What is an Architecture Context Diagram?
A key point in this diagram is that every component was shown in its context. IT only existed because it was useful in a business or management context. The business architectures existed in the context of a legal organization. Processes existed in a business process context that included triggering events, products, business rules, applications and outcomes. I could go on, but the point to remember is that every architectural component exists in one or more contexts; and each context exists in an even bigger context. So the IT context supports one or more Business contexts, within an Organization context, which exists within an Environmental or Social context.
Ramblings of a Disturbed Consultant – Part 2
The vendor did not set these expectations, nor did the solution set these expectations, yet we are left with a towering skyscraper of expectations for the software solution to fulfill. Now, all it takes is for one influencer to feel that their expectations were not been met, and the perception becomes that the solution did not meet the needs of the business. Not only does this take focus away from the objectives that have been met by the solution, but it also means that all the pressure created by the perceived failure falls back on the individual influencers. The question asked of the influencers by their managers, “What product will best meet our needs” now becomes an accusation, “This was your idea.”
Understanding DNS Zones
A DNS zone is the contiguous portion of the DNS domain name space over which a DNS server has authority. A zone is a portion of a namespace. It is not a domain. A domain is a branch of the DNS namespace. A DNS zonecan contain one or more contiguous domains. A DNS server can be authoritative for multiple DNS zones. A non-contiguous namespace cannot be a DNS zone. A zone contains the resource records for all of the names within the particular zone. Zone files are used if DNS data is not integrated with Active Directory. The zone files contain the DNS database resource records that define the zone. If DNS and Active Directory are integrated, then DNS data is stored in Active Directory.
Sustainable Enterprise Architecture
ICT Enterprise architecture is the backbone of corporate IT systems, the question is are they or can they be sustainable? Join the MD of Carbon 3IT and Vice chair of the BCS Green IT SG John Booth and his guests Alex Bardell of Deloitte, Richard Lanyon Hogg of IBM, Bob Crookes from DEFRA and Chair of the BCS Green IT SG and IT4s Consultant Gary Thornton as they answer the core questions for sustainable enterprise architecture: - What is sustainable enterprise architecture?; Will it require additional skills or money to achieve?; and Will enterprise architecture be superseded by cloud technologies?
Autonomous System (AS) Migration Features and Their Effects on the BGP AS_PATH Attribute
This draft discusses common methods of managing an ASN migration using some BGP feaures that while commonly-used are not formally part of the BGP4 protocol specification and may be vendor-specific in exact implementation. It is necessary to document these de facto standards to ensure that they are properly supported in future BGP protocol work such as BGPSec.
eBook: API Patterns for Cloud & Mobile
Dan Woods, Chief Analyst CITO Research, outlines enterprise architecture requirements for designing, managing, and protecting APIs and how the emerging API Gateway "proxy" deployment model is speeding deployment across industries. In this model, authentication using OAuth and other lightweight protocols such as REST and JSON are all the rage but Enterprise-class security is still lacking. To present actionable solutions, Dan presents 5 core API patterns for mobile, partner, data control, and PaaS infrastructure with actionable diagrams and a monetization model for APIs.
The Cardinal Sin of Data Mining and Data Science: Overfitting
The researchers test too many hypotheses without proper statistical control, until they happen to find something interesting and report it. Not surprisingly, next time the effect, which was (at least partly) due to chance, will be much smaller or absent. We note that Overfitting is not the same as another major data science mistake - "confusing correlation and causation". The difference is that overfitting finds something where there is nothing. In case of "correlation and causation", researchers can find a genuine novel correlation and only discover a cause much later.
Modern API Architectural Styles Offer Developers Choices
Not all API architecture styles are created equal, and there may not be one style that fits your needs perfectly. Organizations will need to carefully evaluate the API styles described here and others (including those coming down the pike) to determine which best fits business needs. The choice may not be easy, but when it comes to the future of your business, one thing is for sure: Using what you’ve always used, (whether it’s an API style, a scripting language, a software program, or other technology) just because you’ve always used it, is a pretty sure path to stagnancy and perhaps even eventual failure.
Roads in the Future Will Need Data Standards as Well as Signs, Says DOT's CIO
"I see that the marriage of information technology with transportation is going to be as transformative as anything," said McKinney. "I'm beginning to see things that I couldn't have imagined as a young man." The overarching goal is to make driving as safe as air travel, and reduce the 30,000-plus traffic fatalities annually. Among the technologies that could play a major role, is DSRC, which is being used in a pilot test in Southfield, Mich. DSCR systems enable vehicles to communicate with one another, but it also requires the devices to be deployed along highways as well as in cars. It takes the auto industry five to seven years to add new technologies to vehicles, do DSCR is clearly years away.
New, More Cost-Effective High-Speed Encryption Solutions from SafeNet
"There is a perception that high-speed encryption can be expensive, as small and large businesses look to protect not just data center traffic but other aspects of their network traffic," said Prakash Panjwani, senior vice president and general manager, Data Protection Solutions, SafeNet. "Our new high-speed encryption offerings erase that misconception by giving customers a single platform to ‘encrypt everywhere’— from traffic between data centers and the headquarters to backup and disaster recovery sites, whether on premises or in the cloud. With our comprehensive network traffic encryption solutions, customers can better protect their data from eavesdropping, surveillance, and overt and covert interception at an affordable cost, without compromising security or performance."
Quote for the day:
"Excellence is not an accomplishment. It is a spirit, a never-ending process." -- Lawrence M. Miller
A key point in this diagram is that every component was shown in its context. IT only existed because it was useful in a business or management context. The business architectures existed in the context of a legal organization. Processes existed in a business process context that included triggering events, products, business rules, applications and outcomes. I could go on, but the point to remember is that every architectural component exists in one or more contexts; and each context exists in an even bigger context. So the IT context supports one or more Business contexts, within an Organization context, which exists within an Environmental or Social context.
Ramblings of a Disturbed Consultant – Part 2
The vendor did not set these expectations, nor did the solution set these expectations, yet we are left with a towering skyscraper of expectations for the software solution to fulfill. Now, all it takes is for one influencer to feel that their expectations were not been met, and the perception becomes that the solution did not meet the needs of the business. Not only does this take focus away from the objectives that have been met by the solution, but it also means that all the pressure created by the perceived failure falls back on the individual influencers. The question asked of the influencers by their managers, “What product will best meet our needs” now becomes an accusation, “This was your idea.”
Understanding DNS Zones
A DNS zone is the contiguous portion of the DNS domain name space over which a DNS server has authority. A zone is a portion of a namespace. It is not a domain. A domain is a branch of the DNS namespace. A DNS zonecan contain one or more contiguous domains. A DNS server can be authoritative for multiple DNS zones. A non-contiguous namespace cannot be a DNS zone. A zone contains the resource records for all of the names within the particular zone. Zone files are used if DNS data is not integrated with Active Directory. The zone files contain the DNS database resource records that define the zone. If DNS and Active Directory are integrated, then DNS data is stored in Active Directory.
Sustainable Enterprise Architecture
ICT Enterprise architecture is the backbone of corporate IT systems, the question is are they or can they be sustainable? Join the MD of Carbon 3IT and Vice chair of the BCS Green IT SG John Booth and his guests Alex Bardell of Deloitte, Richard Lanyon Hogg of IBM, Bob Crookes from DEFRA and Chair of the BCS Green IT SG and IT4s Consultant Gary Thornton as they answer the core questions for sustainable enterprise architecture: - What is sustainable enterprise architecture?; Will it require additional skills or money to achieve?; and Will enterprise architecture be superseded by cloud technologies?
Autonomous System (AS) Migration Features and Their Effects on the BGP AS_PATH Attribute
This draft discusses common methods of managing an ASN migration using some BGP feaures that while commonly-used are not formally part of the BGP4 protocol specification and may be vendor-specific in exact implementation. It is necessary to document these de facto standards to ensure that they are properly supported in future BGP protocol work such as BGPSec.
eBook: API Patterns for Cloud & Mobile
Dan Woods, Chief Analyst CITO Research, outlines enterprise architecture requirements for designing, managing, and protecting APIs and how the emerging API Gateway "proxy" deployment model is speeding deployment across industries. In this model, authentication using OAuth and other lightweight protocols such as REST and JSON are all the rage but Enterprise-class security is still lacking. To present actionable solutions, Dan presents 5 core API patterns for mobile, partner, data control, and PaaS infrastructure with actionable diagrams and a monetization model for APIs.
The Cardinal Sin of Data Mining and Data Science: Overfitting
The researchers test too many hypotheses without proper statistical control, until they happen to find something interesting and report it. Not surprisingly, next time the effect, which was (at least partly) due to chance, will be much smaller or absent. We note that Overfitting is not the same as another major data science mistake - "confusing correlation and causation". The difference is that overfitting finds something where there is nothing. In case of "correlation and causation", researchers can find a genuine novel correlation and only discover a cause much later.
Modern API Architectural Styles Offer Developers Choices
Not all API architecture styles are created equal, and there may not be one style that fits your needs perfectly. Organizations will need to carefully evaluate the API styles described here and others (including those coming down the pike) to determine which best fits business needs. The choice may not be easy, but when it comes to the future of your business, one thing is for sure: Using what you’ve always used, (whether it’s an API style, a scripting language, a software program, or other technology) just because you’ve always used it, is a pretty sure path to stagnancy and perhaps even eventual failure.
Roads in the Future Will Need Data Standards as Well as Signs, Says DOT's CIO
"I see that the marriage of information technology with transportation is going to be as transformative as anything," said McKinney. "I'm beginning to see things that I couldn't have imagined as a young man." The overarching goal is to make driving as safe as air travel, and reduce the 30,000-plus traffic fatalities annually. Among the technologies that could play a major role, is DSRC, which is being used in a pilot test in Southfield, Mich. DSCR systems enable vehicles to communicate with one another, but it also requires the devices to be deployed along highways as well as in cars. It takes the auto industry five to seven years to add new technologies to vehicles, do DSCR is clearly years away.
New, More Cost-Effective High-Speed Encryption Solutions from SafeNet
"There is a perception that high-speed encryption can be expensive, as small and large businesses look to protect not just data center traffic but other aspects of their network traffic," said Prakash Panjwani, senior vice president and general manager, Data Protection Solutions, SafeNet. "Our new high-speed encryption offerings erase that misconception by giving customers a single platform to ‘encrypt everywhere’— from traffic between data centers and the headquarters to backup and disaster recovery sites, whether on premises or in the cloud. With our comprehensive network traffic encryption solutions, customers can better protect their data from eavesdropping, surveillance, and overt and covert interception at an affordable cost, without compromising security or performance."
Quote for the day:
"Excellence is not an accomplishment. It is a spirit, a never-ending process." -- Lawrence M. Miller
No comments:
Post a Comment