Java Reference
In-Depth Information
▪ Policies
▪ Registry
▪ Repository
▪ Interoperability
▪ Service identification and creation
▪ Infrastructure such as hardware and networking software
You don't need to address each of these items fully in every iteration. For example, you might
choose to make your first services for internal use only, behind the firewall, therefore taking
certain security measures out of scope so that you can focus initially on the core service cre-
ation and management.
Search WWH ::




Custom Search