Category Archives: Architecture

Who’s Managing & Securing Your Information Assets?

What is meant by Information Architecture (IA)?

Information architecture (IA) focuses on organizing, structuring, and labeling content in an effective and sustainable way. The goal is to help users find information and complete tasks.

There must be a common consensus, an understanding of each data point collected, and the appropriate labeling and cataloging of the Information Asset. Information assets may have a score attributed to the asset and leveraged in a multitude of ways, such as guidelines for the purging of archives, sensitivity of the information, and the levels of trust.

For each data point collected, correlations/relationships can be added either manually, or through an Induction Engine (AI) leveraging a history of relationships. The definition of hierarchical relationships between data points, and link types (e.g. processor, successor, child, or generally related) further to bolster a larger lexicon.

What are Information Assets?

For example, your phone number is an information asset. Your phone number is provided to everyone you know and is a primary point of reference to contact you. Traditionally, the “phone companies” manage that resource for you. However, in this “new” day and age, we see companies like Google providing a phone number, and as a result providing features not generally available, such as Google Voice, with Call Forwarding, and obfuscation.

Common, Consumer, Information Assets Include:

  • Documents of ALL Types, e.g. text, spreadsheets, presentations, etc.
  • Domain Names and Email Addresses are Information Assets.
  • Twitter, Facebook, Instagram, and Other Social Media Platforms Assets, such as User Names, Post Text, Images, Video, and Profile details.
  • Skype, WhatsApp, and other VoIP Info Assets such as Phone Number, User Profile information
  • Windows Teams, Slack, and other Team Collaboration, Information Assets, such as the historical, ongoing posted information in the Team Chat, including the integration of 3rd party apps, such as Whiteboard collaborative drawings.
  • Passwords, Passwords, Passwords

Common, Corporate, Information Assets Include:

  • All of the Consumer, Information Assets PLUS
  • Documents of ALL Types, e.g. Solution Architecture docs, Database Models, HR Policies, Org Charts, Corp. Network Topography, etc.

Disaster Recovery for Information Assets

What happens when the technology managing information assets become “unavailable”? What is your impact assessment? Is there a centralized data/information catalog or repository that contains a partial or complete set of Information Assets?

Information Assets are also passwords, and we have a plethora of “secure” password managers, such as Norton Antivirus provides a mechanism to hold passwords in a virtual “safe”.

Insurance Policies for [digital] Information Assets

What is the cost of securing these Information Assets, verse the payment of recuperating the information assets, if even possible?

What about Hackers that “hold your data/information” hostage?

How to price out “Insurance” for your information, just like safeguarding any other personal articles insurance policies today? Are there “Personal Articles, Insurance Policies” that can currently add a rider to your existing policies? Need to price out “Information Assets”, and the recuperation values?

Norton Life Lock [Personal / Business]

Norton LifeLock reimburses funds stolen due to identity theft up to the limit of the plan total not exceeding $1 Million USD.

Notes Repositories

Notepads like Notepad++, Microsoft OneNote, and Google Keep are tools that allow their authors to quickly take notes and organize them. A wide array of Information Assets are contained within these applications, such as text, and photos with some data describing the information captured (i.e. metadata). Gathering and exporting this information to reference Information Assets could be a lengthy and laborious process without automation, rules for sorting, and tagging info.

AI Induction and Rules Engines

Dynamically labeling Information Assets as they are “discovered”, an auto curation process. For example, the Microsoft Outlook rules engine has a robust library of canned AI rules for sorting, forwarding, formatting as emails arrive in your inbox, as well as a host of other rules “triggers”. An Induction engine is a predictive instrument that “observes” behavior over time, and then creates/suggests new rules on the basis of the history of user behavior. For example, if MS Outlook had an AI Induction engine, and observed a user ‘almost’ always moving an email with the same subject to folder N, the AI Induction engine could create the rule to anticipate the user’s behavior.

Data Lakes or Sea of Information Assets

  • Structured, Semi-Structured, and Unstructured data.
  • Labeling/tagging Information Assets in a consistent fashion.
  • Retrieval of data, and cross-referenced data types

19 Best Data Catalog Tools and Software for 2020

Extract –

Tool: Alation Data Catalog

Description: Alation is a complete repository for enterprise data, providing a single point of reference for business glossaries, data dictionaries, and Wiki articles. The product profiles data and monitors usage to ensure that users have accurate insight into data accuracy. Alation also provides insight into how users are creating and sharing information from raw data. Customers tout the product for its expansive partner ecosystem, and Alation has focused on increasing data literacy when metadata is distributed across business and IT.

Related Articles from this Site:

Agile Adoption Challenges: Outside the Circle of Trust

  • Outside the Product Owner and the implementation team, senior stakeholders may require milestones articulating deliverables.
    • Epics or Themes, high-level declaration of the “Release” essence, rolls up from Features, and Product Backlog Items (PBI). Relative effort estimations may be applied at the PBI level, and then rolled up to calculate/guestimate the duration of Epics.
    • Look toward SAFe (Scaled Agile Framework) to change the culture by providing an opportunity for the entire organization to participate in the Agile process. “Product Increments” present windows of opportunity every 8 to 10 weeks.
    • Product Increments may involve multiple scrum teams, their scope, and how these teams may intersect. In order to synchronize these Scrum Teams, SAFe introduces Agile Release Trains (ART), and Release Train Engineers (RTE) to coordinate cadence of the scrum teams to be in alignment with Epic and Feature deliverables.
  • Stakeholders may require a “waterfall” plan to understand delivery timeframes for milestone artifact deliverables. For example, “When do we deliver in the plan? We have dependencies on XYZ to build upon and integrate”
    • External teams may have dependencies on artifacts delivered in the plan thus cross scrum team interaction is critical, sometimes through a reoccurring ceremony “Scrum of Scrums“.
  • Additional transparency into the scrum team or the “Circle of Trust” can be provided through the use of Dashboards. Dashboards may contain widgets that produce real-time views into the current initiative. Key Project Indicators (KPIs), metrics being monitored to determine the success of Product ABC Epic Phase completion.
    • Dashboards may include: Average Team Velocity, Burn Down, Burn Up, Bug Status by Severity, and metrics that are initiative focused, e.g. N out of Y BI Reports have been completed.

Cloud Serverless Computing: Why? and With Whom?

What is Cloud Serverless Computing?

Based on your application Use Case(s), Cloud Serverless Computing architecture may reduce ongoing costs for application usage, and provide scalability on demand without the Cloud Server Instance management overhead, i.e. costs and effort.
Note: Cloud Serverless Computing is used interchangeability with Functions as a service (FaaS) which makes sense from a developer’s standpoint as they are coding Functions (or Methods), and that’s the level of abstraction.

Microsoft Flow

 

Microsoft Flow Pricing

As listed below, there are three tiers, which includes a free tier for personal use or exploring the platform for your business.  The pay Flow plans seem ridiculously inexpensive based on what business workflow designers receive for the 5 USD or 15 USD per month.  Microsoft Flow has abstracted building workflows so almost anyone can build application workflows or automate business manual workflows leveraging almost any of the popular applications on the market.

It doesn’t seem like 3rd party [data] Connectors and Template creators receive any direct monetary value from the Microsoft Flow platform.  Although workflow designers and business owners may be swayed to purchase 3rd party product licenses for the use of their core technology.

Microsoft Flow Pricing
Microsoft Flow Pricing

Microsoft Azure Functions

Process events with a serverless code architecture.  An event-based serverless compute experience to accelerate development. Scale based on demand and pay only for the resources you consume.

Google Cloud  Serverless

Properly designed microservices have a single responsibility and can independently scale. With traditional applications being broken up into 100s of microservices, traditional platform technologies can lead to significant increase in management and infrastructure costs. Google Cloud Platform’s serverless products mitigates these challenges and help you create cost-effective microservices.

Google Serverless Application Development
Google Serverless Application Development

 

Google Serverless Analytics and Machine Learning
Google Serverless Analytics and Machine Learning

 

Google Serverless Use Cases
Google Serverless Use Cases

 

Amazon AWS  Lambda

AWS provides a set of fully managed services that you can use to build and run serverless applications. You use these services to build serverless applications that don’t require provisioning, maintaining, and administering servers for backend components such as compute, databases, storage, stream processing, message queueing, and more. You also no longer need to worry about ensuring application fault tolerance and availability. Instead, AWS handles all of these capabilities for you, allowing you to focus on product innovation and get faster time-to-market. It’s important to note that Amazon was the first contender in this space with a 2014 product launch.

IBM Bluemix OpenWhisk

Execute code on demand in a highly scalable serverless environment.  Create and run event-driven apps that scale on demand.

  • Focus on essential event-driven logic, not on maintaining servers
  • Integrate with a catalog of services
  • Pay for actual usage rather than projected peaks

The OpenWhisk serverless architecture accelerates development as a set of small, distinct, and independent actions. By abstracting away infrastructure, OpenWhisk frees members of small teams to rapidly work on different pieces of code simultaneously, keeping the overall focus on creating user experiences customers want.

What’s Next?

Serverless Computing is a decision that needs to be made based on the usage profile of your application.  For the right use case, serverless computing is an excellent choice that is ready for prime time and can provide significant cost savings.

There’s an excellent article, recently published July 16th, 2017 by  Moshe Kranc called, “Serverless Computing: Ready for Prime Time” which at a high level can help you determine if your application is a candidate for Serverless Computing.


See Also:
  1. “Serverless computing architecture, microservices boost cloud outlook” by Mike Pfeiffer
  2. “What is serverless computing? A primer from the DevOps point of view” by J Steven Perry