansOfType(Class type, boolean includePrototypes,boolean includeFactoryBeans) throws BeansException}The ability to obtain such information about the objects managed by a ListableBeanFactory can be used to implement objects that work with a set of other objects known only at runtime.In contrast to the BeanFactory interface, the methods in ListableBeanFactory apply to the current factory instance and do not take account of a hierarchy that the factory may be part of. The org.spring framework.beans.factory.BeanFactoryUtils class provides analogous methods that traverse an entire factory hierarchy.There are various ways to leverage a Spring bean factory, ranging from simple bean configuration to J2EE resource integration and AOP proxy generation. The bean factory is the central, consistent way of setting up any kind of application objects in Spring, whether DAOs, business objects, or web controllers. Note that application objects seldom need to work with the BeanFactory interface directly, but are usu-ally configured and wired by a factory without the need for any Spring-specific code.For standalone usage, the Spring distribution provides a tiny spring-core.jar file that can be embed-ded in any kind of application. Its only third-party dependency beyond J2SE 1.3 (plus JAXP for XML parsing) is the Jakarta Commons Logging API.The bean factory is the core of Spring and the foundation for many other services that the framework offers. Nevertheless, the bean factory can easily be used stan-dalone if no other Spring services are required.Derivative:networkSpring 框架简介Spring框架:这是一个流行的开源应用框架,它可以解决很多问题。

信息系统信息技术中英文对照外文翻译文献

信息系统信息技术中英文对照外文翻译文献

中英文资料外文翻译文献Information Systems Outsourcing Life Cycle And Risks Analysis 1. IntroductionInformation systems outsourcing has obtained tremendous attentions in the information technology industry.Although there are a number of reasons for companies to pursuing information systems (IS)outsourcing , the most prominent motivation for IS outsourcing that revealed in the literatures was “cost saving”. Costfactor has been a major decision factors for IS outsourcing.Other than cost factor, there are other reasons for outsourcing decision.The Outsourcing Institute surveyed outsourcing end-users from their membership in 1998 and found that top 10 reasons companies outsource were:Reduce and control operating costs,improve company focus,gain access to world-class capabilities,free internal resources for other purposes, resources are not available internally, accelerate reengineering benefits, function difficult to manage/out of control,make capital funds available, share risks, and cash infusion.Within these top ten outsourcing reasons, there are three items that related to financial concerns, they are operating costs, capital funds available, and cash infusion. Since the phenomenon of wage difference exists in the outsourced countries, it is obvious that outsourcing companies would save remarkable amount of labor cost.According to Gartner, Inc.'s report, world business outsourcing services would grow from $110 billion in 2002 to $173 billion in 2007,a proximately 9.5% annual growth rate.In addition to cost saving concern, there are other factors that influence outsourcing decision, including the awareness of success and risk factors, the outsourcing risks identification and management,and the project quality management. Outsourcing activities are substantially complicated and outsourcing project usually carries a huge array of risks. Unmanaged outsourcing risks will increase total project cost, devaluatesoftware quality, delay project completion time, and finally lower the success rate of the outsourcing project.Outsourcing risks have been discovered in areas such as unexpected transition and management costs, switching costs, costly contractual amendments, disputes and litigation, service debasement, cost escalation, loss of organizational competence, hidden service costs,and so on.Most published outsourcing studies focused on organizational and managerial issues. We believe that IS outsourcing projects embrace various risks and uncertainty that may inhibit the chance of outsourcing success. In addition to service and management related risk issues, we feel that technical issues that restrain the degree of outsourcing success may have been overlooked. These technical issues are project management, software quality, and quality assessment methods that can be used to implement IS outsourcing projects.Unmanaged risks generate loss. We intend to identify the technical risks during outsourcing period, so these technical risks can be properly managed and the cost of outsourcing project can be further reduced. The main purpose of this paper is to identify the different phases of IS outsourcing life cycle, and to discuss the implications of success and risk factors, software quality and project management,and their impacts to the success of IT outsourcing.Most outsourcing initiatives involve strategic planning and management participation, therefore, the decision process is obviously broad and lengthy. In order to conduct a comprehensive study onto outsourcing project risk analysis, we propose an IS outsourcing life cycle framework to be served as a yardstick. Each IS outsourcing phase is named and all inherited risks are identified in this life cycle framework.Furthermore,we propose to use software qualitymanagement tools and methods in order to enhance the success rate of IS outsourcing project.ISO 9000 is a series of quality systems standards developed by the International Organization for Standardization (ISO).ISO's quality standards have been adopted by many countries as a major target for quality certification.Other ISO standards such as ISO 9001, ISO 9000-3,ISO 9004-2, and ISO 9004-4 are quality standards that can be applied to the software industry.Currently, ISO is working on ISO 31000, a risk management guidance standard. These ISO quality systems and risk management standards are generic in nature, however, they may not be sufficient for IS outsourcing practice. This paper, therefore,proposes an outsourcing life cycle framework to distinguish related quality and risk management issues during outsourcing practice.The following sections start with needed theoretical foundations to IS outsourcing,including economic theories, outsourcing contracting theories, and risk theories. The IS outsourcing life cycle framework is then introduced.It continues to discuss the risk implications in precontract,contract, and post-contract phases. ISO standards on quality systems and risk management are discussed and compared in the next section. A conclusion and direction for future study are provided in the last section.2. Theoretical foundations2.1. Economic theories related to outsourcingAlthough there are a number of reasons for pursuing IS outsourcing,the cost savingis a main attraction that leads companies to search for outsourcing opportunities. In principle, five outsourcing related economic theories that lay the groundwork of outsourcing practice, theyare:(1)production cost economics,(2)transaction cost theory,(3)resource based theory,(4)competitive advantage, and(5)economies of scale.Production cost economics was proposed by Williamson, who mentioned that “a firm seeks to maximize its profit also subjects to its production function and market opportunities for selling outputs and buying inputs”. It is clear that production cost economics identifies the phenomenon that a firm may pursue the goal of low-cost production process.Transaction cost theory was proposed by Coase. Transaction cost theory implies that in an economy, there are many economic activities occurred outside the price systems. Transaction costs in business activities are the time and expense of negotiation, and writing and enforcing contracts between buyers and suppliers .When transaction cost is low because of lower uncertainty, companies are expected to adopt outsourcing.The focus of resource-based theory is “the heart of the firm centers on deployment and combination of specific inputs rather than on avoidance of opportunities”. Conner suggested that “Firms as seekers of costly-to-copy inputs for production and distribution”.Through resource-based theory, we can infer that “outsourcing decision is to seek external resources or capability for meeting firm's objectives such as cost-saving and capability improving”.Porter, in his competitive forces model, proposed the concept of competitive advantage. Besanko et al.explicated the term of competitive advantage, through economic concept, as “When a firm(or business unit within a multi-business firm) earns a higher rate of economic profit than the average rate of economic profit of other firms competing within the same market, the firm has a competitive advantage.” Outsourcing decision, therefore, is to seek cost saving that meets the goal of competitive advantage within a firm.The economies of scale is a theoretical foundation for creating and sustaining the consulting business. Information systems(IS) and information technology(IT) consulting firms, in essence, bear the advantage of economies of scale since their average costs decrease because they offer a mass amount of specialized IS/IT services in the marketplace.2.2. Economic implication on contractingAn outsourcing contract defines the provision of services and charges that need to be completed in a contracting period between two contracting parties. Since most IS/IT projects are large in scale, a valuable contract should list complete set of tasks and responsibilities that each contracting party needs to perform. The study of contracting becomes essential because a complete contract setting could eliminate possible opportunistic behavior, confusion, and ambiguity between two contracting parties.Although contracting parties intend to reach a complete contract,in real world, most contracts are incomplete. Incomplete contracts cause not only implementing difficultiesbut also resulting in litigation action. Business relationship may easily be ruined by holding incomplete contracts. In order to reach a complete contract, the contracting parties must pay sufficient attention to remove any ambiguity, confusion, and unidentified and immeasurable conditions/ terms from the contract. According to Besanko et al., incomplete contracting stems from the following three factors: bounded rationality, difficulties on specifying or measuring performance, and asymmetric information.Bounded rationality describes human limitation on information processing, complexity handling, and rational decision-making. An incomplete contract stems from unexpected circumstances that may be ignored during contract negotiation. Most contracts consist of complex product requirements and performance measurements. In reality, it is difficult to specify a set of comprehensive metrics for meeting each party's right and responsibility. Therefore, any vague or open-ended statements in contract will definitely result in an incomplete contract. Lastly, it is possible that each party may not have equal access to all contract-relevant information sources. This situation of asymmetric information results in an unfair negotiation,thus it becomes an incomplete contract.2.3. Risk in outsource contractingRisk can be identified as an undesirable event, a probability function,variance of the distribution of outcomes, or expected loss. Risk can be classified into endogenous and exogenous ris ks. Exogenous risks are“risks over which we have no control and which are not affected by our actions.”. For example, natural disasters such as earthquakes and flood are exogenous risks. Endogenous risks are “risks that are dependent on our actions”.We can infer that risks occurring during outsource contracting should belong to such category.Risk (RE) can be calculated through “a function of the probability of a negative outcome and the importance of the loss due to the occurrence of this outcome:RE = ΣiP(UOi)≠L(UOi) (1) where P(UOi) is the probability of an undesirable outcome i, and L(UOi) is the loss due to the undesirable outcome i.”.Software risks can also be analyzed through two characteristics :uncertainty and loss. Pressman suggested that the best way to analyze software risks is to quantify the level of uncertainty and the degree of loss that associated with each kind of risk. His risk content matches to above mentioned Eq.(1).Pressman classified software risks into the following categories: project risks, technical risks, and business risks.Outsourcing risks stem from various sources. Aubert et al. adopted transaction cost theory and agency theory as the foundation for deriving undesirable events and their associated risk factors.Transaction cost theory has been discussed in the Section 2.2. Agency theory focuses on client's problem while choosing an agent(that is, a service provider), and working relationship building and maintenance, under the restriction of information asymmetry.Various risk factors would be produced if such agent–client relationship becomes crumble.It is evident that a complete contract could eliminate the risk that caused by an incomplete contract and/or possible opportunistic behavior prompted by any contracting party. Opportunistic behavior is one of the main sources that cause transactional risk. Opportunistic behavior occurs when a transactional partner observes away of saving cost or removing responsibility during contracting period, this company may take action to pursue such opportunity. This type of opportunistic behavior could be encouraged if such contract was not completely specified at the first place.Outsourcing risks could generate additional unexpected cost to an outsourcing project. In order to conduct a better IS outsourcing project, identifying possible risk factors and implementing matured risk management process could make information systems outsourcing more successful than ever.rmation system outsourcing life cycleThe life cycle concept is originally used to describe a period of one generation of organism in biological system. In essence, the term of life cycle is the description of all activities that a subject is involved in a period from its birth to its end. The life cycle concept has been applied into project management area. A project life cycle, according to Schwalbe, is a collection of project phases such as concept,development, implementation, and close-out. Within the above mentioned four phases, the first two phases center on “planning”activity and the last two phases focus on “delivery the actual work” Of project management.Similarly, the concept of life cycle can be applied into information systems outsourcing analysis. Information systems outsourcing life cycle describes a sequence of activities to be performed during company's IS outsourcing practice. Hirsch heim and Dibbern once described a client-based IS outsourcing life cycle as: “It starts with the IS outsourcing decision, continues with the outsourcing relationship(life of the contract)and ends with the cancellation or end of the relationship, i.e., the end of the contract. The end of the relationship forces a new outsourcing decision.” It is clear that Hirsch heim and Dibbern viewed “outsourcing relationship” as a determinant in IS outsourcing life cycle.IS outsourcing life cycle starts with outsourcing need and then ends with contract completion. This life cycle restarts with the search for a new outsourcing contract if needed. An outsourcing company may be satisfied with the same outsourcing vendor if the transaction costs remain low, then a new cycle goes on. Otherwise, a new search for an outsourcing vendor may be started. One of the main goals for seeking outsourcing contract is cost minimization. Transaction cost theory(discussed in the Section 2.1)indicates that company pursuing contract costs money, thus low transaction cost will be the driver of extending IS outsourcing life cycle.The span of IS outsourcing life cycle embraces a major portion of contracting activities. The whole IS outsourcing life cycle can be divided into three phases(see Fig.1): pre-contract phase, contract phase, and post-contract phase. Pre-contract phase includes activities before a major contract is signed, such as identifying the need for outsourcing, planning and strategic setting, and outsourcing vendor selection. Contract phase startswhile an outsourcing contract is signed and then lasted until the end of contracting period. It includes activities such as contracting process, transitioning process, and outsourcing project execution. Post-contract phase contains those activities to be done after contract expiration, such as outsourcing project assessment, and making decision for the next outsourcing contract.Fig.1. The IS outsourcing life cycleWhen a company intends to outsource its information systems projects to external entities, several activities are involved in information systems outsourcing life cycle. Specifically, they are:1. Identifying the need for outsourcing:A firm may face strict external environment such as stern market competition,competitor's cost saving through outsourcing, or economic downturn that initiates it to consider outsourcing IS projects. In addition to external environment, some internal factors may also lead to outsourcing consideration. These organizational predicaments include the need for technical skills, financial constraint, investors' request, or simply cost saving concern. A firm needs to carefully conduct a study to its internal and external positioning before making an outsourcing decision.2. Planning and strategic setting:If a firm identifies a need for IS outsourcing, it needs to make sure that the decision to outsource should meet with company's strategic plan and objectives. Later, this firm needs to integrate outsourcing plan into corporate strategy. Many tasks need to be fulfilled during planning and strategic setting stages, including determining outsourcing goals, objectives, scope, schedule, cost, business model, and processes. A careful outsourcing planning prepares a firm for pursuing a successful outsourcing project.3. Outsourcing vendor selection:A firm begins the vendor selection process with the creation of request for information (RFI) and request for proposal (RFP) documents. An outsourcing firm should provide sufficient information about the requirements and expectations for an outsourcing project. After receiving those proposals from vendors, this company needs to select a prospective outsourcing vendor, based on the strategic needs and project requirements.4. Contracting process:A contract negotiation process begins after the company selects a probable outsourcing vendor. Contracting process is critical to the success of an outsourcing project since all the aspects of the contract should be specified and covered, including fundamental, managerial, technological, pricing, financial, and legal features. In order to avoid resulting in an incomplete contract, the final contract should be reviewed by two parties' legal consultants.Most importantly, the service level agreements (SLA) must be clearly identified in the contract.5. Transitioning process:Transitioning process starts after a company signed an outsourcing contract with a vendor. Transition management is defined as “the detailed, desk-level knowledge transfer and documentation of all relevant tasks, technologies, workflows, people, and functions”.Transitioni ng process is a complicate phase in IS outsourcing life cycle since it involves many essential workloads before an outsourcing project can be actually implemented. Robinson et al.characterized transition management into the following components:“employee management, communication management, knowledge management, and quality management”. It is apparent that conducting transitioning process needs the capabilities of human resources, communication skill, knowledge transfer, and quality control.6. Outsourcing project execution:After transitioning process, it is time for vendor and client to execute their outsourcing project. There are four components within this“contract governance” stage:project management, relationship management, change management, and risk management. Any items listed in the contract and its service level agreements (SLAs) need to be delivered and implemented as requested. Especially, client and vendor relationships, change requests and records, and risk variables must be carefully managed and administered.7. Outsourcing project assessment:During the end of an outsourcing project period, vendor must deliver its final product/service for client's approval. The outsourcing client must assess the quality of product/service that provided by its client. The outsourcing client must measure his/her satisfaction level to the product/service provided by the client. A satisfied assessment and good relationship will guarantee the continuation of the next outsourcing contract.The results of the previous activity (that is, project assessment) will be the base of determining the next outsourcing contract. A firm evaluates its satisfaction level based on predetermined outsourcing goals and contracting criteria. An outsourcing company also observes outsourcing cost and risks involved in the project. If a firm is satisfied with the current outsourcing vendor, it is likely that a renewable contract could start with the same vendor. Otherwise, a new “precontract phase” would restart to s earch for a new outsourcing vendor.This activity will lead to a new outsourcing life cycle. Fig.1 shows two dotted arrowlines for these two alternatives: the dotted arrow line 3.a.indicates “renewable contract” path and the dotted arrow line 3.b.indicates “a new contract search” path.Each phase in IS outsourcing life cycle is full of needed activities and processes (see Fig.1). In order to clearly examine the dynamics of risks and outsourcing activities, the following sections provide detailed analyses. The pre-contract phase in IS outsourcing life cycle focuses on the awareness of outsourcing success factors and related risk factors. The contract phase in IS outsourcing life cycle centers on the mechanism of project management and risk management. The post-contract phase in IS outsourcing life cycle concentrates on the need of selecting suitable project quality assessment methods.4. Actions in pre-contract phase: awareness of success and risk factorsThe pre-contract period is the first phase in information systems outsourcing life cycle (see Fig.1). While in this phase, an outsourcing firm should first identify its need for IS outsourcing. After determining the need for IS outsourcing, the firm needs to carefully create an outsourcing plan. This firm must align corporate strategy into its outsourcing plan.In order to well prepare for corporate IS outsourcing, a firm must understand current market situation, its competitiveness, and economic environment. The next important task to be done is to identify outsourcing success factors, which can be used to serve as the guidance for strategic outsourcing planning. In addition to know success factors,an outsourcing firm must also recognize possible risks involved in IS outsourcing, thus allows a firm to formulate a better outsourcing strategy.Conclusion and research directionsThis paper presents a three-phased IS outsourcing life cycle and its associated risk factors that affect the success of outsourcing projects.Outsourcing life cycle is complicated and complex in nature. Outsourcing companies usually invest a great effort to select suitable service vendors However,many risks exit in vendor selection process. Although outsourcing costs are the major reason for doing outsourcing, the firms are seeking outsourcing success through quality assurance and risk control. This decision path is understandable since the outcome of project risks represents the amount of additional project cost. Therefore, carefully manage the project and its risk factors would save outsourcing companies a tremendous amount of money.This paper discusses various issues related to outsourcing success, risk factors, quality assessment methods, and project management techniques. The future research may touch alternate risk estimation methodology. For example, risk uncertainty can be used to identify the accuracy of the outsourcing risk estimation. Another possible method to estimate outsourcing risk is through the Total Cost of Ownership(TCO) method. TCO method has been used in IT management for financial portfolio analysis and investment decision making. Since the concept of risk is in essence the cost (of loss) to outsourcing clients, it thus becomes a possible research method to solve outsourcing decision.信息系统的生命周期和风险分析1.绪言信息系统外包在信息技术工业已经获得了巨大的关注。

JAVA学习过程论文中英文资料对照外文翻译文献

JAVA学习过程论文中英文资料对照外文翻译文献

JAVA学习过程论文中英文资料对照外文翻译文献During my process of learning Java。

I have found that everyone has their own unique study method。

What works for one person may not work for another。

As I am studying Java independently。

I have not asked ___。

I have had to rely on my own ___ out。

While I cannot say whether this is the best method。

I can offer it as a reference for others.When I first started learning Java。

___ understanding of the language。

As I progressed。

I began to work on small projects to apply what I had learned.One of the biggest challenges I faced was understanding object-oriented programming。

___。

once I understood the basics。

everything else started to fall into place.___ practicing programming。

I also made sure to take breaks and give my brain time to rest。

I found that this helped me to ___.Overall。

my learning process has been a n of n。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

中英文资料翻译With the popularity of the Inter NET applications, a variety of Web Information System Has become a pressing issue. Establish the essence of Web information systemsDevelopment of a Web repository (database as the core of a variety of Web letterInformation storage) as the core Web applications. Currently, the Web repositorydevelopment technologyOperation of a wide range of different characteristics. Various periods at all levels, a variety of purposes Technology co-exist, dizzying mirror chaos, it is difficult to choose. More popularJava of Ser vet Web repository development program a more practical Of choice.Servlet is running the applet on the Web server, can be completed Xu Multi-client Applet can not complete the work, which runs on the server and clientsNo end, do not download do not by the client security restrictions, the running speedGreatly increasedAndApplet running in a browser and extend the browser's ability similar Like, Serv the let run in the Web server to enable Java Serv the let engineAnd expand the capacity of the server. Therefore, we can say Serv the let is run inApplet on a Web server, Serv the let Jav a Ser vlet API And Jav a program of classes and packages.1Servlet access model2Serv the let, there are three access models:(1) an access model1 browser to Web server to issue a retrieval request.2 the Web server after receipt of therequest, the request forwarded to the Servle tengine.3 Serlet engine to perform the requested the Servlet and directly through JDBC4Servlet throughJDBC toretrieve searchresults to generate the html page andPage back to the Web server.5 the Web server the page is sent back to the browser.(2)The second access model1 browser to Web server to issue a retrieval request.2 the Web server receives the request afterthe request forwarded to the of Ser v the letengine.3 Serv let engine to perform the request the the Servlet and retrieve sentJa, vabean access to the data.4data access the Ja vabean searchable database through JDBC informationAnd from the search results stored in itself.5Servlet remove searchresults from the data access Javabean generateHtml page and Ht ml of page back to the w eb server.6 the Web server the page is sent back to the browser.(3) The third access model1 A browser issue a retrieval request to the Web server.2 Web server receives the request after the request forwardedto the of Ser v the let engine.Of Ser vlet engine to perform therequested Servlet directly through JDBC inspection3 The cable database and search results are stored in the result is stored the Jav abean into.Javabean,4. Ser v the let from the results arestored to remove the search results andJSP files to format the output page.2 Servlet functionality and life cycle2.1Servlet functions(1) Create and return dynamic Web pages based on customer requests.(2) create can be embedded into existing HTML pages as part of HTML Page (HT fragment) of the ML.(3) and other server resources (including databases and applications based on the Jav aProgram) to communicate.(4) to handle multiple client connections,receiving the input of more than one client, and The results broadcast to multiple clients. For example, Ser vlet is a multi-participantGame server.(5) of MIM E type filter information on the special handling, such as imageConversion and server-side include (SSI).(6) custom processing available to all servers in the standard routine.2.2Servlet lifecycleServlet life cycle begins with it into the Web server's memory And end in the termination or re-loaded Serv the let.(1)load.Load the servlet at the following times:1.If you have configured automatic load option,and then start the Web server automatically loaded2.After the start of the Web server, the client Serv thelet issued for the first time, please Demand.3.Reload Serv the let.Loaded Servlet, Web servers to create a servlet instance, and Servlet's init () method is called. Servlet initialization parameters in the in itialization phase, The number is passed to the Servlet configuration object.(2)terminateWhen the Web server no longer needs the servlet, or reload ServletA new instance of the server calls Serv the let's destroy () method, remove it from the Memory deleted.3 How to call ServletMethod of Ser vlet is called Total five kinds: call in the URL in the form<Form> Tag call, call, in HT the ML page in the JSP files Call, call in an ASP file. The following itemized to be introduced.(1)call the servlet in the URL.Simply input format in the browser as http: ∥ yo ur webser ver the same the ser vlet name name / servlet path / servlet the URL toThe site canbe. Ofwhich:your webser ver name is to refer to the Servlet where theWeb server name, the servlet path is the path refers to the Servlet, the servletThe name refers to the Servlet real name or an alias.(2)call the Servlet <FORM> tagsCall of Ser the let the the <FORM> tag allows users to input data on the Web page, andinput data submitted to the vlet of Ser.Serv the let will be submitted to receive data in different ways.For example: <FORM METHOD = "POST / a GET" the ACTION = "/ servletpat h / serv let name"> {place the text inputarea tags, buttons and other logos}(3)in the HTML page to call the servlet.Use <SERVLET> mark <FORM> tags, no need to create a complete HTML page.Instead,the servlet output isonly part of the HTMLpage ( HTML fragment) and dynamicallyembedded into the static text in the original HTML page.All this happened on the server andsent to the user only the resulting HTML page.<SERVLET> </ SERVLET> tag contained in the originalHTML page.Servlet will be invoked in these two markers and the Ser vlet response will cover these two markersbetween all things and mark itself, for example:〈SERVLET NAME= “my serv let ”CODE= “my serv let .class”CODEBASE= “u r l”initpar am= “v alue”〉〈PARAM NAME= “parm1”VALU E= “v alue1”〉〈PARAM NAME= “parm2”VALU E= “v alue2”〉⋯⋯〈/SERVLET 〉(4)call the servlet in the JSP files.Call in the JSP file format used by the Servlet and HTML page to call exactly the same.Andthe principles are identical. Only reconcile its dynamic JSP file is not a static HTML page.(5)in an ASP file calls the servlet.Ifyou Micr oso ft I nt ernet Informatio n-Ser ver (II S) on the legacy of the ASP file, and can not be ASP files transplanted into a JSP file, you can use the ASP file to of Ser vlet iscalled.But it must be through a special ActiveX control, an ASP file is only through it can callthe servlet.4Servlet Howto use ConnectionManager to efficiently manage the databaseconnection(1)the functionality of the Connection Manager.For non-Web applications, Web-based application access to the database will lead tohigher and unpredictable overhead, whichis due to more frequent Web users connect anddisconnect.Normally connected to the resources used and disconnect from the databasewill farexceed the resources used in the retrieval.ConnectionManager function is tominimize the additional occupancy of the usersof the database resources to achieve thebestperformance of database access.Connection Manager sharing overhead through the establishmentof the connection poolwill connect users Servlet available to multiple users request.In other words, each userrequest onlythe connect / disconnect with a smallportion of the overhead costs.Initialresources toestablish the connection of the buffer pool, the rest of th e connect / disconnectoverhead is not big, because this isonly reuse the existing connection.Serv the let in the following manner using the connectionpool: When a user throughRequest Web Serv the let the let Serv use anexisting connection from the buffer poolNext, this means that the user requests do notcause the connection to the databasesystem overhead. InAfter the termination of serv the let it connect toreturn to the pool for its Connection ManagerThe Ser vlet. Thus, the user request does not cause the database is disconnectedOf system overhead.Connection Manager also allows users to be able tocontrol the concurrency of thedatabase products evenThen the number. When the database licenseagreement limit the number of users, this feature isVery useful. Create a buffer pool for the database, and connection managementBuffering pool "maximum number of connections" parameter setto the database product license limitGiven maximum number of users. If you use otherprograms without Connection ManagerconnectionsDatabase, you can not guarantee that the method is effective.(2)the structure of the Connection Manager.(3)Connection Manager connection pool to maintain a connection to aspecific database is open. Step 1: When the first Serv the let trying to Connection Manager communications is loaded by the Java Application Server Connection Manager. As long as the Java application server running the Connection Manager has been loaded. Step 2: The Java application server passes the request to a servlet. Step 3: Servlet Connection Manager requests a connection from the pool. Step four: the buffer pool to Ser vlet allocated a pool of existing idleconnection. Step 5: servlet to use to connect a direct dialogue with the database, this process is the standard API for a particular database. Step 6: the database through Ser vlet the connection returns data. Step 7: When the Servlet end to communicate with the database, servlet connections returned to the connection manager pool for other servlet uses. Step 8: Servlet Jav a application server to the user sends back response.Servlet requests a connection, if the buffer pool, there is no idle connection, then the connection manager directly communicate with the database. Connection Manager will: Step 9: to the database requests a new connection. Step 10: Add connections to the buffer pool. If the buffer pool is connected to the prescribed ceiling, connect to the serverWill not be a new connection to join the buffer pool(3) the performance characteristics of the Connection Manager. Buffer pool to create a new connection is a high overhead tasks, new connections will use the resources on the database. Therefore, the Connection Manager the best use of existing connections of the buffer pool to meet the request of the Servlet. Meanwhile, the connecting tubeThe processor must be as much as possible to minimize the buffer pool idle connections, because this is a great waste of system resources. Connection Manager Serv the let with the implementation of these minimize and maximize task. Connection Manager to maintain each connection verification time stamp, and recently used tags and use the logo. When the a Ser vlet first the connection, connection verification time stamp, and most recent time stamp is set to the current time, the connection is being used flag is set totrue.Connection Manager can be removed from a Serv the let along-unused connections, this length of time specified by the Connection Manager, the longest cycle parameters.Connection Manager can view recently used mark is being used to connect. If the time between the most recently used time and time difference is greater than the longest cycle configuration parameters, the connection will be considered to be a residual connection, which indicates Serv the let take its discontinued or no response. Residual connection will be returned to the pool for other Ser vlet, it is being used flag is set to false, authentication and time stamp is set to the current time. If Ser vlet is ready within a longer period of time to use the connection with the database several timesCommunications, you must code to the Serv the let, so that each time you use to connectConfirm that it still occupies this connection.Connection Manager can be removed from the buffer pool idle connections, because theyWould be a waste of resources. In order to determine which connection is idle, Connection Manager will checkInvestigation connected the sign and time stamp, this operation is connected by periodic access toBuffer pool information. Connection Manager checks have not been any Ser vlet makeWith the connections (these connections is to use the logo isfalse). If you have recently usedBetween time and the current time difference exceeds a maximum idle time configuration parameters, theThat the connection is idle. Idle connection will be removed from the buffer pool, down toMinimum number of connections configuration parameter specifies the lower limit value.翻译:随着Inter net 的普及应用, 各种Web 信息系统的建立已成为一个迫在眉睫的问题。

相关文档
最新文档