Enterprise architecture is the practice that tries to describe and control an organisation’s structure, processes, applications, systems, and technology in an integrated way.
Tag: ERP
Enterprise Architecture Model
An architecture model is not just useful to provide insight into the current or future situation; it can also be used to evaluate the transition from ‘as is’ to ‘to be’.
Enterprise Architecture is the structure and the operational blueprint of a company.
Archimate
Archimate enables the creation of fully integrated models of an organizations enterprise architecture, the motivation behind it, and the programs, projects and migration paths to implement it.
2013 blogs in review
The WordPress.com stats helper monkeys prepared a 2013 annual report for this blog. Here’s an excerpt: The concert hall at the Sydney Opera House holds 2,700 people. This blog was viewed about 51,000 times in 2013. If it were a concert at Sydney Opera House, it would take about 19 sold-out performances for that many […]
Drupal 7 theme – Mobile boilerplate
Mobile Boilerplate is a professional front-end template that helps you build fast and robust mobile web applications. Spend more time developing and less time reinventing the wheel. Features Mobile browser optimizations. CSS normalizations and common bug fixes. A custom Modernizr build for feature detection and a polyfill for CSS Media Queries. Home page icon for […]
A passage to Goa: a generation and more later…
Source : This is a translation of an article “Passagem para a India” that was published on the magazine section of O Expresso of December 8, 2001. It was translated by Gabriel Figueiredo gdefigueiredo yahoo.com.au, and reproduced here with his permission. It tells the story from a Portuguese perspective … — Commencing at 0:00 hours […]
Hardening Procedure for Solaris Systems
DOWNLOAD – Hardening Procedure for Solaris Systems Procedure Statement The hardening policies are defined as follows: Database server hardening procedure. Web server hardening procedure Application server hardening procedure Utility server hardening procedure On every case, 4 security components are involved: JASS BSM RSA Tripwire In those cases where Solaris Containers are implemented, the […]
Risk Assessment Checklist
Download link : Risk Assessment Checklist Risk Assessment Checklist Project Name Project Code Program Manager Project Manager 1 Engineering Process 1.1 Requirements Item Yes No NA Remarks Stability Are the requirements stable [1] Are the external interfaces changing Completeness Are there requirements you know should be inthe specification but aren’t? (IF […]
Effective human-computer interaction through cognitive biometrics
Abstract Use of screen design, and a system, is affected by many factors. These include: how much information is presented on a screen, how a screen is organized, the language used on the screen, the distinctiveness of the screen’s components. In this paper I have presented some principles of the screen design and making human […]