article thumbnail

Course Enterprise Architecture – Step 1 – Strategy

Xebia

My second run as teacher Enterprise Architecture is near the finishline and still loving it. architecture #enterprisearchitecture #masterofscience Enterprise Architecture – Step 1 – Strategy Enterprise Architecture as a topic is evolving and gaining in interest at various organizations in the Netherlands and abroad.

Course 130
article thumbnail

What is enterprise architecture? A framework for transformation

CIO

Enterprise architecture definition Enterprise architecture (EA) is the practice of analyzing, designing, planning, and implementing enterprise analysis to successfully execute on business strategies. Another main priority with EA is agility and ensuring that your EA strategy has a strong focus on agility and agile adoption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How an architecture-led transformation puts the customer first

CIO

At Discover® Financial Services, our customers and their trust are key drivers of our technological decisions. With this in mind, we embarked on a digital transformation that enables us to better meet customer needs now and in the future by adopting a lightweight, microservices architecture.

article thumbnail

CIOs rethink all-in cloud strategies

CIO

C R Srinivasan, EVP of cloud and cybersecurity services and chief digital officer at Tata Communications, sees many enterprises “getting more nuanced” with their cloud use and strategies in an effort to balance performance, costs, and security. “As Cloud Computing, Data Center, Edge Computing, Hybrid Cloud, IT Strategy, Multi Cloud

Strategy 361
article thumbnail

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

In his best-selling book Patterns of Enterprise Application Architecture, Martin Fowler famously coined the first law of distributed computing—"Don’t distribute your objects"—implying that working with this style of architecture can be challenging. How these strategies can be applied in different size engineering organizations.

article thumbnail

How technology is enabling Melbourne Airport’s growth

CIO

Technology has a key element in that broader corporate strategy in that last year was the first time we embedded technology as part of our corporate scorecard. The team and I pulled together a technology strategy focused on enabling the corporate strategy.” Cisco underpin everything we do,” says Tomai.

article thumbnail

Operational technology systems require a robust Zero Trust strategy in 2024

CIO

Cyberattacks on operational technology (OT) systems are rapidly rising. This, coupled with the difficulties in operating excessively complex systems creates exponential risk from threat actors, often with the threats outpacing the ability of the technology teams to prevent attacks.

System 254
article thumbnail

The Forrester Wave™: AI/ML Platforms: Vendor Strategy, Market Presence, and Capabilities Overview

As enterprises evolve their AI from pilot programs to an integral part of their tech strategy, the scope of AI expands from core data science teams to business, software development, enterprise architecture, and IT ops teams. The Forrester Wave™ evaluates Leaders, Strong Performers, Contenders, and Challengers.

article thumbnail

Serverless and Containers: How to Choose the Right Application Strategy

Speaker: Tolga Tarhan, Senior Vice President, GM AWS Services at Onica

How do you, as a technology leader, point your team in the right direction, especially given how quickly this is evolving? The session will cover a lot of ground, including: An overview of Containers and Serverless technologies with a focus on key differences.

article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered. What methods and architectures you should consider to proactively protect your data.