Category Archives: Architecture

Architecture

Strategic Technology: Web Analytics (CoreMetrics)

This entry is part 33 of 33 in the series Strategic Technologies

This entry is part 33 of 33 in the series Strategic TechnologiesWeb Analytics solutions help improve Web sites by analyzing real time information or information gathered from Web server logs to uncover usage patterns. Simple, free Web analytics solutions are popular such as Google Analytics. IBM CoreMetrics is a popular paid Web Analytics solution.  Others… Read More »

Strategic Technology: Strong Mobile Authentication (SoftKEY)

This entry is part 31 of 33 in the series Strategic Technologies

This entry is part 31 of 33 in the series Strategic TechnologiesWe all dutifully endure the user ID and password on the hope that it will preserve our privacy, money and identity. As we need more and more user IDs and passwords we begin to reuse them and write them down, making them easier for… Read More »

Strategic Technology: Service Virtualization (GreenHat)

This entry is part 30 of 33 in the series Strategic Technologies

This entry is part 30 of 33 in the series Strategic TechnologiesService Virtualization encompasses a strategy and tool set for stubbing out components that provide services required to run a component under test.  An example service virtualization tool is IBM’s Rational Test Virtualization Server (formerly GreenHat).

Strategic Technology: Release Coordination (UrbanCode Release)

This entry is part 29 of 33 in the series Strategic Technologies

This entry is part 29 of 33 in the series Strategic TechnologiesSoftware development teams following an agile process to incrementally develop, build, deploy and release enterprise applications quickly find that keeping track of all of the components and inter-dependencies becomes unmanageable.  Spreadsheets become laborious to maintain and do not track the process and keep a… Read More »

Strategic Technology: Application Deployment Automation (UrbanCode Deploy)

This entry is part 28 of 33 in the series Strategic Technologies

This entry is part 28 of 33 in the series Strategic TechnologiesContinuous Integration and other modern code development practices seek to manage scale and complexity, and increase speed and quality, by introducing automation across the software development life cycle (SDLC).  This is especially true of areas that occur frequently and contain many repetitive steps such… Read More »

What is PCI DSS Compliance?

This entry is part 31 of 31 in the series Defining words

This entry is part 31 of 31 in the series Defining wordsThe PCI Security Standards Council provides the PCI Data Security Standard (PCI DSS).   Certain organizations including financial services providers need to be compliant with this standard as evidence that they protect payment card holder data (CHD). The first step to applying the standard is… Read More »

IT Capability: User Centered Design

This entry is part 10 of 10 in the series Strategic IT Capabilities

This entry is part 10 of 10 in the series Strategic IT CapabilitiesThe IT group is usually tasked with designing new applications.  I am not sure I advocate that but that is what I have seen in practice at banks.  Therefore, I categorize User Centered Design as an IT Capability. The following diagram lifted from… Read More »