Products

 

Assembling Composite Applications using
Web services
Download the Product Overview
Sign Up for a Free Product Evaluation

Architecture

Above All Studio decreases the time and cost required to develop new solutions. Visual tools, simplified models of available software services and a repository-based architecture make it easy for users to identify available services and then put those services to use solving business problems. The Above All suite offers the following capabilities:

Wizard-driven application assembly. Wizards guide users through the process of building composite applications. Users select object types and operations in the Application Dictionary baseline user interfaces are automatically created using specified style sheets appropriate for the task. Using join and merge capabilities, Above All Studio relates together disparate services to create a complete business solution. If needed, the user interface can then be tailored with a familiar palette of form designer tools. For particularly advanced needs, users can employ Above All Studio's scripting capability.

Model Your Web Services. To help disparate applications easily work together, Above All provides visual tools to capture and refine the interoperability properties of your Web and other software services, including the relationships between services. In addition, low level services can be abstracted into more useful higher level services. These working “models” of existing resources facilitate the rapid assembly of composite applications.

Repository-based. The Application Dictionary is a repository that stores the meta data about the cataloged software services making them easy to find, use and share. The Application Dictionary also stores the composite applications created and used through Above All Studio. These repositories can be shared or private and exist locally or be server-based.

Security and deployment. The resulting composite applications can be saved for either private or shared use. Above All composite applications respect the security employed by the source information resources and Above All manages user authentication and credentials; access to available composite applications is based on role permissions. Users access the deployed applications through Microsoft Internet Explorer or Above All Runner.

Contact Us | Legal Terms | Privacy

Copyright © 2003-4 Above All Software, Inc. All Rights Reserved