Fundamentals of Enterprise Architecture


Book Description

With the increasing complexity of modern cloud-based systems, an effective enterprise architecture program is more critical than ever. In this practical book, author Tanu McCabe from Capital One provides proven frameworks and practices to define an effective enterprise architecture strategy—one that will enable software and enterprise architects to create and implement great architecture strategies. You'll learn how to create shared alignment across business and technology, embed architecture practices into processes and tooling, incorporate technology and business trends, and instill contextual understanding over siloed decision-making. Complete with examples of patterns and antipatterns, this book provides reusable templates, assessment tools, and practical advice. With this book, you will: Understand exactly what enterprise architecture is, and why it's important to build an effective enterprise architecture practice Learn who needs to be involved to define and implement architecture strategies Examine common pitfalls that inhibit effective architecture strategies Assess the current state of your organization's architecture practice to identify opportunities for improvement Define your own architecture strategy at both an organizational and personal level by applying the book's frameworks Enhance your ability to make great architecture decisions using the frameworks and lessons provided Tanusree (Tanu) McCabe is a distinguished engineer who leads public cloud strategy at CVS and formerly led enterprise architecture strategy at Capital One as an executive distinguished engineer.










High Performance Architecture and Grid Computing


Book Description

This book constitutes the refereeds proceedings of the International Conference on High Performance Architecture and Grid Computing, HPAGC 2011, held in Chandigarh, India, in July 2011. The 87 revised full papers presented were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on grid and cloud computing; high performance architecture; information management and network security.




Information Security Architecture


Book Description

Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available. In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization. The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.




Software Architecture


Book Description

This book constitutes the refereed proceedings of the 12th European Conference on Software Architecture, ECSA 2018, held in Madrid, Spain, in September 2018. The 17 full papers presented together with 7 short papers were carefully reviewed and selected from 96 submissions. They are organized in topical sections as follows: Self-Adaptive Architectures, IoT Architectures, Embedded and Cyber-Physical Systems, Microservices Architectures, Service-Oriented Architectures, Architectural Design Decisions, Software Architecture in Practice.




The Art of Network Architecture


Book Description

The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks, where it belongs. Three pioneering network architects show how to evaluate both business and application requirements from a network designer's perspective, identifying crucial upfront questions that can help the reader shape networks that support current business strategy and provide flexibility for the future.




Resilient Architecture Design for Voltage Variation


Book Description

Shrinking feature size and diminishing supply voltage are making circuits sensitive to supply voltage fluctuations within the microprocessor, caused by normal workload activity changes. If left unattended, voltage fluctuations can lead to timing violations or even transistor lifetime issues that degrade processor robustness. Mechanisms that learn to tolerate, avoid, and eliminate voltage fluctuations based on program and microarchitectural events can help steer the processor clear of danger, thus enabling tighter voltage margins that improve performance or lower power consumption. We describe the problem of voltage variation and the factors that influence this variation during processor design and operation. We also describe a variety of runtime hardware and software mitigation techniques that either tolerate, avoid, and/or eliminate voltage violations. We hope processor architects will find the information useful since tolerance, avoidance, and elimination are generalizable constructs that can serve as a basis for addressing other reliability challenges as well. Table of Contents: Introduction / Modeling Voltage Variation / Understanding the Characteristics of Voltage Variation / Traditional Solutions and Emerging Solution Forecast / Allowing and Tolerating Voltage Emergencies / Predicting and Avoiding Voltage Emergencies / Eliminiating Recurring Voltage Emergencies / Future Directions on Resiliency




Outcome-Driven Business Architecture


Book Description

This book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise architecture, where the focus of technological initiatives and inventories is to understand and improve business organization, business direction, and business decision-making. This book provides a practical, long-term view on BA. Based on the authors' consulting experience and industrial research, the material in this book is a valuable addition to the thought processes around BA and EA. The lead author has direct and practical experience with large clients in applying APQC capability framework for undertaking multiple enterprise-wide capability assessments.




Advanced Information Networking and Applications


Book Description

This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications, different kinds of networks need to collaborate, and wired and next generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. The aim of the book “Advanced Information Networking and Applications” is to provide the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.