Search
  Advanced Search
Results
Total: 53 results found.
Refine your search by section:  Content (51)  Tags (1)  Menus (1)
Order by
  
Display
... “all things to all people”. According to the Wikipedia, “Web 2.0 is a term often applied to a perceived ongoing transition of the World Wide Web from a collection of websites to a full-fledged computing platform serving web applications to end users.” The essential characteristics of the Web 2.0 are: The web as an application platform delivered ...
Section: Content | Category: Infrastructure | Date: Saturday, 28 April 2007 | Hits: 390
In recent years, microprocessor vendors have begun designing chips with more than one processing unit, or "core," on the chip in an effort to boost performance for certain types of applications. As far as the software running on the systems is concerned, dual-core chips appear to be two separate processors, raising the question of whether or not they ...
Section: Content | Category: All | Date: Friday, 29 October 2004 | Hits: 295
... networks but now that challenge is no longer a problem. Various types of handsets and choices of networks for reliability and speed mean it is possible to deliver data and media services at economically affordable prices. The outstanding issues remain the evolution of business models and applications to markets. IT executives can and should be involved ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 28 February 2007 | Hits: 397
... as discrete and measurable elements. 1 However, this does not mean that PEDs have no role to play in modern enterprises. IBRS proposes that organisations consider the benefits of PEDs via an appraisal model aimed at identifying individuals and applications with a need for greater communication and collaboration. One such model is working spheres. Observations: ...
Section: Content | Category: Applications | Date: Thursday, 28 August 2008 | Hits: 625
Conclusion: Effective ICT architectures allow organisations to become smart buyers of applications and infrastructure; and, ensure that technologies work together in a cohesive and effective way. Attempting an ICT strategic planning project without an effective architecture carries three major risks. The planning team will struggle to turn business ...
Section: Content | Category: Governance & Planning | Date: Monday, 28 June 2004 | Hits: 410
... enable the consolidation of non-production systems (i.e. dev/test/QA), progressing to consolidating smaller non-mission critical production applications and finally creating a virtual server infrastructure that simplifies and enables load-balancing, high-availability and disaster recovery. A well executed server virtualisation strategy will reduce complexity ...
Section: Content | Category: Infrastructure | Date: Monday, 28 November 2005 | Hits: 629
Conclusion: Historically, operating systems and applications were the richest source of software vulnerabilities for attackers to exploit, but the problem organisations are now facing is that web browsers and plug-ins are being targeted; and this is a trend that will only increase in the near future. Internet-facing browsers are effectively part of ...
Section: Content | Category: Security Leadership | Date: Friday, 31 October 2008 | Hits: 497
... building of formalised software applications on devices that use the Microsoft Pocket PC operating system. These applications can be developed, documented, deployed and supported efficiently across the organisation in the same way as other, more complex enterprise computer applications. In the past such systems have generally been built in a somewhat ...
Section: Content | Category: Applications | Date: Wednesday, 31 December 2003 | Hits: 393
Conclusion: BPM solutions essentially separate the business logic and activity flow from transaction management. The latest generation of software applications operate through two key components, which are: A relational database management system which stores and manages an organisation's business rules and provides an integrated orchestration ...
Section: Content | Category: Governance & Planning | Date: Monday, 28 February 2005 | Hits: 384
The challenges facing the CIOs of midsize businesses are not expected to become easier. Continuing requirements to support the growth of their businesses by adding new offices, new applications and more staff mean that they have to increase the capabilities of the IT, probably without the benefit of increased staff and budgets. They will also have ...
Section: Content | Category: Governance & Planning | Date: Friday, 31 December 2004 | Hits: 336