background preloader

Jeanne Ross of MIT CISR on Enterprise Architecture

Jeanne Ross of MIT CISR on Enterprise Architecture

http://www.youtube.com/watch?v=feI6_-v10Dk

Related:  tombeelerantoniotanCNT3014Enterprise Systems IntergrationESI

An example of a successful proof of concept - ETL Solutions In software development, a proof of concept can be a vital tool to demonstrate the software’s capabilities and its fit with the client’s requirements. But how do you go about creating one? A recent example from our data integration work in the Oil & Gas industry illustrates the steps we take to create a successful proof of concept. You may also be interested in: How to create a successful proof of concept. Excel To KML Western United States only, in a number of formats. Used in place of Latitude and Longitude or Position. The Quarter/Quarter closest to our example position 39° 18' 40.58" N 102° 17' 30.47" W is the SE 1/4 of the NW 1/4 of Section 35, Range 44 West, Township 8 South, Sixth Meridian, Colorado. Verbose, forward and reversed SE 1/4 of the NW 1/4 of Section 35, Range 44 West, Township 8 South, Sixth Meridian, Colorado Colorado, Sixth Meridian, Township 8 South, Range 44 West, Section 35, SE 1/4 of the NW 1/4

Useful mininet setups Mininet is a network emulation platform that is very useful to test SDN applications that you build. It can support different types of topologies. Here we showcase three popular configurations that will be helpful for testing. 1. Single switch Network planning and design Network planning and design is an iterative process, encompassing topological design, network-synthesis, and network-realization, and is aimed at ensuring that a new telecommunications network or service meets the needs of the subscriber and operator.[1] The process can be tailored according to each new network or service.[2] A network planning methodology[edit] A traditional network planning methodology involves five layers of planning, namely:

A List of Security Tools for Staying Safe in the Cloud Customer access points, also called API endpoints, allow secure HTTP access (HTTPS) so that you can establish secure communication sessions with your AWS services using SSL/TLS. You can control how accessible your Amazon EC2 instances are by configuring built-in firewall rules – from totally public to completely private, or somewhere in between. And when your instances reside within a Virtual Private Cloud (VPC) subnet, you can control egress as well as ingress. The AWS Virtual Private Cloud (VPC) service allows you to add another layer of network security to your instances by creating private subnets and even adding an IPsec VPN tunnel between your home network and your AWS VPC. All AWS services provide HTTPS endpoints to support SSL/TLS encryption, but the Elastic Load Balancing service also provides SSL/TLS support for connections between clients and the load balancer and between the load balancer and your back-end instances.

KML FAQ - Keyhole Markup Language What is KML? KML is a file format used to display geographic data in an Earth browser, such as Google Earth, Google Maps, and Google Maps for mobile. You can create KML files to pinpoint locations, add image overlays, and expose rich data in new ways. What is proof of concept (POC)? - Definition from WhatIs.com Proof of concept (POC) is documented evidence that a potential product or service can be successful. By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

The Best Cloud Storage Solutions With nearly ubiquitous Internet connectivity these days, there's no reason you shouldn't have access to all your important documents not only via your PC at your desk at work, but also from your smartphone on the train home, from your tablet on your couch, and from the laptop in your hotel room or kitchen. Cloud-based storage and syncing services can make seamless your access to Word docs, PDFs, spreadsheets, photos, any other digital assets—no more emailing files to yourself or plugging and unplugging USB thumb drives. We've rounded up the best of these services to help you decide which you should use. With these services, all your files are always accessible and in their most up-to-date state. If you don't yet have a service for storing and syncing your data in the cloud, you need one. Which one you choose depends on the kinds of files you store, how much security you need, whether you plan to collaborate with other people, and which devices you use to edit and access your files.

Tips for Securing Your EC2 Instance Just like any host on the Internet, your EC2 instances can be vulnerable to attack. While the EC2 firewall is a very powerful tool for securing your instance from unwanted network traffic, if configured incorrectly, you may inadvertently leave your instance vulnerable to attack. The three most important things you can do to mitigate potential risks to your instances are:

Chapter 3 - Design Guidelines for Application Performance Improving .NET Application Performance and Scalability J.D. Meier, Srinath Vasireddy, Ashish Babbar, Rico Mariani, and Alex Mackman Microsoft Corporation May 2004 Guidance for Proof of Concept Pilot (PDF Version Available) Recommended Practice: Developing and Implementing an Enterprise-wide ElectronicRecords Management (ERM) Proof of Concept Pilot A proof of concept pilot project is an opportunity to demonstrate the capabilities of Electronic Records Management (ERM) software on a small area and in a controlled manner. A pilot project is an excellent risk mitigation strategy for an agency planning to implement a ERM system. It can also serve to inform or resolve an alternatives analysis for an agency during the investment planning phase. The pilot helps determine whether the software is appropriate for use by the agency and how easily it can be configured, providing hands-on experience for records managers, information technology (IT) personnel, and users.

How Cloud Storage Works" ­Comedian George Carlin has a routine in which he talks about how humans seem to spend their lives accumulating "stuff." Once they've gathered enough stuff, they have to find places to store all of it. If Carlin were to update that routine today, he could make the same observation about computer information. It seems that everyone with a computer spends a lot of time acquiring data and then trying to find a way to store it. For some computer owners, finding enough storage space to hold all the data they've acquired is a real challenge. Some people invest in larger hard drives.

Related: