Clients have different needs
Communication protocols
Replacement costs
Data semantics
Security and authentication
Previous slide
Next slide
Back to first slide
View graphic version