Daily Tech Digest - December 24, 2022

3 takeaways to boost your enterprise architect career in 2023

Many people confuse business architecture and IT systems architecture, but they are different practices. Business architects transform business ideas and potential projects that align with an organization's strategies and influence a company's performance as a leader in their market, says Renee Biggs. IT architects contribute to the technology components of business architecture or enterprise architecture. ... Finding the right balance between documentation and implementation is part of an architect's job. But what do you do if your culture values performance a little too much, asks Evan Stoner, a senior specialist solutions architect. His advice is to "deliver what is needed." This means uncovering the current needs and designing for them. Change doesn't happen overnight. The future is uncertain, so architectures are constantly evolving. Software development is a key example, say Neal Fishman and Paul Homan; you must continually redevelop business applications to address new opportunities. But constant change can produce substandard solutions that require frequent revision.


Risk and resilience: compliance in 2023

By starting to prepare early, David Tattam, Chief Research & Content Officer and co-founder of Protecht expects that “businesses will start to realise the tangible benefits a holistic actionable view of risk provides. Smart businesses will track a measurable baseline of risk efficiencies over time, in line with their profit and returns strategy, to demonstrate the ROI of their risk management program”. Some legislation may have complicated and far-reaching impacts. Lee Biggenden, COO and Co-Founder of Nephos Technologies has noticed that “there are ongoing discussions in the European Union about open data platforms which, if passed, could revolutionise how data is used, shared and owned. Anticipated to come into force in 2023, it will have a huge impact on businesses who will need to put the controls and visibility in place over their data regardless of what industry they're in. Although on paper this may seem like a step in the right direction, it does raise concerns about personal privacy as third-party data sharing is a key part of the proposed act. We are all guilty of clicking privacy boxes without reading the full terms and conditions”. 


The Metaverse Doesn’t Have a Leg to Stand On

Zuckerberg’s not the only mark here. Microsoft also placed a bet on the metaverse (the avatars in its iteration, Mesh, also lack legs). In the past few years, a comically wide variety of companies have hired their own “chief metaverse officer,” from Disney and Procter & Gamble to the Creative Artists Agency and the accounting firm Prager Metis. Meta placed its bet on the metaverse in the flashiest way, changing its name, spending all that dough, et cetera, but it’s not alone in its conviction that these virtual worlds are the inevitable future. Even writer Neal Stephenson, who coined the word metaverse in his 1992 novel Snow Crash, founded an actual metaverse company in 2022. In the past few years, metaverse startups like Decentraland and the Sandbox grabbed venture capital interest by hyping themselves as hubs for a new NFT-fueled economy. Despite these companies’ hefty valuations, they have remained decidedly niche. (Refuting a third-party report that it had only 38 active users one day, Decentraland said it had an average of 8,000 daily active users—which is still tiny.) Why did Zuckerberg gamble his business on something so wobbly, so literally legless?


The year 2022 for Women in Tech

The results of the Toptal survey are not able to clearly indicate that certain progress has been made in the last year. These facts reveal that a bigger change still needs to be achieved. There are certain steps and actions that should be taken by everyone involved in the ecosystem, in order to overcome the existing gender inequality in the world and in the domain of technology and STEM specifically. The first step is to break the stereotypes. The stereotypical thinking is at the root of the problem of misconception of the role of women in society, the jobs and activities that are ‘appropriate’ for them. The second step is bridging the gender gap and it presents the next big challenging shift that must be called for. The gender gap exists notably in career opportunities and this is easily noticed when comparing the number of women studying and graduating in the STEM field and the number of women who manage to land jobs in the tech field and achieve real-life professional realization in the tech area. A significant part of the existing gender gap is the pay gap. Still, the gender pay gap provenly exists even in the most advanced countries. 


The Tech:Forward recipe for a successful technology transformation

Having an approach that is both this comprehensive and detailed was instrumental in aligning one large OEM’s tech-transformation goals. Previous efforts had stalled, often because of competing priorities across various business units, which frequently led to a narrow focus on each unit’s needs. One might want to push hard for cloud, for example, while another wanted to cut costs. Each unit would develop its own KPIs and system diagnostics, which made it virtually impossible to make thoughtful decisions across units, and technical dependencies between units would often grind progress to a halt. The company was determined to avoid making that mistake again. So it invested the time to educate stakeholders on the Tech:Forward framework, detail the dependencies within each part of the framework, and review exactly how different sequencing models would impact outcomes. In this way, each function developed confidence that the approach was both comprehensive and responsive to its needs. Meetings with the CFO


3 cloud architecture best practices for industry clouds

Make no assumptions about the security of industry-specific clouds. Those sold by the larger cloud providers may be secure as stand-alone services; however, they could become a security vulnerability when integrated and operated directly within your solution. The best practice here is to build and design security into your custom applications that leverage industry clouds. Also, do so with integration in mind so no new vulnerabilities are opened. You can take two things that are assumed to be secure independently, and then add dependencies that entirely change the security profile. ... However, you’ll often find the best-of-breed option is on another cloud or perhaps from an independent industry cloud provider that decided to go it alone. The best practice here is to not limit the industry-specific services under consideration. As time goes on, there will be dozens of services to do tasks such as risk analytics for investment banking, for example. Picking the less optimized choice means you’ll lower the value that’s returned to the business. In other words, you make less ROI when you make less optimized decisions.


Benefits of A Technology-Enabled Risk Assessment Process

Organizations need effective risk assessments to manage resources and make informed business decisions that enable growth. Performing an effective risk assessment means going beyond an annual, check-the-box activity by implementing a risk assessment process that can yield actionable results and findings and serve as a business intelligence tool to inform risk management strategies. In today’s rapidly evolving market, banks, financial services companies, payment services providers, and  fintechs  are focused on improving their processes to create dynamic and efficient digital experiences for their customers. But the improvements do not extend just to customers. ... Technology-enabled solutions – which support the automated or semi-automated collection of data, scoring of inherent risk, mapping of controls, and scoring of residual risk – can help organizations streamline and add efficiencies to their risk assessments and provide a better understanding of real-time risk than the frequently outdated, once-a-year process can. Organizations then can use the valuable business intelligence obtained through the risk assessment process to increase revenue and identify new business opportunities for further growth.


Making the case for an Enterprise Architect in Digital Transformation programs

Large transformation work need to be addressed in 3 buckets – Plan, Build & Run. While “Build” is the largest portion of investments in any transformation program, it is obvious that organizations are required to safeguard whatever has been built with minimal “Run” budgets. “Build” and “Run” are cyclical in nature. For example, you build, then you maintain (run), then you either build more or something new and then maintain (run) that more or something new. So it is pretty obvious that leaders responsible for large transformations think of Build as the starting point and transition to Run as the end. It is senior leaders however that need to see things being built (and run) as building blocks of a vision or the journey. This is the Planning function (which is strategic). The “Plan” function needs to be executed by someone who understands business vision and maps the journey to that vision. S/he does that by identifying business capabilities and value chain (not business process), and then developing the strategy as building blocks. The skill required to do this is called “Enterprise Architecture”.


EU Cyber Resilience Act: Good for Software Supply Chain Security, Bad for Open Source?

With all of the good that the CRA brings in evolving the regulatory conversations past SBOMs, the current draft has some problematic language that could actually hurt the future of open source. But first, what it gets right about open source. Page 15, Paragraph 10 attempts to exempt, or carve out, open source software (OSS) from the regulations, saying: In order not to hamper innovation or research, free and open-source software developed or supplied outside the course of a commercial activity should not be covered by this Regulation. This is in particular the case for software, including its source code and modified versions, that is openly shared and freely accessible, usable, modifiable and redistributable. This is good, even great. OSS and project maintainers should be exempt from these regulations that apply liability, as this will have the effect of quashing innovation and sharing of ideas via code. However, in the same paragraph, the CRA attempts to draw a line between commercial and non-commercial use of open source software:


Finding the Right Data Governance Model

It is critical to distinguish the term “governance” from the term “management” in the context of Data Governance. It should be noted that the principal difference between “governance” and “management” is that governance refers to the decisions that must be made and who must make them. This is to ensure effective resource allocation and management of data operations. On the other hand, Data Management involves implementing those decisions that arise from assessing and monitoring either existing controls or the environment that includes advancements in technology and the market. The activities required for Data Governance can, therefore, be distinguished from those needed for Data Management since management is influenced by governance. Data Governance is oversight of Data Management activities to ensure that policy and ownership of data are enforced in the organization. The emphasis is on formalizing the Data Management function and associated data ownership roles and responsibilities.



Quote for the day:

"Give whatever you are doing and whoever you are with the gift of your attention." -- Jim Rohn

No comments:

Post a Comment