This entry is part 33 of 33 in the series Strategic TechnologiesWeb Analytics solutions help improve Web sites by analyzing real time information or information gathered from Web server logs to uncover usage patterns. Simple, free Web analytics solutions are popular such as Google Analytics. IBM CoreMetrics is a popular paid Web Analytics solution. Others… Read More »
This entry is part 31 of 33 in the series Strategic TechnologiesWe all dutifully endure the user ID and password on the hope that it will preserve our privacy, money and identity. As we need more and more user IDs and passwords we begin to reuse them and write them down, making them easier for… Read More »
Service Virtualization for Dummies A great place to start to learn about Service Virtualization technologies such as GreenHat.
This entry is part 30 of 33 in the series Strategic TechnologiesService Virtualization encompasses a strategy and tool set for stubbing out components that provide services required to run a component under test. An example service virtualization tool is IBM’s Rational Test Virtualization Server (formerly GreenHat).
DevOps for Dummies provides an IBM point of view on DevOps.
Application Release & Deployment for Dummies addresses the strategic technologies: Application Deployment Automation solutions Release Coordination solutions.
This entry is part 29 of 33 in the series Strategic TechnologiesSoftware development teams following an agile process to incrementally develop, build, deploy and release enterprise applications quickly find that keeping track of all of the components and inter-dependencies becomes unmanageable. Spreadsheets become laborious to maintain and do not track the process and keep a… Read More »
This entry is part 28 of 33 in the series Strategic TechnologiesContinuous Integration and other modern code development practices seek to manage scale and complexity, and increase speed and quality, by introducing automation across the software development life cycle (SDLC). This is especially true of areas that occur frequently and contain many repetitive steps such… Read More »
This entry is part 31 of 31 in the series Defining wordsThe PCI Security Standards Council provides the PCI Data Security Standard (PCI DSS). Certain organizations including financial services providers need to be compliant with this standard as evidence that they protect payment card holder data (CHD). The first step to applying the standard is… Read More »
This entry is part 10 of 10 in the series Strategic IT CapabilitiesThe IT group is usually tasked with designing new applications. I am not sure I advocate that but that is what I have seen in practice at banks. Therefore, I categorize User Centered Design as an IT Capability. The following diagram lifted from… Read More »