Search
  Advanced Search
Results
Total: 53 results found.
Refine your search by section:  Content (51)  Tags (1)  Menus (1)
Order by
  
Display
Conclusion: To be successful at an enterprise level, SOA (service oriented architecture) requires a backbone to provide integration between applications, transport of events messages and data, and manage deployment and (optionally) discovery of applications. The deployment of an Enterprise Service Buss (ESB) is essential for enterprise SOA, yet no single ...
Section: Content | Category: Applications | Date: Tuesday, 30 December 2008 | Hits: 561
... and if deep knowledge about the business is used to develop elegant, compact, and tailored specification languages for domain knowledge. This article is the final in a series of three on technologies and techniques that are leading to fundamental changes in the architectures used to construct software applications and software intensive devices. Observations: The ...
Section: Content | Category: Applications | Date: Wednesday, 28 May 2008 | Hits: 451
Conclusion: Over the last 10 years the IT applications and infrastructure in many organisations has rapidly evolved forcing IT departments to implement a variety of new technologies. In many cases this has resulted in technology silos that are complex, difficult to maintain and costly to extend. To support the business through the next 10 years, IT ...
Section: Content | Category: Infrastructure | Date: Sunday, 28 January 2007 | Hits: 522
Conclusion: Voice over IP is having, and will continue to have, a significant impact on the telephony and PBX market. Telephony is becoming increasingly software based and is taking advantage of software-related economics. The popularity of services such as Skype1 and Babble2, and Session Initiation Protocol (SIP)3, 4 VoIP applications demonstrates ...
Section: Content | Category: Infrastructure | Date: Wednesday, 28 March 2007 | Hits: 345
Conclusion: Microsoft’s launch of Silverlight is premature. Yet even in its infancy and lack of integration with Microsoft’s product sets, Silverlight is an impressive technology. Development teams with .Net skills that are looking to port existing rich client applications to thin clients, or deploy mobile front-ends to existing applications, should ...
Section: Content | Category: Applications | Date: Monday, 28 May 2007 | Hits: 420
... services are misaligned with business objectives, they will hinder, not aid, productivity. Having a model to categorise different forms – or modes – of collaboration is an important first-step in accurately matching technologies to different collaborative applications. Observations: As a term, collaboration is used in an overly broad sense by the ...
Section: Content | Category: Applications | Date: Friday, 28 September 2007 | Hits: 474
... applications. Yet, if the right steps are taken, a reduced IT budget provides the ideal opportunity for decommissioning cost ineffective legacy systems and for refocusing attention on those applications that really matter. Observations: It is fairly common to allocate budgets to specific IT projects based on the needs and priorities articulated ...
Section: Content | Category: Governance & Planning | Date: Saturday, 29 November 2008 | Hits: 482
Conclusion: Lack of involvement of business unit management in IT has been found to be one of the main contributors to the difficulties that can arise in the IT/ business relationship. There are however a number of initiatives that can be instituted, particularly in Applications Development and Project Management, which have been found to have a very ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 28 March 2007 | Hits: 322
Conclusion: Both black lists and white lists are effective security measures, but these two approaches are opposites and therefore, have different issues and applications. If only a few items need to be forbidden, then a black list is adequate. But if only a few items need to be permitted, then a white list is the efficient way to enforce policy. When ...
Section: Content | Category: Security Leadership | Date: Monday, 28 January 2008 | Hits: 514
... hasty, inappropriate decisions but must be approached in the manner of any software applications system implementation, with the appropriate governance and management. Conclusion: It may seem that recognition of the risks associated with a reliance on legacy application software systems and the need to migrate these systems should be obvious ...
Section: Content | Category: Governance & Planning | Date: Monday, 28 January 2008 | Hits: 380