Premium Content

Access "Cloud likely future for business applications"

Andy Hayler, Contributor Published: 26 Nov 2012

When I started my IT career in the early 1980s the deployment of applications was a relatively simple affair: everything lived on the mainframe in the company’s data centre. If you needed to update an application then you knew exactly which environment it was going to run on: a green-screen dumb terminal, with complete certainty about which version of the operating system, database, TP [Transaction Processing] monitor and compilers that you would need to cater for and test.  Those were the days.  For more on the cloud for business applications Check out this SearchCRM mega guide to business applications and cloud computing Jeff Kaplan explains how SaaS BI can inform business in this video The maze that is business applications licensing Today the picture is very different for those developing or implementing applications, whether they be internal IT staff, consultants or software vendors.  The spread of desktop computing and distributed systems means that you need to take into account a wide range of potential environments in which your application will run,... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Cloud likely future for business applications by Andy Hayler, Contributor

      Outsourcing your business application headaches, together with the flexibility of its leasing model will make the cloud the way forward for large enterprises as well as small businesses.

More Premium Content Accessible For Free

  • Open Trusted Technology Provider Standard (O-TTPS)
    Open-Trusted-Technology-Provider-Standard-(O-TTPS)-(1365609248_609).jpg
    E-Handbook

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global ...

  • The identity perimeter
    The-identity-perimeter-(1365173761_823).jpg
    E-Handbook

    Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the ...

  • Enabling the secure use of RFID
    Enabling-the-secure-use-of-RFID-(1364996037_361).jpg
    E-Handbook

    UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients....