Best Practices Client/server

نویسنده

  • InduShobha Chengalur-Smith
چکیده

The goal: Not just better technology but better business processes that make a company more competitive. Client/server systems link clients and servers via a network to support distributed computation, analysis, and presentation, providing a common method for distributing computer power within companies. Although companies are embracing client/server technology when moving from legacy systems [4], a 1996 survey of IS managers by InformationWeek found that only 40% of them consider client/server systems " a worthwhile investment " [1]. In fact, only about 16% of all client/server applications were (and are) viewed as successful by the companies implementing them [5].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rfc 6202

On today’s Internet, the Hypertext Transfer Protocol (HTTP) is often used (some would say abused) to enable asynchronous, "serverinitiated" communication from a server to a client as well as communication from a client to a server. This document describes known issues and best practices related to such "bidirectional HTTP" applications, focusing on the two most common mechanisms: HTTP long poll...

متن کامل

Known Issues and Best Practices for the Use of Long Polling and Streaming in Bidirectional HTTP

On today’s Internet, the Hypertext Transfer Protocol (HTTP) is often used (some would say abused) to enable asynchronous, "serverinitiated" communication from a server to a client as well as communication from a client to a server. This document describes known issues and best practices related to such "bidirectional HTTP" applications, focusing on the two most common mechanisms: HTTP long poll...

متن کامل

Web API growing pains: Loosely coupled yet strongly tied

Web APIs provide a systematic and extensible approach for application-toapplication interaction. Developers using web APIs are forced to accompany the API providers in their software evolution tasks. In order to understand the distress caused by this imposition on web API client developers we perform a semi-structured interview with six such developers. We also investigate how major web API pro...

متن کامل

Extended HTTP Digest Access Authentication

User authentication to a server is typically done by presenting a username and a password in some protected form to the server, and having the server verify that those credentials correspond to an identity previously registered and authorized for access. It is crucial that attackers never get access to operational passwords, which typically is achieved by encryption in transit, or through a cha...

متن کامل

Best Practices in Business Rule Design and Implementation

Rules are the heart of business logic. Businesses implement their information systems upon the pillars of business rules. The application architecture of a business information system (whether e-business, client-server or “legacy”) handles the flow of information from layer to layer: the user-interface accepts information and filters it in a preliminary way by applying validation rules. The dat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998