InfoQ Homepage Enterprise Architecture Content on InfoQ
-
The Indian Banking Community Cloud
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.
-
Q&A with Gene Kim on the State of DevOps Survey
The 4th edition of the State of DevOps survey is out. InfoQ talked to the survey's co-author Gene Kim to understand what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.
-
Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats
In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.
-
How to Start With Security
Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it. It will help get you started or hopefully give you some new ideas if you're already doing some security work.
-
Q&A on Agile! The Good, the Hype and the Ugly
The book "Agile! The Good, the Hype and the Ugly" by Bertrand Meyer provides a review of agile principles, techniques and tools. It explores the agile methods Extreme Programming, Lean Software, Scrum and Crystal and provides suggestions on what to use or not to use from them, based on software engineering principles and research and personal experience of the book author.
-
Cloud Security Auditing: Challenges and Emerging Approaches
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. They talk about the challenges in the areas of transparency, encryption and colocation and domain-tailored audits as ideal solution in the new model.
-
Go for the Money! JSR 354 Adds First Class Money and Currency Support to Java
First class money and currency support in Java are almost here. In this article Credit Suisse's Anatole Tresch JSR 354 spec lead, discusses the shortcomings of the legacy currency and money support, motivation for the new APIs, and lots of examples.
-
Employing Enterprise Architecture for Applications Assurance
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls. They also talk about other security model components like threat modeling, attack trees, secure design patterns, and misuse cases.
-
Visual Portfolio Management: Collaboratively Aligning Your Company
To exploit agile advantages like speed, flexibility, and fast feedback, companies need to work on the right things. The three-horizons model explains how companies need to work to ensure sustainable growth. Visual portfolio management can integrate the different types of work into a coherent system.
-
Service-Oriented Architecture and Legacy Systems
In this article, authors provide an overview of current SOA technologies and how to evolve in legacy environments. They also discuss the topics of SOAP vs. REST web services, Enterprise Application Integration and incremental transition to SOA in legacy environments.
-
Metadata Driven Design - An Agile Bridge Between Design and Development
Over the years Agile has had a number of high profile successes. However, some have suggested that project efficiency and team creativity are impossible to achieve simultaneously. In this article Aaron Kendall of Barnes & Noble discusses a method they have been using that attempts to address these potential conflicts and combines the design of the overall architecture and implementation.
-
Highly Distributed Computations Without Synchronization
Synchronization of data across systems is expensive and impractical when running systems at scale. Traditional approaches for performing computations or information dissemination are not viable. In this article Basho Sr. Software Engineer Chris Meiklejohn explores the basic building blocks for crafting deterministic applications that guarantee convergence of data without synchronization.