Mastering Technology Takes Longer Than You Think

Things move fast in the IT industry. Half of the technologies I use today didn't exist ten years ago. There's a constant push to switch to new technologies.  But when it comes to technologies, I'm kind of conservative. I like proven technologies. The thing that makes me conservative is that mastering a technology takes a … Continue reading Mastering Technology Takes Longer Than You Think

Advertisements

Autonomy and Microservices

Discussions monolith vs microservice are hotter than ever. Usually, a monolith is synonym for “big ball of mud” in these discussions. It of course needn’t be so. A modular monolith is perfectly possible. Also, microservices isn’t an entirely new idea either. As some says, it’s SOA done right. The usual argument in favor of microservices … Continue reading Autonomy and Microservices

Do You Need an Architect?

Architects do typically three things: they own, they coordinate, and they mentor. As an owner, the architect maintains the integrity of the system at a high level. He designs the foundations, identifies tradeoffs, decides on essential changes. As a coordinator, the architect facilitates work and optimizes the exchange of information. He connects people, gather information, … Continue reading Do You Need an Architect?

10 Tips to Fail with Enterprise Integration

If you want to make enterprise integration needlessly complicated, follow these tips. 1. Model poorly A poor model is always a nice way to make things more complicated than they should. Examples: You can name thing badly. You can model everyting as strings (key, list, etc.). Or you can reuse overly generic abstractions in multiple … Continue reading 10 Tips to Fail with Enterprise Integration

Threat modeling: tools in practice

We’ve investigated two tools for our threat model. Here is an overview of both tools (from Microsoft) and our experience with them. Threat Modeling Tool The first tool supports system modelling with the definition of Entry Points, Trust Levels, Protected Resources, plus some general background information. Data Flows can be authored directory with the tool … Continue reading Threat modeling: tools in practice