Results of Applying Principles of Organic Business Design

It demonstrates the results of applying Principles of Organic Business Design to the organisation of business. A few of Organic Business Organisation theory definition elements require a new understanding and reinterpretation. A real-world example for one of the retail giants is analysed.

The Major Principles of the Organic Business Design

Dynamics of market changes as well as internal transformation in the organisations are quite high and accelerating. They have reached the degree where the traditional hierarchical business structure (mechanical model) steadily and speedily loses its efficiency and effectiveness. Though known for a long time, the organic business model proves that it is the most adequate for dynamic business transformations.

Ethical AI May Not Control Ethics of the User

This is What We Have I’ve asked MS Copilot a simple statistical question about AI, and it failed to give me an accurate answer. The question was, “How many publications exist today about ethics for AI?” The Copilot, classified by McKinsey & Co. as the Individual Augmentation, i.e., dedicated to the routine daily questions from people, …

Architecture of Business: Architectural Governance

Part 1. Architectural Governance: What and Why A concept of an Architecture of Business organisation (AoB) includes four fundamental artefacts, one of which is an Architectural Governance (AG). The Architecture of Business’s AG is defined as a set of principles, policies and procedures or activities, by which The AG is designed in compliance with existing …

#Code of #DevOps #Practice

Code of DevOps Practice is an open proposal for organising creative work of DevOps in modern enterprise. The document includes: subject, cause, values, pillars and principles of the DevOps development as well as some best practice recommendations and a list of referred articles.

#Microservice #Protection based on the principle of #Zero #Trust

The task addressed in the article is about protecting Microservice’s functionality and resources in the inter-Microservice interactions. Known techniques like OpenID Connects, JWT and OAuth2 were reviewed from the perspective of Microservice interactions. It has been found that these techniques cannot be applied as-is to the Microservices either because unanswered questions to them or because of doubtful trustfulness of related workflows.
The article proposes two protective methods for Microservice (or service) that have sensitive functionality and/or resources. While the Basic Protection Method is just a classic identity verification and following access permission control, the method does not require single centralised Identity and Permission Authorities. The latter can be distributed as needed following the distribution of Microservice-based applications. The Closed Optimised Protection Method replaces Identity and Permission Authorities with Dependency Catalogue Service per application and provides full protection with performance comparable with OpenID-JWT/OAuth2.