ROBERT J. GLUSHKO AND TIM MCGRATH Document Engineering--Analyzing and Designing Document for Business Informatics and Web Services. The MIT Press (2005). ISBN 0-262-07261-0.  21.95. 703 pp. Hardbound

2005 ◽  
Vol 49 (3) ◽  
pp. 376-376
Author(s):  
G. Pallis
Author(s):  
D. M. Nazarov ◽  
A. D. Nazarov

The article is a description of the Power Query technology training methodology implemented within the framework of the Federal State Educational Standard for Higher Education 3++ taking into account professional standards in the direction of the bachelor’s program “Business Informatics”. The authors propose a set of laboratory works in the form of situational tasks and cases that allow to create professional competencies and labor functions of a future specialist (business analyst) as part of the development of the ETL process for processing data using Power Query technology. The use of situational tasks and cases allows to effectively implement the development of a set of professional competencies, which are elements of generalized labor functions, without tying the material in question specifically to any discipline. As part of the implementation of situational tasks and cases described in the article, bachelors not only learn to use the basic elements of Power Query technology, but also gain the skills and abilities associated with the application of the studied technology in performing standard professional tasks stipulated by a professional standard. The format for describing the methodology is presented in the form of the traditional “Key-by-Key” technology, widely used in obtaining professional IT competencies.


Author(s):  
D. M. Nazarov

The article describes the training methods in the course “Information Technologies” for the future bachelors of the directions “Economics”, “Management”, “Finance”, “Business Informatics”, the development of metasubject competencies of the student while his use of tools for data processing by means of the language R. The metasubject essence of the work is to update traditional economic knowledge and skills through various presentation forms of the same data sets. As part of the laboratory work described in the article, future bachelors learn to use the basic tools of the R language and acquire specific skills and abilities in R-Studio using the example of processing currency exchange data. The description of the methods is presented in the form of the traditional Key-by-Key technology, which is widely used in teaching information technologies.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2004 ◽  
Vol 124 (1) ◽  
pp. 176-181
Author(s):  
Tomoaki Maruo ◽  
Keinosuke Matsumoto ◽  
Naoki Mori ◽  
Masashi Kitayama ◽  
Yoshio Izumi

Sign in / Sign up

Export Citation Format

Share Document