By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
There's a clear analogy to this with the Internet. End users never needed to be trained on TCP/IP (the core protocol of the Internet) to use the Internet. Instead, users were trained on or learned applications like Web browsers and e-mail. These applications use TCP/IP under the covers, but most end users are blissfully unaware of this fact.
Dig Deeper on Enterprise Application Integration (EAI)
Related Q&A from Daniel Foody
Daniel Foody defines end-to-end security and discusses the different parts of security to consider.continue reading
Dan Foody discusses the capability of using Web services for ASP applications.continue reading
Daniel Foody discusses the "find-bind-execute" paradigm and secure service directories.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.