Skip to main content

OAGI (Open Applications Group, Inc.)


OAGI stands for Open Applications Group, Inc. was founded in 1994 placed at Marietta, Georgia. The Open Applications Group Inc. is a nonprofit consortium of software vendors and businesses created to develop and define XML based interoperability specifications and standards among enterprise scale applications. It was formed by a small number of business enterprise software companies and organizations and has grown to more than sixty members companies. Its members have created a framework for business software application interoperability and have developed a repeatable process for quickly developing high quality business content and it’s XML representations.
OAGI


OAGI had focused on building reusable, interoperable XML messages. It had created the XML message methodology on which STAR standards, called BODs (Business Object Documents) are based on. Open Applications Group had released OAGIS Version 8.0 Using Core XML Technologies. 

Mission of OAGI  :

            Reduce the cost of integration by developing inter-operable, cross-functional, cross-industry, data-model-driven, and extensible standards to meet the challenge of a rapidly-changing global digital economy.
- Jim Wilson, CEO (Open Applications Group Inc.)


Comments

Popular posts from this blog

Atanasoff - Berry Computer ( ABC )

The Atanasoff – Berry Computer (ABC)   was the first electronic computer, designed and built by Lowa State College Mathematics and Physics professor John Vincent Atanasoff and his assistant, Clifford E. Berry ( a graduate student) . They worked in the basement of the physics building at Lowa State College on the computer from 1939 until 1942 when it was abandoned due to World War II . Unfortunately, after being abandoned , it was neglected and eventually disassembled for parts. In 1994, a team from Lowa state University began to rebuild the computer, finishing it in 1997. The system weighed more than seven hundred pounds (320 kg). It contained approximately 1-mile (1.6 km) of wire, 280 dual-triode vacuum tubes, 31  thyratrons , and was about the size of a desk.  The idea behind the ABC were later used in the construction of the ENIAC, the world’s first general purpose computer. Purpose / Working ABC was designed only to solve systems of  l...

Integrated Injection Logic (I2L)

Integrated Injection Logic (I2L) was disclosed in 1972 at International Solid State Circuits Conference by C. M. Hart and A. Slob of Philips, The Netherlands, and by H. H. Berger and S. K. Wiedmann of IBM, West Germany simultaneously. The basic logic unit is a multiple output inverter which is physically realized as a conventional npn multi-emitter transistor operated in the inverse mode. Base drive to the npn inverters is supplied by multicollector lateral pnp current source transistors. The emitter of the pnp transistor is referred to as the injector, and a single injector distributes base drive to many npn logic units. The outputs of I2L units may be " wire AND " with outputs from other units for NAND implementation of logic functions. I2L is a bipolar LSI circuit technique which achieves high packing density and good power-delay efficiency using conventional bipolar processing. It uses the properties of ion implantation to achieve improved performance ca...

Virus

Virus  A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting or destroying them. Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it across every folder and damage the data of your computer system. A computer virus is a malicious software program or "malware" which, when infecting your system, replicates itself by modifying other computer programs and inserting its own code. Types Of Virus :- File Infector Virus Multipartite Virus Resident Virus Boot Virus Macro Viruss Overwrite Virus Web Scripting Virus Impact of Virus :- Disrupts the normal functionality of respective computer system. Disrupts system network use. Modifies configuration setting of the system. Destructs data. Disrupts computer network resources. Destructs of confidential data. Infected computer programs may include data files, or even the "boot" sector of the hard dr...