Page tree
Skip to end of metadata
Go to start of metadata
Table of Contents

Categories / Controlled Vocabulary

This list has now been vetted and card sorted by the Steering Committee on 6/2/2011.
It was decided to describe these categories through lens of provided/sought functionality and not deployment models.


These table columns are sortable by clicking in the header row.

Category

Alternatives

Application Development

 

Applications - Desktop

Desktop Applications

Applications - Mobile

Mobile Applications

Applications - Web-hosted

Web-hosted Applications

Backup & Storage

 

Communication & Collaboration

 

Consulting

 

Databases

Database Management

Developer Resources

 

High-Performance Computing

Computational Resources

Hosting

 

Networks - Data

Data Networks

Networks - Voice

Voice Networks

Security

Security & Access
Security & Identity Management

Support

 

Training

 

Other

 

1 Comment

  1. Patrick McGrath pointed out this breakdown: https://wiki.doit.wisc.edu/confluence/display/ARCH/Brick+Diagram+Taxonomy+-+Dynamic

    Training strikes me from this list and changing security to security and access or security and identity management.