BPM, Agile, and Virtualization Combine to Create Effective Solutions
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 7
Abstract
The rate of change in business and government is accelerating. A number of techniques for addressing that change have emerged independently to provide for automated solutions in this environment. This paper will examine three of the most popular of these technologies— business process management, the agile software development movement, and infrastructure virtualization— to expose the commonalities in these approaches and how, when used together, their combined effect results in rapidly deployed, more successful solutions.
Authors and Affiliations
Steve Kruba, Steven Baynes, Robert Hyer
Cardiotocographic Diagnosis of Fetal Health based on Multiclass Morphologic Pattern Predictions using Deep Learning Classification
Medical complications of pregnancy and pregnancy-related deaths continue to remain a major global challenge today. Internationally, about 830 maternal deaths occur every day due to pregnancy-related or childbirth-related...
Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud
Service Oriented Computing (SOC) provides a framework for the realization of loosely coupled service oriented applications. Web services are central to the concept of SOC. Currently, research into how web services can be...
Framework for Digital Data Access Control from Internal Threat in the Public Sector
Information management is one of the main challenges in the public sector because the information is often exposed to threat risks, particularly internal ones. Information theft or misuse, which is attributed to human fa...
Virtual Rehabilitation Using Sequential Learning Algorithms
Rehabilitation systems are becoming more impor-tant now because patients can access motor skills recovery treatment from home, reducing the limitations of time, space and cost of treatment in a medical facility. Traditio...
Computerized Steganographic Technique using Fuzzy Logic
Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information,...