StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology Architectures - Essay Example

Cite this document
Summary
The distributed system development process begins with overall system partitioning, followed by network communication definition and then concluded with the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Information Technology Architectures
Read Text Preview

Extract of sample "Information Technology Architectures"

Distributed system development al Affiliation Distributed system development processes Distributed system developmentprocesses are stages involved in the construction of the distributed system architecture. The distributed system development process begins with overall system partitioning, followed by network communication definition and then concluded with the implementation of its functions (Papadopoulos, 2009. This paper describes the features and components involved in the development processes for distributed system.

It will also propose the advantages and disadvantages of the same development processes for distributed systemsCommon Object Request Broker Architecture (CORBA)CORBA is an acronym for common object request broker architecture. CORBA is the standard software that supports distributed objects. It is a complex and a more difficult to learn software than any other communication infrastructure. COBRA offers a lot of functionality such as, programming language independency and the operating system.

On the other hand, CORBA possesses the binding power to arrange of standardized programming languages as a communication format (Papadopoulos, 2009). Among the advantages of CORBA process, is its level of maturity, CORBA developed by the Object Management Group and its standard is neither too lax nor too restrictive. CORBA does not endanger the interoperability of some products nor the portability and space for optimization. Therefore, it offers a real international tested and proven power, flexibility and performance.

CORBA offers a modularization facility to write objects in different programming languages that provide a service to users that do not require details of implementation of the object(s). CORBA also offers a facility that allows different clients to use the same interface thus working together transparently (Papadopoulos, 2009). CORBA’s disadvantages include its architecture complexity and specification which do not give a clear implementation details. It offers vertical features, which target some users and applications, but not all technology users thus insufficient (Papadopoulos, 2009).

Java 2 Enterprise Architecture (J2EE)Java2 Enterprise Architecture (J2EE) is a mainframe scale computing platform which made for large firms. It simplifies thin client tiered environment application development (Papadopoulos, 2009). It decreases the need for programming, and programmer education by enhancing the tier to perform many programming aspects automatically.Advantages of the Java 2 Enterprise Architecture (J2EE)The Java 2 Enterprise Architecture (J2EE) consists of a security model which protects data both in web-based application and also locally.

It is portable since it consists of a write once and Run anywhere technology. On the other hand, Java 2 Enterprise Architecture (J2EE) consists of full support for Enterprise JavaBeans (EJB) for program components delivery in an enterprise environment. It has enhanced security and deployment features, which supports the Extensible Markup Language. It also consists of application programming interface (API) which facilitates consistence for users without the need for graphical user interface (Papadopoulos, 2009).

Disadvantages of the Java 2 Enterprise Architecture (J2EE)The system does not guarantee reference implementation. The Java 2 Enterprise Architecture (J2EE) distinguished by compromise and consensus and it is not a perfect system.Conclusively, the Java 2 Enterprise Architecture (J2EE) facilitates a business to business framework for information interchange through extensible markup language (Papadopoulos, 2009). ReferencePapadopoulos, G. A. (2009). Information systems development: towards a service provision society.

New York: Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Architectures Essay Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Information Technology Architectures Essay Example | Topics and Well Written Essays - 500 words - 2. Retrieved from https://studentshare.org/miscellaneous/1610316-information-technology-architectures
(Information Technology Architectures Essay Example | Topics and Well Written Essays - 500 Words - 2)
Information Technology Architectures Essay Example | Topics and Well Written Essays - 500 Words - 2. https://studentshare.org/miscellaneous/1610316-information-technology-architectures.
“Information Technology Architectures Essay Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/miscellaneous/1610316-information-technology-architectures.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology Architectures

The Use and Abuse of Historical Precedent

hellip; Today, people have come to know those specialists as architectures who are including most of the architectural styles used in ancient buildings in today's houses.... Los Angeles is a good example of the places in which architectures have applied several ancient stylistic designs of construction in building homes, movie theatres, restaurant buildings, and car lots among other places (Roseman 41).... These styles were rampant in the olden days but as time went by, different architectures resolved into reinterpreting them into the modern ways of constructing buildings....
8 Pages (2000 words) Research Paper

Future Factors associated with Combined Operations

The United States and its allies can make use of structured operatives such as the Combined Force Operations to build, evaluate and apply 3C architectures. The efficiency of a combined arms operations is partially, if not entirely, dependent on the present and futuristic power of weaponry.... "Improving preparation and training standards for command and control agencies on the operational level involves the resolution of a number of other complex problems arising from the command and control target per se, the diversity and dynamics of its internal and external connections, the continual structural development of the Armed Forces, the composition and functions of certain sub-systems, the substantial changes in the nature and methods of combat, the evolution of new means of warfare, a considerable expansion in the sphere of information warfare, and the need for close interaction with the formations of other military, law enforcement, security, and intelligence structures (Thefreelibrary, 2005)"....
5 Pages (1250 words) Essay

Software Architectures

This paper sheds light on the different software architectures that have evolved with the changes in technology and the increase in needs in terms of performance, reliability and costs associated with modification and implementation of the applications.... Two-tire client-server architectures work fine if the number of users is expected to be low, less than 100 and when non-real-time information processing is required.... The trend today, therefore, is evidently towards more complex three-tier architectures....
4 Pages (1000 words) Essay

Enterprise network architectures constraints

From a broad perception, enterprise network solutions in organizations are done in the right manner possible, and this integrates all elements… This becomes a defining application which has the capability of improving performance and ensuring that organizational strategic goals have been realized within the shortest time possible. Several leaders in Enterprise Network architectures Constraints Enterprise Network architectures Constraints Evidently through modern research, there are various reasons as to why organizational leaders migrate to enterprise network solutions....
2 Pages (500 words) Essay

Practice with Enterprise Architecture (EA) Principles

Data sub-architectures in the retail store are influenced by the new principle because architectural principles in EA aim at capturing the fundamental truth regarding the way the enterprise uses and deploys information technology resources (Minoli, 2008).... In a retail store, business principle that enhances customer connection influences decision-making and EA… To fulfill the needs of the retail store, the data sub-architectures in the EA have to reflect consensus across the business while at the same time embodying enterprise architecture thinking (Minoli, 2008)....
1 Pages (250 words) Assignment

The Use and Abuse of Historical Precedent

These styles were rampant in the olden days but as time went by, different architectures resolved into reinterpreting them into the modern ways of constructing buildings.... This coursework "The Use and Abuse of Historical Precedent" seeks to explore how stylistic period in architectural history namely Ancient Egypt and Japanese architecture has been reinterpreted in buildings and designs of construction found in contemporary Los Angeles....
7 Pages (1750 words) Coursework

Information Technology, Globalization, and International Financial Architecture

This essay "information technology, Globalization, and International Financial Architecture" discusses modern technology that has been increasingly equated with those of computing and information, which in these past years have revolutionized the way people communicate and conduct business.... hellip; This is more popularly known as information technology (IT), the technology that improves productivity and increases competitiveness, particularly amid the globalization phenomenon....
1 Pages (250 words) Essay

Information Technology Strategic Advantage

The author of this paper "information technology Strategic Advantage" will make an earnest attempt to analyze service orientation and agile digital platforms in forming an organization that has a strategic advantage relative to its competitors and requirements.... hellip; information technology (IT) is a major component in organizations and enterprises all over the world.... However, information technology is changing at a faster rate than how it can be utilized and thus many organizations tend to utilize half-baked resources....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us