Common Object Request Broker Architecture
A discussion regarding the use of Common Object Request Broker Architecture (CORBA).
# 92716 | 4,606 words | 10 sources | MLA | 2006 |
Published on Feb 27, 2007 in Computer and Technology (Programming) , Computer and Technology (Technology) , Computer and Technology (Hardware) , Computer and Technology (Software) , Computer and Technology (General)
$19.95 Buy and instantly download this paper now
This paper discusses the use of Common Object Request Broker Architecture (CORBA) and the reasons why many are still reluctant to use this tool. The paper concludes by saying that CORBA must go through a creation life cycle and stresses the importance of correct preparation if it is to do the job that it is designed for when it comes to client servers.
From the Paper:"Hard drives are not all that is being dealt with, however. Large corporations and others that are involved in the computer industry are sitting on a proverbial gold mine, but only if they do things the right way. Even though computers and computer-related gear are extremely popular right now a company can end up out of favor with the public if they market a product incorrectly, do something that consumers find offensive, or have a poor strategy of where they want to go with their products and services. Because of the potential for numerous pitfalls, corporate management needs to be aware of what should be done to protect their companies from trouble. Leadership, differentiation, and strategy are vitally important, as is the identification of not only opportunities for growth but threats to growth and productivity as well.
Barriers to growth in an industry need to be examined before a product or service is marketed to the public. People need to know what a corporation can offer them, and the corporation does not want to make promises that it can not keep by saying something too soon and realizing later that there was more involved then was first suspected. "
Sample of Sources Used:
- 1-2-3 Data Recovery. (2003). Data Recovery and the history of the hard drive. Retrieved from http://www.data-recovery-help.com/history.html
- Ackerman, Frank. (2002). The Political Economy of Inequality. Global Development and Environment Institute Tufts University. Retrieved from http://www.Islandpress.org/ecocompass/changingnatow/inequality.html
- Bellenfant, William L. and Nelson, Matt J. (2002). Strategic planning: looking beyond the next move; financial managers play a central role in linking strategic planning and implementation. Healthcare Financial Management. 56, 63-68.
- Birnbaum, Bill. Developing Your Strategic Objectives (2002). Developing Strategy Objectives for Corporate Strategic Planning. Retrieved from http://www.birnbaUmassociates.com/developing-objectives.htm
- Computer Security: What Purchasing Needs to Know. (2002). About.com. Retrieved from http://purchasing.about.com/library/weekly/aa032697.htm
Cite this Research Paper:
Common Object Request Broker Architecture (2007, February 27) Retrieved September 21, 2020, from https://www.academon.com/research-paper/common-object-request-broker-architecture-92716/
"Common Object Request Broker Architecture" 27 February 2007. Web. 21 September. 2020. <https://www.academon.com/research-paper/common-object-request-broker-architecture-92716/>