Recent ARTICLES published in #LinkedIn

Are Clouds now heading to a Thunderstorm? by Michael Poulin, 2022. Does #Enterprise #Architecture need #protection in a #digital world? by Michael Poulin, 2022. If experts still define EA differently, what is EA actually?  by Michael Poulin, 2022. This is the article #100; 12,184 Impressions.  Shared Services in a Nutshell by Michael Poulin, 2022.  Risks of …

#Code of #DevOps #Practice

Code of DevOps Practice is an open proposal for organising creative work of DevOps in modern enterprise. The document includes: subject, cause, values, pillars and principles of the DevOps development as well as some best practice recommendations and a list of referred articles.

#Why We Need #Agile #Agility for #DevOps

While DevOps have elevated delivery velocity to the level that only Sun is higher and made it the goal and work effectiveness criteria (regardless quality), they still claim they are agile. The article takes a look into Agile Manifesto and Scrum Guide for the role of velocity. Neither the Agile Manifesto nor the latest version of the Scrum Guide (2017) reveals velocity at all, but have many loopholes inherited by DevOps.

Problems in #Microservice #QA and #Solutions

One of the major task of DevOps is a speedy delivery of Microservice into production. The major objective of QA and Testing is to find as many bugs as possible. Fixing these bugs slows down the delivery. The article describes this conflict in details, outlines problems in testing articulated by Mr Martin Fowler, proposes additional tests and explains how to improve quality of the released Microservices.

#Microservice #Protection based on the principle of #Zero #Trust

The task addressed in the article is about protecting Microservice’s functionality and resources in the inter-Microservice interactions. Known techniques like OpenID Connects, JWT and OAuth2 were reviewed from the perspective of Microservice interactions. It has been found that these techniques cannot be applied as-is to the Microservices either because unanswered questions to them or because of doubtful trustfulness of related workflows.
The article proposes two protective methods for Microservice (or service) that have sensitive functionality and/or resources. While the Basic Protection Method is just a classic identity verification and following access permission control, the method does not require single centralised Identity and Permission Authorities. The latter can be distributed as needed following the distribution of Microservice-based applications. The Closed Optimised Protection Method replaces Identity and Permission Authorities with Dependency Catalogue Service per application and provides full protection with performance comparable with OpenID-JWT/OAuth2.

Split and Join of #Functional and #Informational #Microservices

Article defines Functional Microservices using gRPC interface versus Informational Microservices accessible via RESTful interface. The Functional Microservices are validated against distortionless criteria. The code example of Interface definition for Functional Microservice is provided together with options allowing passing data together with function invocation.

#Distorted #Microservices

People like rubbish because it is convenient… Almost a Fairy-Tale about Microservices Are We Clear about What is What? Let’s Expose the ‘Devil’ that is Sitting in Details Distortions 1 to 12 A First Glance on Modelling Distortionless Microservices Almost a Fairy-Tale about Microservices Once upon a time, technology was conquered by marketing buzz and …

#Contribution of #Architects into #Testing

Article discusses issues with modern light-weight testing applied via automation in DevOps practice and states that such testing is not necessarily enough for quality products, especially in the case of distribution in Cloud.

How smart is #Smart #Contract?

The first time I heard about the automation of contract negotiation and agreement in 2001-2002. It was written in ebXML (backed by OASIS and UN/CEFACT).  It was an amazing achievement because the first SML Conference took place just in 2001. The endeavour fails because of two major reasons, as I learnt later: Recent splash of …

Jamming #ISO #20022 into #Open #Banking #API makes them #REST-ish, not #RESTful

This case is a perfect example where a business value requires an adequate technical instrument, but when the instrument is driven by technology convenience, nobody cares about the business values. We are talking about a well-known problem that UK Open Banking (OB) and EU PSD2 face with financial transactions. It seems that the technology considerations …

#Demystifying #Digital #Product #Management – the new #Gartner’s promotion

Published on July 21, 2019 For #Business & #Technology #Executives, Product Managers, and Business and #Enterprise #Architects The Subject & Context Recently Gartner published the research – “How Unlocks Digital Product Management Opportunities for New Value Creation”, authored by Analyst Lars Van Dam – has caught my attention with a new term “Digital Product Management”. …

Three Major #Principles of #Technology #Innovations

Published on January 22, 2019 To Architects, Developers and thier Managers #1 An Innovation may not harm its Consumers #2 An Innovation may not harm its Owner(s) #3 Disallow any exceptions from Principle #1 and Principle #2 Technology has reached such a point where people have to apply the rule created last century to nuclear power. …

Do we really need identity propagation in SOA and Clouds?

2012 IT developers and, especially IT Security specialists struggled for years trying to create an identity control at the enterprise level. The most known initiative and model in this area is Single Sign On (SSO) where an identity of an end-user can be propagated between systems and can be recognized across an enterprise. In today’s …

#Purpose #Case #Management and #Solution #Flexibility #Estimate

2012 Preamble After many years of process-dominating approach to our work, we have collectively “discovered” that the process is not the only way of doing things. There are many unstructured activities and even social activities that have to be governed and managed. These activities affect our daily productivity and, at the end, an efficiency of …

Internet of Things is premature for our current culture

2015 This blog has been sparked by a small information in the London’s Evening Standard newspaper – “London Bridge chaos continues with fare glitch”. For those who are distant from London, let me explain – one of the most busy and central train stations – London Bridge – has been moved under reconstruction a few …

SOA Strategy and Spline Tactics

2010 First things first: ‘SOA Strategy’ in the title of the article stands for ‘Service-Oriented Agile Strategy’,’ and we will talk about how to transform IT to make it agile to Market. ‘Spline’ is a term unusual to non-mathematicians. In simple words, spline is an interpolation function that balances between the smoothing and closeness to …

Logging for SOA – an enterprise-level solution

SOA & WOA, 2008 Reads: 13,996 What could be the problem with logging in SOA in the presence of such wonderful tools like log4j, Java’s logging library and similar? Why might we need something special for SOA and why aren’t existing techniques enough? The answer is simple and complex simultaneously – in SOA we are …