All Things Related to Enterprise Architecture

Enterprise Architecture

Subscribe to Enterprise Architecture: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Enterprise Architecture: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The next BriefingsDirect IT business model innovation interview explores how pay-as-you-go models have emerged as a new way to align information technology (IT) needs with business imperatives. We'll now learn how global aerospace and defense integrator Northrop Grumman has sought a revolution in business model transformation in how it acquires and manages IT. Listen to the podcast. Find it on iTunes. Get the mobile app. Read a full transcript or download a copy. Here to help explore how cloud computing-like consumption models can be applied more broadly is Ron Foudray, Vice President, Business Development for Technology Services at Northrop Grumman. The interview is conducted by Dana Gardner, Principal Analyst at Interarbor Solutions. Here are some excerpts: Gardner: What trends are driving the need to change how IT is acquired? People have been buying IT for 40 o... (more)

Low-Code: Optimizing AppDev without Sacrificing IT Control

As enterprises reacted to the drawbacks of traditional, waterfall development – long timeframes, high costs, and results that rarely met customer expectations – they had to make a critical choice: move to Agile development approaches within IT, or build and support applications outside IT altogether – what we’ve come to call shadow IT. Business users, fed up with slow, intractable IT organizations, often felt their best option was shadow IT. Outside of the IT organization, applications were faster to deploy with less coding than IT-driven application development – but devoid of any IT control that would ensure security, compliance, and integration to back-office systems. Agile approaches also addressed the shortcomings of waterfall, as well as delivering far more powerful applications than shadow IT could deliver. Furthermore, Agile allowed for greater IT control th... (more)

Taming the IoT Wild Wild West with Enterprise Architecture

Just as was the case with the settling of the American West, today’s technology settlers are flocking ’West‘ to new territory in search of new fortunes and futures. This new territory, the Internet of Things (IoT), is in a period of rampant expansion, endless opportunity, and few rules. It is unquestionably the Wild Wild West of technology. The Internet of Things refers to a broad category of smart and connected devices that includes a vast range of endpoints including industrial equipment sensors, smart appliances, smart cars, geo-beacons and just about everything else in between. The common denominator is that these smart devices exist at the enterprise’s edge collecting data and sharing it with core systems, often providing at-edge analytics, and sometimes performing automated actions — all without human interaction. As enterprises have realized the potential bus... (more)

Is Your Enterprise Data Secure? | @CloudExpo #Cloud #BigData #Analytics

Keeping your enterprise data safe and secure is more important now than it ever has been. IT has always been an ever-changing industry, but in recent years, it has been changing more and more quickly. Now, thanks to the cloud, big data, and mobile devices all expanding at once, it may seem like the entire IT field is completely different every other day. This means your company is going to almost always be re-evaluating and upgrading your network security tools and methods. It's hard to deal with the current threats to your data, never mind prepare for new ones. Fortunately, while it is stressful to keep up with this changing world, it's not impossible. If your team is up to the challenge and is dedicated to protecting your network and the big data you collect, it is possible. Here are five techniques you can use to eliminate a large number of threats and secure yo... (more)

As enterprises face mounting hybrid IT complexity, new management solutions beckon

The next BriefingsDirect Voice of the Analyst interview examines how new machine learning and artificial intelligence (AI) capabilities are being applied to hybrid IT complexity challenges.   We'll explore how mounting complexity and a lack of multi-cloud services management maturity must be solved in order for businesses to grow and thrive as digital enterprises.   Listen to the podcast. Find it on iTunes. Get the mobile app. Read a full transcript or download a copy.   Here to report on how companies and IT leaders are seeking new means to manage an increasingly complex transition to sustainable hybrid IT is Paul Teich, Principal Analyst at TIRIAS Research in Austin, Texas. The discussion is moderated by Dana Gardner, principal analyst at Interarbor Solutions. Here are some excerpts:   Gardner: Paul, there’s a lot of evidence that businesses are adopting cloud ... (more)

Winning in Chaos - Digital Enterprise Strategies | @ThingsExpo #IoT #M2M #DigitalTransformation

Digital technology innovations and advancements, and our adoption of them, have changed us. We are different consumers, employers and employees. Our expectations have increased. We have become mobile, impatient and demanding. We are global. We demand immediate, accurate and real-time responses. We use our technology not just for reading historic events and news, but also for predicting our future turn while navigating at 60 MPH. Today we want personalized and contextually relevant experiences. We want digital experiences that are beautiful, simple and elegant. We want instant access to all products, services, news, information and friends' status. We want to share our lives instantly and globally. We want to find things, buy things, move money and complete transactions from anywhere at anytime. We want to work from anywhere and have all the information we need instan... (more)

Powerful Enterprise Architecture and Information Technology Strategies

The promises of services-oriented architecture, enterprise architecture (EA), and information technology (IT) strategies - to change IT from inhibitor to enabler of business flexibility and align IT with business strategies - are remarkably similar. However, for many companies, their EA and IT strategies have not become the catalyst for the intelligence enterprise, the sense-and-respond organization, the agile enterprise, or the adaptive enterprise. It is the failed promises that tightly couple SOA, EA, and IT strategies. Effective EA and usable IT strategies are necessary to realize the vision of an SOA. And SOA is the thread that connects this trio and provides the perfect opportunity to realize business value through EA and IT strategies. SOA is the future state for EA and IT strategies. SOA is the end game. The IT industry is littered with definitions of EA, IT ... (more)

Focus on the "A" in SOA

For decades, IT professionals have put up with the headaches of managing a complex and rigid enterprise architecture that has become a Petri dish for the too-familiar misalignment between IT and the business. Enter service-oriented architecture (SOA), which promises to create applications composed of modular software components that are interconnected through well-defined, open Web service standards. Just as companies moved from mainframe to client-server, so must IT move from monolithic applications to a matrix of loosely coupled Web services that enable the composition and recomposition of business processes. However while many in IT are familiar with and more than eager to realize these benefits, few understand that getting the big SOA payoff requires a fundamental shift in the design, deployment, management, and governance of enterprise architecture. Architect... (more)

SQL Anywhere Server and AJAX

AJAX has dominated the web space so extensively that it needs no introduction. Connecting to a server via XMLHttpRequest and making a partial page refresh is what makes this technique so attractive. However, use of these AJAX requests, although very attractive, can pose dangers as well. JavaScript acts as a vector to infect websites with worms, such as SAMY, using cross-site scripting, also known as CSS or XSS. In a previous article - "Enabling Server data with native web service" - I explain how a web service of type HTML is created on the SQL Anywhere server, which can serve HTML pages, and that to make an AJAX call for this page from your browser, you need to make a call to the hosting domain, the SQL Anywhere Web Server. Details of the AJAX Accessed Resource In the cited previous article, the resource is accessed on the localhost at port 8082, or any port chosen... (more)

A Classification Scheme for Defining SOA

Since its inception, the term “Service-Oriented Architecture” - SOA - has confused and befuddled the masses. Those that believe they are doing SOA are sometimes told they are not, but their critics are unable to point to clear reasoning for their comment. Some believe that you can buy a toolkit for SOA, while others say that is nonsense; just an abuse of the term for marketing purposes by vendors. Clearly, the word architecture is an explicit part of the term, yet it is discussed in lock-step with technological implementation strategy and efforts. Most importantly, many definitions of SOA exist without clear adoption of one over all others. Needless to say, the one thing we can all agree on is that there is confusion surrounding SOA. One of the most problematic factors in providing clarity around SOA is that all definitions proposed seem to be expressed in the narr... (more)

2nd Government Cloud Computing Survey - A Sneak Peek

This month, we're in the middle of collecting data for our 2nd Government Cloud Computing Survey. To peak your curiosity (an to entice your participation) here is a sneak peek at some of the results. First, I want to thank the Government customer community for a significant increase in their participation. Although industry participation has improved as well, the main purpose of this survey is to better understand how cloud computing can best address Government customer needs. We believe that this increase in Government participation has improved our measurement of the customer's familiarity with cloud computing, resulting in an increase in the percentage of customers reporting an unfamiliarity with cloud computing. In an effort to better understand the issues and challenges that customers hope to address with cloud computing, we expanded the issues and challenges l... (more)