HELLO my name is MIKE 2.0

Skjekkeland, Atle
March 2009
Infonomics;Mar/Apr2009, Vol. 23 Issue 2, p24
Trade Publication
The article offers information on MIKE2.0, a comprehensive delivery methodology for information management solutions developed by Bearing Point Consulting. It is said that the acronym MIKE stands for Method for an Integrated Knowledge Environment. The objective of MIKE2.0 is to offer comprehensive methodology for several types of information development.


Related Articles

  • Master Perspective: Security Architecture Requires Careful Planning. Hopkins, Brian // Infonomics;Mar/Apr2009, Vol. 23 Issue 2, p16 

    The article presents two approaches of security architecture which include repository and application-level security. It is said that these approaches will enable enterprise content management (ECM) plans to meet contention requirements. Repository-based security employs business organization...

  • Want SharePoint Success? Try Dual Architecture. Hockswender, Bernie // Infonomics;Mar/Apr2009, Vol. 23 Issue 2, p20 

    The article discusses the use of dual information and technical architecture approach in managing Sharepoint projects. In using dual architecture, it needs different timelines, perspectives and skill sets which is important to the success of any SharePoint project. It is said that in technical...

  • Virtually Everything. LOHRMANN, DAN // Public CIO;Aug2009, Vol. 7 Issue 4, p58 

    The article discusses virtualization, a computing technology that makes use of existing resources through third party solutions providing easy, simpler and cost-effective management of information technology (IT). It is mentioned that virtualization also poses challenges including licenses,...

  • ISACA Releases Results of Top Business/Technology Issues Survey. Parker, Robert G. // COBIT Focus;2008, Vol. 4, p4 

    The article reports on the release of 2008 Top Business/Technology Issues survey results by Information Systems Audit and Control Association (ISACA). "Enterprise-based IT management and IT governance" was identified as the second most important business issue impacted by IT. The aim of the...

  • Investigating the Relationship between Knowledge Sharing Strategies and Organizational Excellence Pillars. AL-Faouri, Abeer Hmoud; Dasgupta, Subhasish; Al-Kasasbeh, Mohammed Mufaddy // Communications of the IBIMA;2011, Vol. 2011, p4 

    Although it is generally accepted that only organizations with a commitment to knowledge sharing and organizational excellence will remain competitive, there are an alarmingly low number of public organizations that have been identified as having the basics of excellence in the fourth cycle...

  • Perspectives on information life cycle management.  // KM World;Jul/Aug2008, Vol. 17 Issue 7, p10 

    The article discusses the importance of information life cycle management (ILM) in business management in the U.S. Aside from the need to management information for operational purposes, compliance is an important driver for ILM, whether the focus is on retention schedules in highly regulated...

  • RESEARCH ON ESTIMATION LENGTH OF HIDDEN MESSAGE. Racuciu, C. I.; Mihailescu, M. I.; Garban, V.; Praoveanu, I. // Annals of DAAAM & Proceedings;2010, p967 

    In this paper we will discuss a strategy for estimation the length of hidden message from stego-images. A brief presentation of attacks (steganalysis) will be explained, which are based on statistical parameters of the image that is being analyzed and signatures which are embedded information in...

  • Acceptable Security Controls a Rarity, Says Survey.  // International Journal of Micrographics & Optical Technology;2009, Vol. 27 Issue 1/2, p8 

    The article presents a survey on security controls according to the U.S. security industry professionals. Survey shows that 14 percent of former company employees have access to proprietary data and organizational information. It was found out that there is a disconnection between the...

  • Untitled. Grant, Ian // Computer Weekly;1/22/2008, p10 

    The article presents information on a report released by the Information Security Forum (ISF) concerning information classification and compliance with information security regulations. According to the report, chief information officers (CIOs) need to take a leading role in setting up formal...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics