Skip to main content

Home/ IT architecture/ Group items tagged information

Rss Feed Group items tagged

Marc Queval

Information Architecture Institute > Learning IA - Information Architecture Institute - 1 views

  •  
    Information Architecture Institute's Tools
Marc Queval

Information Architecture Institute > IA Network - Information Architecture Institute - 0 views

  •  
    The Information Architecture Institute is a growing network of active IA specialists. The main goal of our online IA Network is to provide IAs worldwide the opportunity to find local IA networks, meet other IAs, share knowledge and collaborate on projects that move our industry forward.
Marc Queval

A Periodic Table of Visualization Methods - 0 views

  •  
    How to represent data, information, concepts, strategy... A complete list of views with good examples.
Manish Shah

Just one system and complete control on accessing the resources! - 1 views

  •  
    'Just one application and you are sorted', access control management is an important aspect while one is dealing with confidential information or document where maintaining confidentiality is a major concern. An access control system checks the authorization of the individuals in order to give the right to access a specific area or resources. A newer invention is in the field of biometrics to enhance the security to a greater extent.
Manish Shah

Face recognition system in Ahmedabad, Gujarat - 0 views

  •  
    Face Recognition System is an advance biometric security technology which uses face as unique verification information. It has wide range of operating environment from individual home environment to most common public places. Face Recognition has many applications like Time Attendance System, Access Control and Visitor Management System.
John Pol

Why to Buy Online Data Back Up Services - 0 views

  •  
    Whether you use your computer for personal or business use, your data loss can be extremely disastrous in whatever way. Your information is something that you need to keep secure! This is the reason why you should avail regular data backup!
Marc Queval

Architecture Principles - 0 views

  •  
    Principles are general rules and guidelines, intended to be enduring and seldom amended, that inform and support the way in which an organization sets about fulfilling its mission.
Marc Queval

TOGAF 8 "Enterprise Edition" - 1 views

  •  
    TOGAF, The Open Group Architecture Framework, is an industry standard architecture framework that may be used freely by any organization wishing to develop an information systems architecture for use within that organization.
anonymous

Top 5 Green IT Companies « Green Network Hardware - 0 views

  •  
    I'd like to point out some of the eco-friendly 'do-gooders' in the IT sector: information technology and computer hardware companies across the country that are helping to alleviate our global climate crisis. Some of these tech companies are building cutting edge green data centers, constructing next-generation energy smart grids and implementing hyper-efficient recycling programs.
anonymous

The Evolving Router - 0 views

  •  
    Today, the router may no longer simply be a piece of network hardware that routes packets of information from one location to another.
anonymous

The Word As We Knew It - 0 views

  •  
    The internet and it's unique ability to rapidly share information across the planet has created a sort of 'hot-bed' for the evolution of language. New phrases, words, acronyms and slangs have been given the ability to virally evolve and disseminate to new populations within a matter of days. Definitions are born, morph, and die based on the evolving collective consciousness of humanity.
Manish Shah

Face Recognition - An Identification Technique | A Security Article - 0 views

  •  
    Face Recognition is an advance biometric security technology which uses face as unique verification information. It has wide range of operating environment from individual home environment to most common public places.
Manish Shah

Face Recognition Systems - An Advanced Security Solution - 0 views

  •  
    Face Recognition is an advance biometric security technology which uses face as unique verification information. It has wide range of operating environment from individual home environment to most common public places.
EITAGlobal IT Training

What does an effective Enterprise Architecture Program look like when implemented? - 1 views

  •  
    Today's Business/IT Environment for medium and large corporations can often be characterized as: An IT environment that is highly complex & costly - organizations were spending more and more money extending, enhancing, and maintaining existing IT systems and services Ineffective business alignment - organizations were finding it more and more difficult to keep their increasingly expensive IT systems aligned with business needs and drive the level of innovation required to grow the business
  •  
    An effective Enterprise Architecture (EA) Program can deliver significant benefits to an organization including: Reduced cost to maintain existing IT systems by reducing the number of technologies in operation (lower the cost of maintenance and training) as well as increasing the utilization of IT assets Reduced time to bring new business products/services to the market by enabling the re-use of Business and IT services Increased effectiveness of IT resources (capacity planning, solution teams) including increased efficiency of operation (design for change) Increased effectiveness of Business resources by providing information and support for decision making (triggers points) and enabling impact analysis (reduce technology risk) Reduce the all-to-often "firedrills" that divert focus from business imperatives
Marc Queval

architecture - whitepapers, resources, and information - 0 views

  •  
    IT architecture whitepapers. Powerpoint and pdf presentations.
netsec

Amazon.com: A New Host-Based Hybrid IDS Architecture - A Mind Of Its Own: The Know-how ... - 0 views

  •  
    Amazon.com: A New Host-Based Hybrid IDS Architecture - A Mind Of Its Own: The Know-how Of Host-Based Hybrid Intrusion Detection System Architecture Using Machine Learning Algorithms With Feature Selection (9783639172881): Murat Topallar: Books
Marc Queval

Gartner Identifies New Approach for Enterprise Architecture - 1 views

  •  
    "The first key characteristic of the emergent approach is best summarised as 'architect the lines, not the boxes', which means managing the connections between different parts of the business rather than the actual parts of the business themselves," said Bruce Robertson, research vice president at Gartner. "The second key characteristic is that it models all relationships as interactions via some set of interfaces, which can be completely informal and manual - for example, sending handwritten invitations to a party via postal letters - to highly formal and automated, such as credit-card transactions across the Visa network."
1 - 20 of 21 Next ›
Showing 20 items per page