Software Lifecycle and Quality Traditionally, when developers work on a software project, they write the application code or parts of it, and then test that code to verify correct implementation of the requirements. This unit testing process is usually a manual one, where the code is run interactively and tested immediately after development. Further development … …
Continue readingPerformance is a Requirement
Top of the Requirements List What’s the one factor that affects user satisfaction in every step they take, every time they use your web application? It’s not the feature set. Users can overlook your site lacking some piece of functionality. It’s not the design. Most people don’t mind if the site looks a little plain. … …
Continue readingSelecting a Workflow Management System for Your Company
When most people think about workflow they may think about a manufacturing process on a production line. And that’s really where the whole concept of workflow got started — when business and academic minds worked jointly to improve and control a process. Today, Workflow Management Systems (WFMS) have evolved to help manage the collaboration of individuals … …
Continue readingUsing JSON to Build Efficient Applications
As modern web applications have become increasingly interactive and data centric, techniques have been sought to make these applications more efficient. A major breakthrough in this area was the advent of AJAX (Asynchronous Javascript and XML). Since then, developers have continued to squeeze even more performance and efficiency out of every byte. One way to … …
Continue readingUsing JavaScript Frameworks for Building Business Applications
Over the past decade, we’ve seen the explosion of information, mobile devices, tablets and the ability to consume and access information from anywhere in the world. Web applications are being built at an ever-increasing pace to satisfy the need for information and deliver content-rich, user-friendly applications to users. With the increased demand being placed on … …
Continue readingProtect Your Customers’ PII (Personally Identifiable Information)
Personally Identifiable Information (PII) is the sensitive information that can be used to uniquely identify the flesh and blood people that are our staff, partners, vendors — and especially our customers. Some examples include: name, birth date, address, government issued ID numbers, email, credit card, bank account, user ID and password. As technology evolves, biometric data and … …
Continue readingPerformance is a lifetime experience!
Performance is not only a highly complex topic but also a moving target as business demands and technologies are constantly changing. What you design today as a highly performing business application may turn out to be a millstone around your neck within a few short years with the current rate of change. It’s important to … …
Continue readingCan SharePoint and IBM i coexist? The Magic 8-Ball says, “YES!”
Microsoft SharePoint has grown exponentially since its release in 2003. Did you know it took SharePoint only five years to surpass the $1 billion mark in annual sales? I believe SharePoint was gobbled up quickly by so many companies because it’s relatively inexpensive and easy to build a business case with a compelling return on investment. … …
Continue readingImplementing New Systems – Get Involved and Stay Involved
In most decisions involving your business you carefully scrutinize all of the important aspects. You review the business justification, the costs, the return on investment and the plan for implementation. Then, as the activity moves forward, you have your staff involved to monitor activities, track costs, provide information, ask questions and generally gain knowledge that will be … …
Continue readingLANSA Managed Application Services
The cost effective way to reengineer, modernize & transform your IBM i applications allowing IT to help & grow your business. The IBM i (AS/400, iSeries, Power systems) user base is now facing new challenges and threats based on the longevity of the platform and the age and maturity of many of the key applications … …
Continue reading