Skip to main content

Home/ Groups/ IT architecture
1More

Microsoft typographic symbols - 3 views

  •  
    Architecture symbols IT microsoft
1More

DyA - Frameworks and standards - 1 views

  •  
    Main architectural frameworks and standards short description
1More

Worldwide Institute of Software Architects - Discussion Groups - 1 views

  •  
    Non Profit association. Discussion boards. Links and tools. Description of architects role for architects and their customers
1More

YouTube - Architecture - 3 views

  •  
    Architecture definition in 1m25
1More

Federated Identity: Scenarios, Architecture, and Implementation - 2 views

  •  
    "Federated Identity: Scenarios, Architecture, and Implementation"
1More

IT architecture IBM patterns - 0 views

  •  
    IT architecture patterns. Redbook from IBM describing a lot of IT architecture patterns including network, security, proxies, integration services.
1More

it architecture best practices - 0 views

  •  
    it architecture best practices
1More

NIH Enterprise Architecture - Technology Architecture - 3 views

  •  
    Resources for architects library, strategy, technology and architecture.
1More

Just one system and complete control on accessing the resources! - 1 views

  •  
    'Just one application and you are sorted', access control management is an important aspect while one is dealing with confidential information or document where maintaining confidentiality is a major concern. An access control system checks the authorization of the individuals in order to give the right to access a specific area or resources. A newer invention is in the field of biometrics to enhance the security to a greater extent.
1More

Architecture template example - 1 views

  •  
    Architecture template example from HP
1More

NIH Enterprise Architecture - Active Directory Pattern - 3 views

  •  
    Architecture representation active directory
1More

Know More about Face Recognition System & Feel Comfortable! - 1 views

  •  
    Today biometric systems are being used at a wider extent. While talking regarding biometrics, it is not only considering about the fingerprint reader but also the face recognition systems.
1More

Enterprise Architecture Links, Institute For Enterprise Architecture Developments (IFEAD) - 1 views

  •  
    (Enterprise) Architecture Links & References
1More

CAS | Jasig Community - 1 views

  •  
    "Central Authentication Service project, more commonly referred to as CAS. CAS is an authentication system originally created by Yale University"
1More

Biometric Face Recognition Time Attendance: Company Expenses Reduced - 1 views

  •  
    Management is the backbone of any company. No company can survive for long with a weak management. If the employees of the company are the gems on a crown, management is the diamond studded at the center. Cost management is an important part of it.
1More

Gartner Identifies New Approach for Enterprise Architecture - 1 views

  •  
    "The first key characteristic of the emergent approach is best summarised as 'architect the lines, not the boxes', which means managing the connections between different parts of the business rather than the actual parts of the business themselves," said Bruce Robertson, research vice president at Gartner. "The second key characteristic is that it models all relationships as interactions via some set of interfaces, which can be completely informal and manual - for example, sending handwritten invitations to a party via postal letters - to highly formal and automated, such as credit-card transactions across the Visa network."
1More

Forget the Conventional Lock and Key and Shift to Biometric Access Control - 1 views

  •  
    Are you among the people who lock your door with a hard metal lock and carry the key with you? You constantly worry whether it is still with you or not! If a legitimate element wants to enter the premise, they will have to wait until you return. Hassles involved in this traditional door lock system are immense.
1More

Visitor Management System enhances Safety from Strangers - 1 views

  •  
    Do you know that your fellow visitor's visiting at your place can also be dangerous under various circumstances! So, you should be alerted in any case. But the question is 'how'? How can you protect your premises from unwanted visitors? Are you sure that the place where you are living or working is fully protected? Well!
1More

TOGAF 8 "Enterprise Edition" - 1 views

  •  
    TOGAF, The Open Group Architecture Framework, is an industry standard architecture framework that may be used freely by any organization wishing to develop an information systems architecture for use within that organization.
1 - 20 Next › Last »
Showing 20 items per page