By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
There's a clear analogy to this with the Internet. End users never needed to be trained on TCP/IP (the core protocol of the Internet) to use the Internet. Instead, users were trained on or learned applications like Web browsers and e-mail. These applications use TCP/IP under the covers, but most end users are blissfully unaware of this fact.
Dig Deeper on Enterprise Application Integration (EAI)
Related Q&A from Daniel Foody
Daniel Foody defines end-to-end security and discusses the different parts of security to consider.continue reading
Dan Foody discusses the capability of using Web services for ASP applications.continue reading
Daniel Foody discusses the "find-bind-execute" paradigm and secure service directories.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.