Thoughts on Enterprise Architecture

The Enterprise Architecture

Subscribe to The Enterprise Architecture: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get The Enterprise Architecture: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Object Relational Technologies form the backbone of most of the enterprise Java applications. Choosing the appropriate technology however is one of the most important decisions for an enterprise architect. More often than not, such a decision is either a hit or miss. Mistakes done in selecting the appropriate technology results in performance bottlenecks, lack of scalability, unreliable transaction handling etc. More than the problem with the specific ORM technology, it's the suitability of that technology to the underlying business needs and non-functional requirements. This article aims to establish an objective architecture evaluation framework for evaluating which ORM technology best fits your project needs. Based on the requirements, one or the other technology may be appropriate. Flexibility For an ORM framework to be flexible, the following considerations ar... (more)

Business Design for the Service-Oriented Enterprise

The way we design business is undergoing profound transformation. For the past 100 years business design has been directly influenced by Frederick Taylor, focused on how we do work and how we can make it more efficient. The LEAN and Six Sigma movements are the visible manifestation of that thinking. Together with BPM they have focused on incremental improvements of primarily internal processes and tasks encoded in process orchestration and workflows that control how the enterprise works. But this is equivalent to looking in the rear view mirror to design tomorrows business. In this article we will look at three major trends that are going to break this conventional model. Smart behaviors enabling cross ecosystem processes Capability services (independent business components) enabling continuously evolving business models The convergence of consumer and business IT e... (more)

The Hidden Business CoST: Consumerization of Sharing Tools

Sharing files with friends has never been easier. Whether it is via old-school hard copy methods like CDs, DVDs and USB drives, nefarious peer-to-peer torrents like BitTorrent or new shared, private cloud storage services like Dropbox, getting a photo or music file from one person to another takes mere seconds. The problem is that people inside businesses aren't using these services just to share personal files. They are circumventing secured content management systems like SharePoint in favor of consumer-friendly services in order to share files with third parties. For businesses, Consumerization of Sharing Tools (CoST) can encourage insecure file sharing and the impact can be startling. WikiLeaks was the result of a failed SharePoint deployment. The user simply circumvented the SharePoint system, downloaded extremely sensitive data and made it available to the w... (more)

Remediating SSH Key Mismanagement

From its origin in 1995, SSH, the secure shell data-in-transit protocol, has been used the world over as a method to transfer data between machines, as well as a tool to provide remote administrator access. Some variation of the protocol is packaged free in every version of Unix, Mac OS and Linux. Recently, its use has grown exponentially in Windows operating systems as well. While the exact number of worldwide SSH deployments is unknown, it is estimated that nearly half of all of the World Wide Web uses SSH, making it a virtually mandatory service in the world of network security. After nearly two decades of use, SSH has succeeded in securing billions of business transactions without any faults of the protocol itself, demonstrating its dependability as a security solution. On the other hand, the evolution of cyber-threat ability requires that organizations take a ... (more)

Metrics for ITSM and Mom's Mini-Van

People, Process, Technology & Metrics… an ongoing drama. I’m one of those people who take my work home with me. I know, I know… there’s that whole work-life balance thing that I’m always “struggling” to overcome. But, I haven’t yet. I am kind of sorry about it, but at the same time… not deeply sorry. Anyway … I’ve wanted to put this concept in an analogy outside of IT for quite a while now, because these types of discussions can get so heated when *one such as myself* wants to make commentary about situations that happen every day. So, here goes… Goal: Clean Mom’s car as quickly as possible while maintaining peace and stability in the family. Metrics: Total Time to clean, Time to de-clutter, time to vacuum, total time to wash interior, total time to wash exterior, time to put away clutter in house **that wasn’t put away when children exited car as Mom and Dad asked ... (more)