Category Archives: Architecture

Architecture

Strategic Technology: JavaScript, Frameworks and Libraries

This entry is part 27 of 33 in the series Strategic Technologies

This entry is part 27 of 33 in the series Strategic TechnologiesI feel a little crazy listing JavaScript as a strategic technology — Even more crazy enumerating the related frameworks and libraries, which seem to replace each other far too frequently to be considered “strategic”.  But I want to make the point that how you… Read More »

Anatomy of a BlueMix App

This entry is part 2 of 2 in the series Start here

This entry is part 2 of 2 in the series Start hereWhen you start out to create a cloud-based app it helps to understand the environment that it will run including the components that are external to it as well as the framework and runtime components that are integral to it. An app runs both… Read More »

Reading List: Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

This post covers the IBM Red Paper:  Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection (redp4826). The book is about addressing new kinds of network threats such as advanced persistent threats (APTs), stealth bots, targeted application attacks, and designer malware.  For an up-to-date understanding of the threat landscape the reader is referred… Read More »

Reading List: Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

This post covers the IBM Redbook: Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security published in April 2013. This book provides an introduction to the IBM security framework and blueprint.  I do not cover this here because I previously covered it in my post Managing Security and Compliance in Cloud… Read More »

Reading List: Managing Security and Compliance in Cloud or Virtualized Data Centers

In this post I cover the IBM Red Book SG248082:  Managing Security and Compliance in Cloud or Virtualized Data Centers. The IBM Security Framework provides a top-level view on security: At the second level of detail IBM provides Security Blueprint. The Security Blueprint categorizes and defines security capabilities and services that are required to answer… Read More »

What are IBM CCRA and CCMP?

This entry is part 30 of 31 in the series Defining words

This entry is part 30 of 31 in the series Defining wordsThe IBM Cloud Computing Reference Architecture (CCRA) and Common Cloud Management Platform (CCMP) are useful to understanding the IBM Private Modular Cloud (CMP). CCMP includes Operational Support Systems (OSS) and Business Support Systems (BSS). At the highest level the IBM point of view can… Read More »

Strategic Technology: Mobile Money Apps (Monitise)

This entry is part 25 of 33 in the series Strategic Technologies

This entry is part 25 of 33 in the series Strategic Technologies  IBM and Monitise have recently announced a partnership to deploy new mobile banking, payments and commerce solutions. Monitise provides services to more than 350 financial institutions and has partnerships with most UK high street banks. It also has strategic partnerships with Visa Europe,… Read More »