Home
Business Guide
 
simplicable technology guide   »  enterprise architecture   »  data architecture   »  how to caculate the value of data   »  ask the architect

Ask the Architect


There's quite a bit of confusion about three common content management acronyms: CMS, WCM, ECM. Here's what you need to know to get above the confusion.



Yes and no. There's no ITIL certification process offered by ITIL itself. However, an organization that's reached ITIL maturity can generally be ISO 20000 certified.

Yes, architect is a verb. Some dictionaries list it as a verb and others do not. The ones that don't haven't caught up with the modern usage of the word architect.

It seems like IT people are always talking about services.

Enterprise Resource Planning (ERP) are large systems that solve a wide range of business problems.

The term legacy system is sometimes used inaccurately. There are 8 things that make a system "legacy".

Enterprises tend to over-engineer integration. On the internet things evolved differently.

Despite best efforts — it's simply ineffective to display data on a two dimensional static page.

Information Architect (IA) is a widely misunderstood profession. Some think of Information Architects as glorified Web Designers. Others think of IAs as database designers. Still others consider them to be library scientists.

The internet is an agile, interoperable and scalable service-oriented environment. Web Oriented Architecture seeks to leverage internet design principles for the Enterprise.


What is security trying to achieve?

A digital signature embedded in information that can be tied to a source such as an individual or an IP address.

Enterprise Software

Our collection of SOA architecture resources and tools.


Recently on Simplicable


What Enterprise Feedback Management Really Means

posted by Anna Mar
Industrial strength survey tools.

Big Data Guide

posted by John Spacey
A guide to big data including an overview of key technologies.

Cloud Guide

posted by John Spacey
A guide to cloud computing including cheat sheets, best practices and metrics.

Web Security: Battleships and Locusts

posted by Anna Mar
There are two types of web security threats: battleships and locusts.

about     contact     sitemap     privacy     terms of service     copyright