What gave him particular pleasure was the manipulation of complex relationships and dependencies to control how the art of architecture was used where he thought it mattered most.
By enabling a security architecture centered on data control, IT solves longstanding security problems through empowering the environment to protect sensitive data regardless of access method, device, network, ownership or location.
PenPoint from Go used a unique set of system wide gestures to control the device and had an architecture to allow for documents nested within documents that could be zoomed in and out.
The agency's capital planning and investment control process must build from the agency's current Enterprise Architecture (EA) and its transition from current architecture to target architecture.
All of this went on under a legal architecture that had existed for years, including a 1974 state gun-control law considered the strictest in the nation.