27 July 2019

🧱IT: Cloud (Definitions)

"A set of computers, typically maintained in a data center, that can be allocated dynamically and accessed remotely. Unlike a cluster, cloud computers are typically managed by a third party and may host multiple applications from different, unrelated users." (Michael McCool et al, "Structured Parallel Programming", 2012)

"A network that delivers requested virtual resources as a service." (IBM, "Informix Servers 12.1", 2014)

"A secure computing environment accessed via the Internet." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"Products and services managed by a third-party company and made available through the Internet." (David K Pham, "From Business Strategy to Information Technology Roadmap", 2016)

"It has the ability to offer and to assist any kind of useful information without any limitations for users." (Shigeki Sugiyama. "Human Behavior and Another Kind in Consciousness: Emerging Research and Opportunities", 2019)

"Remote server and distributed computing environment used to store data and provision computing related services as and when needed on a pay-as-you-go basis." (Wissam Abbass et al, "Internet of Things Application for Intelligent Cities: Security Risk Assessment Challenges", 2021)

"The virtual world in which information technology tools and services are available for hire, use and storage via the internet, Wi-Fi and physical attributes ranging from IT components to data storage." (Sue Milton, "Data Privacy vs. Data Security", 2021)

"uses a network of remote servers hosted on the internet to store, manage, and process data, rather than requiring a local server or a personal computer." (Accenture)

26 July 2019

🧱IT: User Datagram Protocol [UDP] (Definitions)

"Network standard that does not check for errors, and as a result, has less overhead and is faster than a connection-oriented protocol such as TCP. With UDP, the quality of the transmission is sacrificed for speed." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

"A core protocol of the Internet Protocol suite. UDP is a connectionless protocol, which provides no guarantee of delivery." (Weiss, "Auditing IT Infrastructures for Compliance" 2nd Ed., 2015)

"Connectionless, unreliable transport layer protocol, which is considered a 'best effort' protocol." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"An unreliable network protocol that is fast and efficient in which data is transmitted once to a recipient, but the transmitter is not guaranteed delivery." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

"A connectionless unreliable protocol. UDP describes a network data connection based on datagrams with little packet control." (Daniel Leuck et al, "Learning Java" 5th Ed., 2020)

🧱IT: Efficiency (Definitions)

"A measure of the degree to which a system or component performs designated functions with respect to the resources it consumes to perform those functions." (Richard D Stutzke, "Estimating Software-Intensive Systems: Projects, Products, and Processes", 2005)

"a measure of the cost per time or cost per effort." (Bruce P Douglass, "Real-Time Agility: The Harmony/ESW Method for Real-Time and Embedded Systems Development", 2009)

"A quasimetric used throughout this book to describe how well memory and other resources of the processor and platform are utilized by a concurrent implementation." (Clay Breshears, "The Art of Concurrency", 2009)

"Efficiency measures the return on investment in using additional hardware to operate in parallel." (Michael McCool et al, "Structured Parallel Programming", 2012)

"A set of software characteristics (for example, execution speed, response time) relating to performance of the software and use of resources (for example, memory) under stated conditions (normally increasing load)." (Tilo Linz et al, "Software Testing Foundations" 4th Ed., 2014)

"In relation to performance/operational auditing, the use of financial, human, physical, and information resources such that output is maximized for any given set of resource inputs, or input is minimized for any given quantity and quality of output." (Sally-Anne Pitt, "Internal Audit Quality", 2014)

"Efficiency is the degree to which a resource is utilized for the intended task." (Hari K Kondaveeti et al, "Deep Learning Applications in Agriculture: The Role of Deep Learning in Smart Agriculture", 2021)

"a measure of whether the right amount of resources has been used à to deliver a process, service or activity" (ITIL)

"Resources expended in relation to the accuracy and completeness with which users achieve goals." (NISTIR 8040)

"The capability of the software product to provide appropriate performance, relative to the amount of resources used under stated conditions." (ISO 9126)

🧱IT: Batch Processing (Definitions)

"A computer application that runs in a sequential series of processing steps." (Sharon Allen & Evan Terry, "Beginning Relational Data Modeling" 2nd Ed., 2005)

"Computer environment in which programs (usually long-running, sequentially oriented) access data exclusively, and user interaction is not allowed while the activity is occurring." (William H Inmon, "Building the Data Warehouse", 2005)

"Processing system that processes inputs at fixed intervals as a file and operates on it all at once; contrasts with online (or interactive) processing." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed,, 2011)

[batch job:] "A set of computer processes that can be run without user interaction." (Microsoft, "SQL Server 2012 Glossary", 2012)

"A type of processing whereby computer programs are coded into jobs that are submitted for execution and run to completion without online interaction or manual intervention." (Craig S Mullins, "Database Administration", 2012)

"A noninteractive process that runs in a queue, usually when the system load is lowest, and generally used for processing batches of information in a serial and usually efficient manner. Early computers were capable of only batch processing." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"The collection of transaction into 'batches' that are processed collectively." (Daniel Linstedt & W H Inmon, "Data Architecture: A Primer for the Data Scientist", 2014)

"A processing strategy in which transactions are not handled immediately; rather, receipts are collected and processed as a batch." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web" 2nd Ed., 2015)

25 July 2019

🧱IT: Augmented Reality [AR] (Definitions)

"An app that involves computer-generated graphic images superimposed over photos of real things." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

"Integrates digital information with a user’s environment in real time. It is a live direct or indirect view of a person’s immediate physical, real-world environment with information provided about what one sees." (Ciara Heavin & Daniel J Power, "Decision Support, Analytics, and Business Intelligence 3rd Ed.", 2017)

 "AR represents the effort to augment the existing content with computer-generated interactive experiences through sensory inputs like audio, visuals, and haptic manipulations. It provides learning support to existing content by integrating various digital technologies to enhance the educational and learning benefits of the materials." (Robert Z Zheng & Kevin Greenberg, "Immersive Technology: Past, Present, and Future in Education", 2020)

"Technology that upgrades the image of the real world with additional computer-generated information or virtual effects, such as images and sounds." (Jurij Urbančič et al, "Expansion of Technology Utilization Through Tourism 4.0 in Slovenia", 2020)

"superimposes computer-generated images over views of physical environments. Its purpose is to enrich how viewers see and interact with these environments. Augmented reality apps, from social media filters, to games like Pokémon Go® to surgical procedures, are expanding rapidly thanks to their ability to bring elements of the virtual world into the real world and enhance what people see, hear and feel. Augmented reality lies in the middle of the reality spectrum: between the real and virtual worlds." (Accenture)

 "The virtual overlay of contextual digital information thata computer generates on a physical-world object and that a user sees in thedisplay of a mobile device as its camera captures it in real time." (Forrester)

🧱IT: Buffer Overflow (Definitions)

"Occurs when a program attempts to move more data into a memory location than is allocated to hold that data. Buffer overflow problems are often security-critical." (Mark S Merkow & Lakshmikanth Raghavan, "Secure and Resilient Software Development", 2010)

"Copying too much information to a memory location, leading to denial of service or elevation of privilege attacks." (Mark Rhodes-Ousley, "Information Security: The Complete Reference" 2nd Ed.", 2013)

"A defect in a computer program that could cause a system to crash and leave the user with heightened privileges" (Nell Dale & John Lewis, "Computer Science Illuminated, 6th Ed.", 2015)

"Occurs in an application when more information is stored in the buffer than the space reserved for it." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web" 2nd Ed., 2015)

"Too much data is put into the buffers that make up a stack. Common attack vector used by attackers to run malicious code on a target system." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"A memory access failure due to the attempt by a process to store data beyond the boundaries of a fixed length buffer, resulting in overwriting of adjacent memory areas or the raising of an overflow exception. See also buffer." (SQA)

🧱IT: Asynchronous (Definitions)

"Lack of temporal concurrence; not occurring at the same time." (Ruth C Clark & Chopeta Lyons, "Graphics for Learning", 2004)

"A process that is not coordinated in time. In data storage processes, asynchronous means that the device or software does not wait for acknowledgement before performing the next I/O." (Tom Petrocelli, "Data Protection and Information Lifecycle Management", 2005)

"Data that are transmitted without an associated clock signal. The time spacing between data characters or blocks may be of arbitrary duration (opposite of synchronous)." (John R Vacca, "Optical Networking Best Practices Handbook", 2006)

"The ability to send or receive calls independently and in any order." (Craig F Smith & H Peter Alesso, "Thinking on the Web: Berners-Lee, Gödel and Turing", 2008)

"Separate execution streams that can run concurrently in any order relative to each other are asynchronous." (Clay Breshears, "The Art of Concurrency", 2009)

"A system in which events can occur in any order, such as a game where different players can place their moves without being concerned about the order that other players are moving. Contrast with synchronous." (Jon Radoff, "Game On: Energize Your Business with Social Media Games", 2011)

"Describes a style of communication in which the initiator does not wait for a reply. Opposite of synchronous." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"A style of communication in which the initiator does not wait for a reply." (Craig S Mullins, "Database Administration", 2012)

"Not occurring at the same moment in time as some specific operation of the computer; in other words, not synchronized with the program’s actions" (Nell Dale & John Lewis, "Computer Science Illuminated" 6th Ed., 2015)

"Pertaining to events that are not synchronized in time or do not occur in regular or predictable time intervals." (Sybase, "Open Server Server-Library/C Reference Manual", 2019)

🧱IT: Blockchain (Definitions)

"A block chain is a perfect place to store value, identities, agreements, property rights, credentials, etc. Once you put something like a Bit coin into it, it will stay there forever. It is decentralized, disinter mediated, cheap, and censorship-resistant." (Kirti R Bhatele et al, "The Role of Artificial Intelligence in Cyber Security", 2019)

"A system made-up of blocks that are used to record transactions in a peer-to-peer cryptocurrency network such as bitcoins." (Murad Al Shibli, "Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology", 2020)

"A chain of blocks containing data that is bundled together. This database is shared across a network of computers (so-called distributed ledger network). Each data block links to the previous block in the blockchain through a cryptographic hash of the previous block, a timestamp, and transaction data. The blockchain only allows data to be written, and once that data has been accepted by the network, it cannot be changed." (Jurij Urbančič et al, "Expansion of Technology Utilization Through Tourism 4.0 in Slovenia", 2020)

"A system in which a record of transactions made in Bitcoin or another cryptocurrency is maintained across several computers that are linked in a peer-to-peer network. Amany M Alshawi, "Decentralized Cryptocurrency Security and Financial Implications: The Bitcoin Paradigm", 2020)

"An encrypted ledger that protects transaction data from modification." (David T A Wesley, "Regulating the Internet, Encyclopedia of Criminal Activities and the Deep Web", 2020)

"Blockchain is a decentralized, immutable, secure data repository or digital ledger where the data is chronologically recorded. The initial block named as Genesis. It is a chain of immutable data blocks what has anonymous individuals as nodes who can transact securely using cryptology. Blockchain technology is subset of distributed ledger technology." (Umit Cali & Claudio Lima, "Energy Informatics Using the Distributed Ledger Technology and Advanced Data Analytics", 2020)

"Blockchain is a meta-technology interconnected with other technologies and consists of several architectural layers: a database, a software application, a number of computers connected to each other, peoples’ access to the system and a software ecosystem that enables development. The blockchain runs on the existing stack of Internet protocols, adding an entire new tier to the Internet to ensure economic transactions, both instant digital currency payments and complicated financial contracts." (Aslı Taşbaşı et al, "An Analysis of Risk Transfer and Trust Nexus in International Trade With Reference to Turkish Data", 2020) 

"Is a growing list of records, called blocks, which are linked using cryptography. Each block contains a cryptographic hash of the previous block a timestamp, and transaction data. (Vardan Mkrttchian, "Perspective Tools to Improve Machine Learning Applications for Cyber Security", 2020)

"This is viewed as a mechanism to provide further protection and enhance the security of data by using its properties of immutability, auditability and encryption whilst providing transparency amongst parties who may not know each other, so operating in a trustless environment." (Hamid Jahankhani & Ionuț O Popescu, "Millennials vs. Cyborgs and Blockchain Role in Trust and Privacy", 2020)

"A blockchain is a data structure that represents the record of each accounting move. Each account transaction is signed digitally to protect its authenticity, and no one can intervene in this transaction." (Ebru E Saygili & Tuncay Ercan, "An Overview of International Fintech Instruments Using Innovation Diffusion Theory Adoption Strategies", 2021)

"A system in which a record of transactions made in bitcoin or another cryptocurrency are maintained across several computers that are linked in a peer-to-peer network." (Silvije Orsag et al, "Finance in the World of Artificial Intelligence and Digitalization", 2021)

"It is a decentralized computation and information sharing platform that enables multiple authoritative domains, who don’t trust each other, to cooperate, coordinate and collaborate in a rational decision-making process." (Vinod Kumar & Gotam Singh Lalotra, "Blockchain-Enabled Secure Internet of Things", 2021)

"A concept consisting of the methods, technologies, and tool sets to support a distributed, tamper-evident, and reliable way to ensure transaction integrity, irrefutability, and non-repudiation. Blockchains are write-once, append-only data stores that include validation, consensus, storage, replication, and security for transactions or other records." (Forrester)

[hybrid blockchain:] "A network with a combination of characteristics of public and private blockchains where a blockchain may incorporate select privacy, security and auditability elements required by the implementation." (AICPA)

[private blockchain:] "A restricted access network controlled by an entity or group which is similar to a traditional centralized network." (AICPA)

"A technology that records a list of records, referred to as blocks, that are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp and transaction data." (AICPA)

[public blockchain:] "An open network where participants can view, read and write data, and no one participant has control (e.g., Bitcoin, Ethereum)." (AICPA)

24 July 2019

🧱IT: Virtualization (Definitions)

"Creation of a virtual, as opposed to a real, instance of an entity, such as an operating system, server, storage, or network." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"The process of partitioning a computer so that multiple operating system instances can run at the same time on a single physical computer." (John Goodson & Robert A Steward, "The Data Access Handbook", 2009)

"A concept that separates business applications and data from hardware resources, allowing companies to pool hardware resources, rather than dedicate servers to application and assign those resources to applications as needed." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"A technique that creates logical representations of computing resources that are independent of the underlying physical computing resources." (Carlos Coronel et al, "Database Systems: Design, Implementation, and Management" 9th Ed., 2011)

"A method for managing hardware assets used at the same time by different users or processes, or both, that makes the part assigned to each user or process appear to act as if it was running on a separate piece of equipment." (Kenneth A Shaw, "Integrated Management of Processes and Information", 2013)

"Virtual memory is the use of a disk to store active areas of memory to make the available memory appear larger. In a virtual environment, one computer runs software that allows it to emulate another machine. This kind of emulation is commonly known as virtualization." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"A technique common in computing, consisting in the creation of virtual (rather than actual) instance of any element, so it can be managed and used independently. Virtualization has been one of the key tools for resource sharing and software development, and now it is beginning to be applied to the network disciplines." (Diego R López & Pedro A. Aranda, "Network Functions Virtualization: Going beyond the Carrier Cloud", 2015)

"Creation of a simulated environment (hardware platform, operating system, storage, etc.) that allows for central control and scalability." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK 4th Ed.", 2015)

"The creation of a virtual version of actual services, applications, or resources." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web" 2nd Ed., 2015)

"The process of creating a virtual version of a resource, such as an operating system, hardware platform, or storage device." (Andrew Pham et al, "From Business Strategy to Information Technology Roadmap", 2016)

"A base component of the cloud that consists of software that emulates physical infrastructure." (Richard Ehrhardt, "Cloud Build Methodology", 2017)

"The process of presenting an abstraction of hardware resources to give the appearance of dedicated access and control to hardware resources, while, in reality, those resources are being shared." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

🧱IT: Information Technology Information Library [ITIL] (Definitions)

"A series of documents used to aid the implementation of a framework for IT service management (ITSM). This framework defines how service management is applied in specific organizations. Being a framework, it is completely customizable for an application within any type of business or organization that has a reliance on IT infrastructure." (Tilak Mitra et al, "SOA Governance", 2008)

"A framework and set of standards for IT governance based on best practices." (Judith Hurwitz et al, "Service Oriented Architecture For Dummies" 2nd Ed., 2009)

"A framework of supplier independent best practice management procedures for delivery of high quality IT services." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"a set of guidelines for developing and managing IT operations and services." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"A framework and set of standards for IT governance based on best practices." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"A group of books written and released by the United Kingdom’s Office of Government and Commerce (OGC). ITIL documents best practices organizations can implement to provide consistent IT services. The library includes five books." (Darril Gibson, "Effective Help Desk Specialist Skills", 2014)

"A set of process-oriented best practices and guidance originally developed in the United Kingdom to standardize delivery of informational technology service management." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"Best practices for information technology services management processes developed by the United Kingdom’s Office of Government Commerce." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"The IT Infrastructure Library; a set of best practice publications for IT service management." (by Brian Johnson & Leon-Paul de Rouw, "Collaborative Business Design", 2017)

"The Information Technology Infrastructure Library (ITIL) presents pre-defined processes for IT service management. The fourth edition of ITIL depicts two key elements ITIL Service-Value-System (SVS) and a four dimensions model." (Anna Wiedemann et al, "Transforming Disciplined IT Functions: Guidelines for DevOps Integration", 2021)

"set of best practices guidance" (ITIL)

🧱IT: Localization (Definitions)

"The process of making a program suitable for execution within a particular geographic region, typically by translating messages to the local language and handling things such as local time zones, currency symbols, date formats, and so on. Sometimes localization is used just to refer to the language translation and the term internationalization to the rest of the process." (Stephen G Kochan, "Programming in Objective-C", 2003)

"The process of customizing a globalized application for a specific culture." (Rod Stephens, "Stephens' Visual Basic® Programming 24-Hour Trainer", 2011)

"The process of making a program support a specific locale." (Rod Stephens, "Start Here! Fundamentals of Microsoft® .NET Programming", 2011)

"The process of adapting a product and/or content (including text and non-text elements) to meet the language, cultural, and political expectations and/or requirements of a specific local market (locale)." (SQL Server 2012 Glossary, "Microsoft", 2012)

"The process of customizing and adapting a global application for a particular culture and locale." (Joan C Dessinger, "Fundamentals of Performance Improvement" 3rd Ed., 2012)

"The process of setting up an application to run in a particular national language environment. An application that is localized typically generates messages in a local language and character set and uses local datetime formats." (Sybase, "Open Server Server-Library/C Reference Manual", 2019)

 "A view that joins horizontally partitioned data from a set of member tables across a single server, making the data appear as if from one table." (Microsoft Technet)

21 July 2019

🧱IT: Search Engine Optimization [SEO] (Definitions)

"The set of techniques and methodologies devoted to improving organic search rankings (not paid search) for a Web site." (Mike Moran & Bill Hunt , "Search Engine Marketing, Inc", 2005)

"The process and strategy of presenting a business on the web to improve the ability of potential customers finding it through natural searches on search engines such as Google, Yahoo!, and Bing." (Gina Abudi & Brandon Toropov, "The Complete Idiot's Guide to Best Practices for Small Business", 2011)

"The process of improving the volume or quality of traffic to a Web site from search engines via unpaid search results." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

"techniques to help ensure that a web site appears as close to the first position on a web search results page as possible." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"Search engine optimization, the set of techniques and methodologies devoted to improving organic search rankings (not paid search) for a Web site." (Mike Moran & Bill Hunt , "Search Engine Marketing, Inc", 2005)

"The process of writing web content so as to increase a page's ranking in online search results." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"its main function is to increase website visibility. The main search engines use algorithms to rank a website’s position and hence its overall position in the search results. In some instances it can be as simple as structuring the words on a website in a way the search engine operates. " (BCS Learning & Development Limited, "CEdMA Europe", 2019)

20 July 2019

🧱IT: Chief Information Officer [CIO] (Definitions)

"The job responsibility of managing the information technology and computer systems that support enterprise business goals." (Evan Levy & Jill Dyché, "Customer Data Integration", 2006)

"The head of information technology within a company." (Bettina M Davis & Wendy L Combsand, "Demystifying Technical Training: Partnership, Strategy, and Execution", 2009)

"The executive who heads the information services division of an organization. The CIO, usually reporting directly to the Chief Executive Officer, has the responsibility for all the organization's computing and data communications." (Paulraj Ponniah, "Data Warehousing Fundamentals for IT Professionals", 2010)

"A job title for the head of the Information Technology group within an organization. They often report to Chief Executive Officer. The prominence of this position has risen greatly as information technology has become a more important part of organizations." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"The person who is in charge of information technology (IT) strategy and the computer, network, and third-party (for example, cloud) systems required to support an enterprise’s objectives and goals." (William Stallings, "Effective Cybersecurity: A Guide to Using Best Practices and Standards", 2018)

19 July 2019

🧱IT: Contract (Definitions)

"A mutually binding relationship enforceable by law, expressing the mutual assent of two or more legally competent parties to do something they are not otherwise required to do, or not to do something they would otherwise have a right to do, and specifying the exchange of a consideration (something of value, usually money)." (Richard D Stutzke, "Estimating Software-Intensive Systems: Projects, Products, and Processes", 2005)

"A written, binding agreement between two parties." (Sue Johnson & Gwen Moran, "The Complete Idiot's Guide® To Business Plans", 2010)

"A contract is a mutually binding agreement that obligates the seller to provide the specified product or service or result and obligates the buyer to pay for it." (For Dummies, "PMP Certification All-in-One For Dummies" 2nd Ed., 2013)

"An agreement between two or more parties that has clear economic consequences that the parties have little, if any, discretion to avoid, usually because the agreement is enforceable at law. Contracts may take a variety of forms and need not be in writing." (Project Management Institute, "The Standard for Program Management" 3rd Ed., 2013)

"A legally binding agreement that obligates one party (the architect, engineer, constructor, etc.) to offer products and/or services under certain terms (budget, schedule, specifications) and obligates the other party (owner) to pay for these products/services." (Christopher Carson et al, "CPM Scheduling for Construction: Best Practices and Guidelines", 2014)

"An enforceable bargain between or among two or more people (including corporate “persons”) in which one or more person has made a promise to do or not to do something in exchange for consideration, and the parties have manifested their mutual assent." (Alex D Bennett, "A Freelancer’s Guide to Legal Entities", 2018)

"legally binding agreement between two or more parties" (ITIL)

18 July 2019

🧱IT: Platform (Definitions)

"A specific software implementation technology and/or specific hardware that constitutes the execution environment of a system." (Anneke Kleppe et al, "MDA Explained: The Model Driven Architecture™: Practice and Promise", 2003)

"In the automotive industry, a platform describes a technical basis on which to build models that appear outwardly different. In electronic development, a platform is understood as a hardware, software, or system construction kit that allows the easy creation of derivates via modification, parameterization, or derivation. All essential features, however, are preserved." (Lars Dittmann et al, "Automotive SPICE in Practice", 2008)

"The underlying foundations, technology frameworks, base architectures, and interfaces upon which products are built." (Steven Haines, "The Product Manager's Desk Reference", 2008)

"A combination of technology infrastructure products and components on which various application programs can be designed to run." (David Lyle & John G Schmidt, "Lean Integration", 2010)

"A type of computer hardware that is compatible with certain operating systems." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"A product, technology, or system that provides a foundation for a number of complementary products (or applications). In business, platforms that form an interface between two‐sided markets (comprising application suppliers and final users) occupy an especially important role in several technology‐based sectors." (Robert M Grant, "Contemporary Strategy Analysis" 10th Ed., 2018)

Related Posts Plugin for WordPress, Blogger...

About Me

My photo
Koeln, NRW, Germany
IT Professional with more than 25 years experience in IT in the area of full life-cycle of Web/Desktop/Database Applications Development, Software Engineering, Consultancy, Data Management, Data Quality, Data Migrations, Reporting, ERP implementations & support, Team/Project/IT Management, etc.