SlideShare uma empresa Scribd logo
1 de 13
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
BizTalk Mapper 
Allied Consultants 
Stability: Dev | QA | Prod 
Author: Muhammad Omer 
Ref. Number: 
Confidentiality Statement 
ALL INFORMATION CONTAINED IN THIS DOCUMENT IS PROVIDED ON THE 
BASIS OF STRICT CONFIDENTIALITY AND IS GOVERNED BY THE 
AGREEMENTS BETWEEN THE TWO PARTIES. IT MUST NOT BE DISCLOSED 
IN WHOLE OR IN PART TO ANY OTHER PARTY AT ANY TIME WITHOUT THE 
PRIOR CONSENT AND AUTHORITY IN WRITING FROM ALLIED CONSULTANTS 
Process Analysis – Human Workflows Page 1 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
Document Version and Control 
Review History 
Name Date 
Version Control 
Version Date Change Summary Updated by 
Distribution 
Version Date Parties 
Process Analysis – Human Workflows Page 2 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
1. Table of Contents 
1. TABLE OF CONTENTS...........................................................................................................................3 
2. IDEAS..........................................................................................................................................................4 
3. OVERVIEW...............................................................................................................................................4 
4. VOCABULARY.........................................................................................................................................5 
4.1 PRODUCT SPECIFIC (BIZTALK).........................................................................................................5 
4.2 GENERIC ACRONYMS AND TERMINOLOGY.........................................................................................5 
5. ANALYSIS .................................................................................................................................................6 
6. PATTERNS OF THE DOMAIN..............................................................................................................6 
7. TASKS.........................................................................................................................................................7 
PRODUCT SPECIFIC AREA.....................................................................................................................8 
8. GOOD TO HAVE FEATURES IN THE PRODUCT............................................................................8 
9. HOW TO:....................................................................................................................................................9 
9.1 GET A SAMPLE RUNNING..................................................................................................................9 
9.1.1 Comments on Sample:....................................................................................................................9 
9.2 PERFORM LOGGING AND EXCEPTION HANDLING...............................................................................9 
9.3 HOW TO DEPLOY IT AUTOMATICALLY...............................................................................................9 
9.4 RUNNING MAPS FROM EXTERNAL APPLICATIONS................................................................................9 
10. HOW IT WORKS .................................................................................................................................10 
11. BEST PRACTICES................................................................................................................................10 
12. USEFUL REFERENCES......................................................................................................................11 
13. USEFUL TOOLS...................................................................................................................................11 
14. COMMON PROBLEMS.......................................................................................................................11 
15. TODO/ NOT COVERED......................................................................................................................12 
APPENDIX A: PLACEMENT OF INFORMATION ARCHITECTURE AS A COMPANY’S 
STRATEGY..................................................................................................................................................13 
Process Analysis – Human Workflows Page 3 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
2. Ideas 
- Try and make a table out of every two pieces of information you feel are connected. This 
tends to bring structure to thought. 
- Imagine someone with no knowledge of your area is trying to become an expert by 
reading this document. This will serve as a reference for when you revisit this topic after 
a few months. 
- Separate documents if the area is too large to fit reasonably in a document. Too large a 
document is worse than one that is too small. 
- Design the document so that someone looking at the “Document Map” can browse to his 
required information easily. Use the outlining toolbar. 
- 
3. Overview 
<<Mention which product areas you are covering in this document >> e.g. EDI, Flat files… 
Process Analysis – Human Workflows Page 4 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
4. Vocabulary 
<<What should one say to sounds like an expert. i.e. talk the talk>> 
<<Fancy words you can think of>> 
4.1 Product Specific (BizTalk) 
Term Context Description 
4.2 Generic Acronyms and terminology 
Term Context Description 
Semantic 
Integration 
Dissonance 
Semantic 
Information 
Architecture 
Area of architecture dealing with the analysis and design of 
complicated information in EAI scenarios 
Data Semantics Semantics captures the formal meaning of data. It is achieved 
by mapping (or rationalizing) the data’s schema to the 
Information Model. 
Information 
Model 
A study of what exists in the enterprise. An ontology of the data. 
Process Analysis – Human Workflows Page 5 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
5. Analysis 
- Turn data into information by explicitly capturing the meaning and context of each data 
element (Enterprise wide IT analysis) 
- Semantic information architecture – core principles: 
o Metadata – Know your data (Asset location, usage, origin, relationships to other 
asets, rules associated with it, ownership 
o Information Model – Know your business (See above) 
o Data semantics – Understand your data 
- Value preposition of Information Analysis includes (Higher quality BI [unambiguous, 
valid, and consistent], Business agility, and Lower/more predictable IT costs. 
- Analysis Methodology: 
o Gather requirements > Catalog Metadata > Construct Information Model > Map 
to Information Model (Rationalize) > Publish to relevant stakeholders > Utilize in 
ongoing projects 
o 
<Consider making a template Excel out of this> 
- 
6. Patterns of the domain 
<< Might want to go into how these are implemented. You might want to refer to a separate 
document for this >> 
Process Analysis – Human Workflows Page 6 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
7. Tasks 
Task Name Input Document 
(Embed it if needed) 
Output 
(Sample if 
needed) 
Likelihood of 
occurrence 
Simple Mapping 
- Try to identify common tasks you think will be involved in a typical project in this area. 
- Task 
o Input required: Based on these the requirement gatherer will ensure he has all 
the information that is needed to perform this task. 
o Output of the task: Schema xsd…, orchestration odx… 
- Be explicit. Try to make templates for the input you require. A good template would be 
one which takes the minimum information from the user and derives the most from it. 
Process Analysis – Human Workflows Page 7 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
Product Specific Area 
8. Good to have features in the Product 
Feature Description 
Grouping of Shapes Grouping of functoids in the map 
Connection between pages Ability to connect wires between pages of a map 
<<add columns if you like>> 
Process Analysis – Human Workflows Page 8 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
9. How to: 
9.1 Get a sample running 
1. <SDK Sample is pretty good> 
9.1.1 Comments on Sample: 
- Infopath sample is good for high level experience but hard to understand what is 
going on underneath. 
- Invocation through code helps more in terms of understand the underlying 
process 
9.2 Perform Logging and Exception handling 
- Use the Testing Utility 
- Custom Functoids 
- Inline Functoids 
- XSLT?? 
- Possible Exceptions 
9.3 How to deploy it automatically 
<<e.g. from a script or a setup wizard>> 
9.4 Running maps from external applications 
Process Analysis – Human Workflows Page 9 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
10. How it works 
- Maps run top to bottom (From the input schema), left to right (in terms of 
dependencies). 
- If a functoids output is connected to two nodes in a target schema, the functoids 
is executed TWICE! 
- Mapper is DOM based. Limit the size of the input documents 
- 
11. Best Practices 
1. Use the input template to gather requirements!!!!! 
2. Try to identify independent sections in the mapping rules. Place each one in a separate 
tab page. This helps greatly in large maps. 
3. Use the Custom scripting functoid’s “label” property to keep a name or signature of the 
method it is calling 
4. Try to identify stages within the map. 
5. Copy the rule description on top of any code that you write in a custom script. 
Process Analysis – Human Workflows Page 10 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
12. Useful References 
Make sure you have the latest SDK and documentation from the MS website: 
Address Comments 
Semantic 
Information 
Architecture 
http://knowledgemanagement.ittoolbox.co 
m/pub/ZS050903.pdf 
Good article on the 
architectural significance of 
this work. 
13. Useful Tools 
Tool name Useful For Download Link Rate it 
14. Common Problems 
Symptoms Description Cause Resolution 
Moving shapes is 
dangerous as it is 
very easy to get 
OOTB functoids error 
How is that done? 
handling 
Input = Repeating 
node but one record 
sent. Output = single 
node… any functoids 
connecting the two 
are called twice, once 
with correct 
parameters once with 
“”!! 
Process Analysis – Human Workflows Page 11 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
15. TODO/ Not covered 
<<Areas that should be explored to understand the area completely but are not covered in the 
document>> 
Area Reason for not covering it 
Process Analysis – Human Workflows Page 12 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
Data Analysis – BizTalk Mapper 
www.alliedc.com www. 
Appendix A: Placement of Information Architecture as a 
company’s strategy. 
Process Analysis – Human Workflows Page 13 of 13 
Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.

Mais conteúdo relacionado

Semelhante a Mapper

Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
wkyra78
 
Doorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letter
Doorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letterDoorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letter
Doorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letter
Darrel Rader
 
Sample_Data_and_Data_Modules
Sample_Data_and_Data_ModulesSample_Data_and_Data_Modules
Sample_Data_and_Data_Modules
Michael Cook
 

Semelhante a Mapper (20)

Why And Ontology Engine Drives The Point Cross Orchestra Engine
Why And Ontology Engine Drives The Point Cross Orchestra EngineWhy And Ontology Engine Drives The Point Cross Orchestra Engine
Why And Ontology Engine Drives The Point Cross Orchestra Engine
 
D3 data driven development in practice - the AirPortal for Schiphol and Tra...
D3   data driven development in practice - the AirPortal for Schiphol and Tra...D3   data driven development in practice - the AirPortal for Schiphol and Tra...
D3 data driven development in practice - the AirPortal for Schiphol and Tra...
 
Knolidge
KnolidgeKnolidge
Knolidge
 
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT ControlCloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
 
As You Seek – How Search Enables Big Data Analytics
As You Seek – How Search Enables Big Data AnalyticsAs You Seek – How Search Enables Big Data Analytics
As You Seek – How Search Enables Big Data Analytics
 
Ubiwhere Research and Innovation Profile
Ubiwhere Research and Innovation ProfileUbiwhere Research and Innovation Profile
Ubiwhere Research and Innovation Profile
 
Data virtualization an introduction
Data virtualization an introductionData virtualization an introduction
Data virtualization an introduction
 
Internet of Things - Enablement by Techcello
Internet of Things - Enablement by TechcelloInternet of Things - Enablement by Techcello
Internet of Things - Enablement by Techcello
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
 
Building the Architecture for Analytic Competition
Building the Architecture for Analytic CompetitionBuilding the Architecture for Analytic Competition
Building the Architecture for Analytic Competition
 
Watson data platform_sofia_20171017
Watson data platform_sofia_20171017Watson data platform_sofia_20171017
Watson data platform_sofia_20171017
 
White Paper: Cloud Computing for Law Firms
White Paper: Cloud Computing for Law FirmsWhite Paper: Cloud Computing for Law Firms
White Paper: Cloud Computing for Law Firms
 
O'Reilly ebook: Financial Governance for Data Processing in the Cloud | Qubole
O'Reilly ebook: Financial Governance for Data Processing in the Cloud | QuboleO'Reilly ebook: Financial Governance for Data Processing in the Cloud | Qubole
O'Reilly ebook: Financial Governance for Data Processing in the Cloud | Qubole
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Web engineering
Web engineeringWeb engineering
Web engineering
 
Machine-actionable Data Management Plans
Machine-actionable Data Management PlansMachine-actionable Data Management Plans
Machine-actionable Data Management Plans
 
Doorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letter
Doorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letterDoorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letter
Doorsng po t_core_workbook_sse_imagev3.3.1_v6moda_final_letter
 
Sample_Data_and_Data_Modules
Sample_Data_and_Data_ModulesSample_Data_and_Data_Modules
Sample_Data_and_Data_Modules
 
Microsoft .NET Portfolio
Microsoft .NET PortfolioMicrosoft .NET Portfolio
Microsoft .NET Portfolio
 
data-mesh-101.pptx
data-mesh-101.pptxdata-mesh-101.pptx
data-mesh-101.pptx
 

Mais de Allied Consultants

Mais de Allied Consultants (20)

Azure sentinal
Azure sentinalAzure sentinal
Azure sentinal
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
 
Azure DevOps
Azure DevOpsAzure DevOps
Azure DevOps
 
Hadoop Big Data Training (Part 1)
Hadoop Big Data Training (Part 1)Hadoop Big Data Training (Part 1)
Hadoop Big Data Training (Part 1)
 
Integration Practice: How to make BizTalk Practice more profitable?
Integration Practice: How to make BizTalk Practice more profitable?Integration Practice: How to make BizTalk Practice more profitable?
Integration Practice: How to make BizTalk Practice more profitable?
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use cases
 
Big Data Pilot Template
Big Data Pilot Template Big Data Pilot Template
Big Data Pilot Template
 
17 resources to become an IoT Pro
17 resources to become an IoT Pro17 resources to become an IoT Pro
17 resources to become an IoT Pro
 
Microsoft's view of the Internet of Things (IoT) by Imran Shafqat
Microsoft's view of the Internet of Things (IoT) by Imran ShafqatMicrosoft's view of the Internet of Things (IoT) by Imran Shafqat
Microsoft's view of the Internet of Things (IoT) by Imran Shafqat
 
Sales training for an IT consulting firm
Sales training for an IT consulting firmSales training for an IT consulting firm
Sales training for an IT consulting firm
 
Notes on BizTalk 2157 A training
Notes on BizTalk 2157 A trainingNotes on BizTalk 2157 A training
Notes on BizTalk 2157 A training
 
Sample BizTalk post-training project
Sample BizTalk post-training projectSample BizTalk post-training project
Sample BizTalk post-training project
 
Allied Consultants - Training on BizTalk orchestrations (2 of 2)
Allied Consultants - Training on BizTalk orchestrations (2 of 2)Allied Consultants - Training on BizTalk orchestrations (2 of 2)
Allied Consultants - Training on BizTalk orchestrations (2 of 2)
 
Allied Consultants - Training on BizTalk orchestrations (1 of 2)
Allied Consultants - Training on BizTalk orchestrations (1 of 2)Allied Consultants - Training on BizTalk orchestrations (1 of 2)
Allied Consultants - Training on BizTalk orchestrations (1 of 2)
 
Allied Consultants - SharePoint Practice Overview
Allied Consultants - SharePoint Practice OverviewAllied Consultants - SharePoint Practice Overview
Allied Consultants - SharePoint Practice Overview
 
Allied Consultants - Partnership Models
Allied Consultants - Partnership ModelsAllied Consultants - Partnership Models
Allied Consultants - Partnership Models
 
Allied Consultants - Mobile Development Services
Allied Consultants - Mobile Development ServicesAllied Consultants - Mobile Development Services
Allied Consultants - Mobile Development Services
 
Allied Consultants - Management Consulting Partnerships
Allied Consultants - Management Consulting PartnershipsAllied Consultants - Management Consulting Partnerships
Allied Consultants - Management Consulting Partnerships
 
Allied Consultants - Introduction
Allied Consultants - IntroductionAllied Consultants - Introduction
Allied Consultants - Introduction
 
Allied Consultants - Enterprise Application Integration
Allied Consultants - Enterprise Application IntegrationAllied Consultants - Enterprise Application Integration
Allied Consultants - Enterprise Application Integration
 

Último

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Mapper

  • 1. Data Analysis – BizTalk Mapper www.alliedc.com www. BizTalk Mapper Allied Consultants Stability: Dev | QA | Prod Author: Muhammad Omer Ref. Number: Confidentiality Statement ALL INFORMATION CONTAINED IN THIS DOCUMENT IS PROVIDED ON THE BASIS OF STRICT CONFIDENTIALITY AND IS GOVERNED BY THE AGREEMENTS BETWEEN THE TWO PARTIES. IT MUST NOT BE DISCLOSED IN WHOLE OR IN PART TO ANY OTHER PARTY AT ANY TIME WITHOUT THE PRIOR CONSENT AND AUTHORITY IN WRITING FROM ALLIED CONSULTANTS Process Analysis – Human Workflows Page 1 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 2. Data Analysis – BizTalk Mapper www.alliedc.com www. Document Version and Control Review History Name Date Version Control Version Date Change Summary Updated by Distribution Version Date Parties Process Analysis – Human Workflows Page 2 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 3. Data Analysis – BizTalk Mapper www.alliedc.com www. 1. Table of Contents 1. TABLE OF CONTENTS...........................................................................................................................3 2. IDEAS..........................................................................................................................................................4 3. OVERVIEW...............................................................................................................................................4 4. VOCABULARY.........................................................................................................................................5 4.1 PRODUCT SPECIFIC (BIZTALK).........................................................................................................5 4.2 GENERIC ACRONYMS AND TERMINOLOGY.........................................................................................5 5. ANALYSIS .................................................................................................................................................6 6. PATTERNS OF THE DOMAIN..............................................................................................................6 7. TASKS.........................................................................................................................................................7 PRODUCT SPECIFIC AREA.....................................................................................................................8 8. GOOD TO HAVE FEATURES IN THE PRODUCT............................................................................8 9. HOW TO:....................................................................................................................................................9 9.1 GET A SAMPLE RUNNING..................................................................................................................9 9.1.1 Comments on Sample:....................................................................................................................9 9.2 PERFORM LOGGING AND EXCEPTION HANDLING...............................................................................9 9.3 HOW TO DEPLOY IT AUTOMATICALLY...............................................................................................9 9.4 RUNNING MAPS FROM EXTERNAL APPLICATIONS................................................................................9 10. HOW IT WORKS .................................................................................................................................10 11. BEST PRACTICES................................................................................................................................10 12. USEFUL REFERENCES......................................................................................................................11 13. USEFUL TOOLS...................................................................................................................................11 14. COMMON PROBLEMS.......................................................................................................................11 15. TODO/ NOT COVERED......................................................................................................................12 APPENDIX A: PLACEMENT OF INFORMATION ARCHITECTURE AS A COMPANY’S STRATEGY..................................................................................................................................................13 Process Analysis – Human Workflows Page 3 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 4. Data Analysis – BizTalk Mapper www.alliedc.com www. 2. Ideas - Try and make a table out of every two pieces of information you feel are connected. This tends to bring structure to thought. - Imagine someone with no knowledge of your area is trying to become an expert by reading this document. This will serve as a reference for when you revisit this topic after a few months. - Separate documents if the area is too large to fit reasonably in a document. Too large a document is worse than one that is too small. - Design the document so that someone looking at the “Document Map” can browse to his required information easily. Use the outlining toolbar. - 3. Overview <<Mention which product areas you are covering in this document >> e.g. EDI, Flat files… Process Analysis – Human Workflows Page 4 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 5. Data Analysis – BizTalk Mapper www.alliedc.com www. 4. Vocabulary <<What should one say to sounds like an expert. i.e. talk the talk>> <<Fancy words you can think of>> 4.1 Product Specific (BizTalk) Term Context Description 4.2 Generic Acronyms and terminology Term Context Description Semantic Integration Dissonance Semantic Information Architecture Area of architecture dealing with the analysis and design of complicated information in EAI scenarios Data Semantics Semantics captures the formal meaning of data. It is achieved by mapping (or rationalizing) the data’s schema to the Information Model. Information Model A study of what exists in the enterprise. An ontology of the data. Process Analysis – Human Workflows Page 5 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 6. Data Analysis – BizTalk Mapper www.alliedc.com www. 5. Analysis - Turn data into information by explicitly capturing the meaning and context of each data element (Enterprise wide IT analysis) - Semantic information architecture – core principles: o Metadata – Know your data (Asset location, usage, origin, relationships to other asets, rules associated with it, ownership o Information Model – Know your business (See above) o Data semantics – Understand your data - Value preposition of Information Analysis includes (Higher quality BI [unambiguous, valid, and consistent], Business agility, and Lower/more predictable IT costs. - Analysis Methodology: o Gather requirements > Catalog Metadata > Construct Information Model > Map to Information Model (Rationalize) > Publish to relevant stakeholders > Utilize in ongoing projects o <Consider making a template Excel out of this> - 6. Patterns of the domain << Might want to go into how these are implemented. You might want to refer to a separate document for this >> Process Analysis – Human Workflows Page 6 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 7. Data Analysis – BizTalk Mapper www.alliedc.com www. 7. Tasks Task Name Input Document (Embed it if needed) Output (Sample if needed) Likelihood of occurrence Simple Mapping - Try to identify common tasks you think will be involved in a typical project in this area. - Task o Input required: Based on these the requirement gatherer will ensure he has all the information that is needed to perform this task. o Output of the task: Schema xsd…, orchestration odx… - Be explicit. Try to make templates for the input you require. A good template would be one which takes the minimum information from the user and derives the most from it. Process Analysis – Human Workflows Page 7 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 8. Data Analysis – BizTalk Mapper www.alliedc.com www. Product Specific Area 8. Good to have features in the Product Feature Description Grouping of Shapes Grouping of functoids in the map Connection between pages Ability to connect wires between pages of a map <<add columns if you like>> Process Analysis – Human Workflows Page 8 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 9. Data Analysis – BizTalk Mapper www.alliedc.com www. 9. How to: 9.1 Get a sample running 1. <SDK Sample is pretty good> 9.1.1 Comments on Sample: - Infopath sample is good for high level experience but hard to understand what is going on underneath. - Invocation through code helps more in terms of understand the underlying process 9.2 Perform Logging and Exception handling - Use the Testing Utility - Custom Functoids - Inline Functoids - XSLT?? - Possible Exceptions 9.3 How to deploy it automatically <<e.g. from a script or a setup wizard>> 9.4 Running maps from external applications Process Analysis – Human Workflows Page 9 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 10. Data Analysis – BizTalk Mapper www.alliedc.com www. 10. How it works - Maps run top to bottom (From the input schema), left to right (in terms of dependencies). - If a functoids output is connected to two nodes in a target schema, the functoids is executed TWICE! - Mapper is DOM based. Limit the size of the input documents - 11. Best Practices 1. Use the input template to gather requirements!!!!! 2. Try to identify independent sections in the mapping rules. Place each one in a separate tab page. This helps greatly in large maps. 3. Use the Custom scripting functoid’s “label” property to keep a name or signature of the method it is calling 4. Try to identify stages within the map. 5. Copy the rule description on top of any code that you write in a custom script. Process Analysis – Human Workflows Page 10 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 11. Data Analysis – BizTalk Mapper www.alliedc.com www. 12. Useful References Make sure you have the latest SDK and documentation from the MS website: Address Comments Semantic Information Architecture http://knowledgemanagement.ittoolbox.co m/pub/ZS050903.pdf Good article on the architectural significance of this work. 13. Useful Tools Tool name Useful For Download Link Rate it 14. Common Problems Symptoms Description Cause Resolution Moving shapes is dangerous as it is very easy to get OOTB functoids error How is that done? handling Input = Repeating node but one record sent. Output = single node… any functoids connecting the two are called twice, once with correct parameters once with “”!! Process Analysis – Human Workflows Page 11 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 12. Data Analysis – BizTalk Mapper www.alliedc.com www. 15. TODO/ Not covered <<Areas that should be explored to understand the area completely but are not covered in the document>> Area Reason for not covering it Process Analysis – Human Workflows Page 12 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.
  • 13. Data Analysis – BizTalk Mapper www.alliedc.com www. Appendix A: Placement of Information Architecture as a company’s strategy. Process Analysis – Human Workflows Page 13 of 13 Copyright ã Allied Consultants, 2014 All rights reserved. Proprietary and Confidential.