Log in


Conclusion: When designing a service-oriented architecture it is essential to provide a mechanism for connecting services from different sources. Enterprise Service Bus (ESB) technologies add value when the systems involved don’t make use of shared data formats and communication protocols.

The market now includes a number of mature open source ESB technologies. Selecting the most appropriate option involves looking beyond the technologies and understanding the factors that influence the quality of a service oriented architecture.

Conclusion: Given the hype around the interactive aspects of Web 2.0 and the continuing popularity of Business Process X – with X being any element of the set {Management, Modelling, Analysis, Re-engineering, Integration} – the role of artefacts in enterprise collaboration and in value chains is easily neglected. If an organisation looks beyond the hype and invests in a comprehensive and accurate model of artefact production and consumption, the result is an understanding of business processes and value chains that is much more useful than the average business process model.

Conclusion: Software vendor Zoho is pinning its growth on the rapid adoption of cloud services with the aim of being the IT department for SMEs. This business strategy might seem overly optimistic as its potential success may even be partly dependent on Microsoft. According to Zoho, the status of Microsoft in delivering products online is an implicit approval of the delivery and use of software by smaller vendors.

Conclusion: With the exception of an improved web browser, Windows 6.5 offers organisations little benefit over Windows 6.1, and developers will find accessing the iPhone-like features cumbersome. Organisations with Microsoft-based mobility initiatives should either ignore 6.5 and wait for Mobile 7, or expand support of alternative mobile platforms.

Conclusion: Automated software and system testing will never be the testing silver bullet. One of its components though, the automated generation of test data, is one of the powerful weapons in the software testing arsenal1 and its deployment can provide a strategic advantage in the testing battle. The key is when and how to automate test data generation and which of its features are most effective when deployed. Two of its most useful benefits are reducing risks by protecting personal details and lowering costs by significantly reducing the numbers of tests required.

Conclusion: User interface design, implementation, and validation can easily turn out to be the most expensive part of application development, sometimes consuming over 50% of the overall project budget. This does not have to be the case. If user interface and usability requirements are specified at the appropriate level of abstraction, the required design and implementation effort can be reduced by an order of magnitude, whilst consistency and usability of the resulting application is greatly improved.

Conclusion: Any successful software testing regime uses a judicious mix of manual and automated testing. Manual testing is best in those areas that need spontaneity and creativity. Automated testing lends itself to explicit and repetitive testing and to scenario, performance, load and stress testing. While not all tests can be automated, given good tools there is no reason why much testing and test data generation and test management cannot be automated.

Conclusion:Cloud computing is promoted as the next disruptive technology in the organisational use of IT. If this does happen, no matter what else changes there are some verities which must not change, in particular meeting legal requirements. There are at least seven areas where a move to cloud computing should not be contemplated unless the legal requirements can be demonstrably satisfied.

Conclusion: Google Apps' products are developing rapidly. These developments range from the large and significant, to the small minor adjustments. Google has increased its pace of development, and enterprise users will want to gain a strategic view of how the Apps mature in the next two years.

Google Apps' driving force, Rajen Sheth defines the corporation's main ambitions in two areas: to improve functionality, perhaps in ways that have not been considered by users, and to redefine enterprise messaging and collaboration. Whether they can achieve such ambitions is not foreseeable but they will offer many new tools and enhancements to reach that objective.

Some commentators have been sceptical about Google''s intentions with the Chrome OS. Is it a mere distraction? Why has Google bothered?Is Chrome part of a broader plan? As a former CIO, Chrome appears to me as just one element in a complete armoury of products Google is developing, all aimed at the CIO heartland.

In the News

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry


Already a subscriber?

Login to read your premium content.

Recently Viewed Articles