A pessimistic approach towards SOA seems to prevail in some blogs. But these opinions strike me by surprise. In the industries I am working for - public sector, healthcare and Defense/ public security - SOA is predominant and you will find only rare examples of tenders where SOA is not highlighted as the guiding principle for the whole architecture. SAP's CTO Vishal Sikka has already provided the community with some very helpful insights concerning these discussions.
I just want to add some points from an architect's point of view:
From my point of view it is not the SOA approach itself which should be questioned but the way how we architects sometimes work on SOA. Some of the mistakes that are listed below I have encountered during my SOA projects. Others are based on discussions with other architects and decision makers inside and outside SAP, from customers and from partners. My intention is simple: I want to help to avoid these mistakes in the future and to strengthen the SOA approach which is for me without an alternative.
http://www.manageit.me ---The greatest minds in IT in 50+ presentations : top industry-leaders: Creator of MySQL Michael "Monty" Widenius, Internet Celebrity Gary Vaynerchuk, Co-Creator of PHP & Zend CTO Zeev Suraski, Richard Sheridan, CEO of Menlo Innovations & Pioneer of Agile eXtreme Programmi...
When people were managing the educational institutions earlier, things were based on manual support. Manpower was so strong that time that everything was managed well by the human labor. In the schools and collages where students come in bulk, data related to them were all managed by the HR department.
"The Unified Modeling Language (UML) has quickly become the de-facto standard for building Object-Oriented software. This tutorial provides a technical overview of the 13 UML diagrams supported by Enterprise Architect. UML 2 semantics are explained in detail in the new UML 2.0 tutorial. "
'Just one application and you are sorted', access control management is an important aspect while one is dealing with confidential information or document where maintaining confidentiality is a major concern. An access control system checks the authorization of the individuals in order to give the right to access a specific area or resources. A newer invention is in the field of biometrics to enhance the security to a greater extent.
Biometrics is in existence from very early times. Fingerprints were used as a non-counterfeited mark since 500 BC. Babylonian merchants used it to straighten out business transactions. The undertakings were recorded in clay tablets that also contained fingerprints. Footprints were also used to distinguish children. Early Egyptians differentiated between traders by their physical attributes. Inked fingerprints of children were taken for identification purpose by Chinese merchants during the 14th century.
Face Recognition Time Attendance is a fully customized biometric time attendance system by Face Recognition Solution. It can be utilize at different premises like in corporate, hospitals, education institutes etc. It helps in recording the timing data of the individuals that might be used for arranging different shifts timings, leave calculations, arrival and departure time, late comers and the workers doing over time.
Many companies become lax during summer hours, but some real innovators hunker down in the heat and create products that can make business easier in the future. One such company is Newton Software.
Why is there this great push to run XP apps in W7 XPmode when all apps run fine in XP... Just say "no" to W7 and Vista til there is some important app that won't run in XP !
The Model View ViewModel (MVVM) is an architectural pattern used in software engineering that originated from Microsoft as a specialization of the Presentation Model design pattern