X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 information architecture


Architecture-Centered Information Systems In The Manufacturing Domain - Part II - The Architecture Process
Architecture bridges the semantic gap between the requirements and software. Application software systems must be architected in order to deal with the current

information architecture  Centered Information Systems In The Manufacturing Domain - Part II - The Architecture Process Glen B. Alleman is associated with Niwot Ridge Consulting, www.niwotridge.com About This Note: This note is presented in five parts as follows: Introduction to Software Architecture The Architecture Process Steps in the Architecture Process Moving from Planning to Implementation Applying the Methodology Part II - The Architecture Process The selection of a specific methodology for capturing, defining,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » information architecture

How Many Napkins Have to Die Needlessly? A Case for Business Architecture


Architecture is a description of how things go together. Once we know what our Business Architecture is, we can design an Information Technology Architecture to compliment it. Without a clearly stated architecture, there is a good chance that things will be put together wrong.

information architecture   Read More

Architecture Evolution: From Mainframes to Service-oriented Architecture


Product architecture is going to do much more than simply provide the technical functionality, the user interface, and the platform support. It is going to determine whether a product is going to be able to accommodate increasingly evolving user requirements.

information architecture   Read More

Architecture Evolution: Service-oriented Architecture versus Web Services


Collaboration and interoperability are critical where multiple business units reside under one larger corporation, or where there is a requirement to integrate the system into a disparate system when a business-to-business or business-to-consumer extension is part of the business model.

information architecture   Read More

Architecture Evolution: From Web-based to Service-oriented Architecture


Traditional enterprise systems have proven difficult to change and extend. The inherent problem of old core code and business logic duplication is part of the reason traditional enterprise resource planning systems have not readily taken to e-commerce.

information architecture   Read More

Data, Data Everywhere: A Special Report on Managing Information


The quantity of information in the world is soaring. Merely keeping up with, and storing new information is difficult enough. Analyzing it, to spot patterns and extract useful information, is harder still. Even so, this data deluge has great potential for good—as long as consumers, companies, and governments make the right choices about when to restrict the flow of data, and when to encourage it. Find out more.

information architecture   Read More

Establishing Enterprise Architecture Governance


This article discusses the issues around implementing architecture governance, and what constitutes viable approaches to establishing effective governance processes.

information architecture   Read More

Endeca Information Discovery


Oracle business intelligence (BI) tools and technology provide a broad set of capabilities for reporting, analysis, modeling, and forecasting. The Oracle solution makes BI actionable by providing business users the ability to initiate actions directly from their dashboards.Oracle Endeca Information Discovery is an enterprise data discovery platform for advanced, intuitive exploration and analysis of complex and varied data—whether structured, semi-structured, or unstructured.

information architecture   Read More

Cerulean Information Technology


Located in India, Ceruleaninfotech is an ISO 9001:2000 company co-founded in 2000 by a team of professionals with more than eighty years of work experience with Citibank, Merrill Lynch, Hewlett Packard, and Timex. The company specializes in web technologies and their solutions are used in mission critical applications by marquee clients like Citibank, Honeywell, SIFY, and Onmobile. They also work on application development and outsourced product development for small and medium sized clients in the United States, Europe, and Australia.

information architecture   Read More

Information Management and Collaboration


Information management systems facilitate the management of internal corporate documentation and information, Web site content, group collaboration, and learning materials. These systems are built as central repositories that hold content, metadata, accessibility and workflow rules, and supporting information. Organizations that establish processes and disciplines around these systems can ensure smooth and efficient acquisition, maintenance, delivery, and archiving of corporate content resources.

information architecture   Read More

Information Protection Assessment Framework


The worst part of investing in any security system from employee vetting, premises security or data security is that you don’t know if your investment is worth anything until it’s too late. IP Sentinel has developed a four-stage process against which you can judge your capabilities in terms of information protection, as well as a checklist so that you can test your own company’s intellectually property protection and information security preparedness.

information architecture   Read More