BPM is dead. Long Live BPM!

Long live BPM! Business Process Management, BPM for short, is close to couple of decades old. I feel sad for the companies that make Business Process Management (BPM) Software. Reason? They have been fighting the perpetual battle of adapting to the change that has been plaguing this category. At first I think the BPM Vendors… Read More

Gartner BPM Summit 2014: Implementing an Application Rationalization Program | MicroPact

In an insightful session here at the Gartner BPM Summit in Las Vegas, analyst Andy Kyte discussed the need for application rationalization and how BPM can play a role in such an effort. In this post I will highlight the points that jumped out to me, and I will also look at them in the… Read More

Erik Meijer: AGILE must be destroyed, once and for all • The Register

A couple of months back, Dutch computer scientist Erik Meijer gave an outspoken and distinctly anti-Agile talk at the Reaktor Dev Day in Finland. “Agile is a cancer that we have to eliminate from the industry,” said Meijer; harsh words for a methodology that started in the nineties as a lightweight alternative to bureaucratic and… Read More

Asp.Net MVC-4,Entity Framework and JQGrid Demo with simple Todo List WebApplication – CodeProject

There are many advantages of using MVC as follows: – MVC helps us to develop loosely coupled architecture. Complex applications can be easily managed. Separations of concerns is possible by dividing the application in to Model,View and Controller. Extensive support for Test Driven Development(TDD). Unit testing will be easy, an additional layer of testing will… Read More

Multicast Message Broker – CodeProject

In one of my projects I needed to use udp multicast messaging to distribute notifications. I’ve found numerous articles about multicasting but these were mostly oriented towards an explanation of the technology with just simple code snippets demonstrating basic api calls. My aim was to build a component which would provide reliable encapsulation of network… Read More

Protecting your data in the age of the NSA and PRISM

Soon after Edward Snowden released a cache of top-secret documents detailing the far-ranging data collection activities of the U.S. National Security Agency (NSA) in the summer of 2013, the Federal Bureau of Investigation (FBI) approached the secure email provider Lavabit with a demand to turn over the encryption keys to its communications. Their target was,… Read More