BPM, Agile, and Virtualization Combine to Create Effective Solutions
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 7
Abstract
The rate of change in business and government is accelerating. A number of techniques for addressing that change have emerged independently to provide for automated solutions in this environment. This paper will examine three of the most popular of these technologies— business process management, the agile software development movement, and infrastructure virtualization— to expose the commonalities in these approaches and how, when used together, their combined effect results in rapidly deployed, more successful solutions.
Authors and Affiliations
Steve Kruba, Steven Baynes, Robert Hyer
Support Vector Machine for Classification of Autism Spectrum Disorder based on Abnormal Structure of Corpus Callosum
Autism Spectrum Disorders (ASD) is quite difficult to diagnose using traditional methods. Early prediction of Autism Spectrum Disorders enhances the in general psychological well- being of the child. These days, the rese...
Automating the Collection of Object Relational Database Metrics
The quality of software systems is the most important factor to consider when designing and using these systems. The quality of the database or the database management system is particularly important as it is the backbo...
ATM Security Using Fingerprint Biometric Identifer: An Investigative Study
The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use persona...
Shadow Identification in Food Images using Extreme Learning Machine
Shadow identification is important for food images. Different applications require an accurate shadow identification or removal. A shadow varies from one image to another based on different factors such as lighting, colo...
Application of Relevance Vector Machines in Real Time Intrusion Detection
In the recent years, there has been a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. This interest stems from the wide range of applications in which change de...