For this week’s “In the News”, research and article that discusses today’s approach to Enterprise Architecture. Specifically, how has a recent organization modified their architecture to meet an acquisition, divesture, or change in business?
Reader Interactions
Comments
Leave a Reply
You must be logged in to post a comment.
Mohammed Syed says
https://www.consultancy.asia/news/4735/designing-the-new-age-enterprise-architecture-in-banking
This news article is about the new age of enterprise architecture in banking. The digital transformation changes the ways of accelerating the business every maximum work transforming on digitalization, so business entirely relies on digitalization and needs to adopt one of the best enterprises architectures to face upcoming challenges. Architecture is available in traditional enterprises, providing guidelines to design new-age enterprises.
The new technology builds customers, digital challenges, and data management to design new-age enterprises. Enterprises Architecture should be designed as per the requirement of organization culture, the administration, and business strategies. Traditional architecture systems focus more on stability and security. Still, new age architecture focuses on the value of creativity for customers, which removes the gap between the customer expectation and enterprises’ delivery. Most organizations modified enterprise architecture as new challenges to the evolutionary businesses based on the continuous integration and Continuous Development structure in modular design. Modular components are self-sustained independent service-oriented building blocks capable of modification as per the new age of technology.
Kelly Sharadin says
The European Digital Markets Act (DMA), expected to be implemented this year, will require messaging app companies to be interoperable if one messaging app company requests interoperability from another. For example, Facebook (Meta), with its acquisition of WhatsApp, would need to be able to support encryption between Signal and Apple’s iMessage or vice versa under the DMA. Cryptographers question whether such interoperability is “possible without compromising end-to-end encryption” due to each app’s custom encryption protocols. However, to address cross-platform encryption challenges, a non-profit organization, Matrix, is developing an open-source standard for encryption (Matrix messaging protocol. Proponents of the DMA are proposing two solutions that would force organizations to either “adopt and implement one universal encryption standard” or bridge platforms through an open API to support encryption interoperability. Understanding the challenges introduced by bridging encrypting and decrypting through an open-source API, how is SecDevOps feasible? To rebuild current cryptographic systems with the proposed open-source protocols requires a complete overhaul of a company’s enterprise security architecture as new threat vectors are introduced via bridged networks.
https://www.wired.com/story/dma-interoperability-messaging-imessage-whatsapp/
Shubham Patil says
The news article talks about how EA was designed to identify, understand, and maximize the cost-effectiveness of the IT infrastructures companies created in their march from mainframes to distributed computing. This requires central repositories of information about their IT infrastructure and the applications and business processes they support. But too often, according to critics, EA focuses on cost-cutting and control over innovation, describing technology rather than the business processes that leverage it. And in an era when businesses must change ever more quickly, its pace too often acts as an impediment to transformation.
This is enterprise architecture in the age of agile. Rather than spend months or years modeling and cataloguing a business’ technology and business processes in an often-futile attempt to enforce product standards, agile EA practitioners and vendors seek to work more closely with teams developing “products” such as applications for employees or customers. They try to deliver value quickly, work closely with product teams, and develop architectural principles rather than an inflexible list of platforms product developers are permitted to use.
By adopting agile EA principles, EA practitioners can track, describe, and recommend changes to that architecture quickly and clearly enough to adapt it for ever changing business needs.
https://www.arnnet.com.au/article/694206/enterprise-architecture-agile-era-less-policing-more-coaching/
Kyuande Johnson says
https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture
As Cyber Security incidents reach an all-time high in this recent year. Many Organizations are aware necessity and impact of cyber security. Many organizations are transitioning into a zero-trust architecture. Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data. NIST SP 800-207 has developed a guide for Zero Trust Architecture. This enables organizations to know the architecture, including users, devices, services, and data. It enables them to know the users, services, and device identities. Assess user behavior, service, and device health, Use policies to authorize requests, Authenticate and authorize everywhere, Focus your monitoring on users, devices, and services, Don’t trust any network, including your own, and Choose services that have been designed for zero trust. Zero trust security framework is becoming the preferred network security architecture.
Kelly Sharadin says
Hi Kyuande,
Great example with Zero Trust. Biden’s Executive Order on improving cybersecurity explictly identified Zero Trust as a national standard that organizations should adopt. As you outline, so many organizations are “in the dark” when it comes to visibility regarding devices and services. I like that you shared a NIST guide for Zero Trust I didnt know this was out there yet. My company has a Zero Trust model so thisis a helpful resource thanks!
Kelly
https://www.cisa.gov/executive-order-improving-nations-cybersecurity
Vraj Patel says
One of the articles on the InfoWorld mentions that the budgets of the IT will be increasing to 51% which is being spent on the cloud computing. According to Gartner’s research, organizations are spending 41 percent of their IT budget on cloud computing in 2022, and that percentage will rise to 51 percent by 2025. As the cloud computing is growing and as it provides more flexibility to the organization to have their application software, infrastructure software, business process services, and system infrastructure to run in cloud. The organization are transiting more towards having their network on cloud rather than the systems on-premises. In addition, according to this article, having an enterprise architecture in the cloud is more cost-effective than having it on-premises.
Reference:
https://www.infoworld.com/article/3650768/it-spending-will-soon-shift-to-mostly-cloud.html
Oluwaseun Soyomokun says
Enterprise architecture has fostered a new culture of participation in terms of software architecture between Broadcom and VMWare open doors for creative technology to reach both corporate and telco companies., one of VMware’s key aims for the year was to make all its major products available as subscription or SaaS services. Specifically, all of our SDDC [software defined data center] offerings will become cloud delivered software, joining our Tanzu cloud management, security, and end user SaaS offerings, and will help accelerate our business model transformation. VMware CEO Raghu Raghuram said during the company’s February financial analysts call.
The company is off to a fantastic start, reporting $899 million in subscription and SaaS revenue for the first fiscal quarter of this year, which ended May 1, up 21% year over year.
SaaS and subscription revenue accounted for 29% of overall revenue in the quarter, up from 29% in the previous quarter.
https://www.arnnet.com.au/article/698542/how-will-broadcom-vmware-move-enterprise-networking-forward/?fp=2&fpid=1
Kelly Sharadin says
Hi Oluwaseun,
Cloud infrastructures have certainly disrupted enterprise security architecture. For SaaS customers while there are cost operative benefits but there are also increasing security risks due to a lack of control. For instance how does an organization ensure avaliability of resouces when relying on a SaaS provider or prevent the risk of exposing sensitive information as seen with Azure’s Cosmos Database vulnerability? Cloud has many benefits but requires a full understanding of potential security risks when designing enterprise architectures that rely on such services.
https://winbuzzer.com/2021/08/27/microsoft-azure-cosmos-db-is-leaving-customer-data-exposed-online-xcxwbn/
Kelly
Antonio Cozza says
This article from prnewswire discusses how enterprise architecture should now be implemented into an organization while using an agile framework; it indicates that research by Info-Tech Research Group suggests that businesses should have an “agile organizational structure and be agile in its delivery” by guiding operations with strategic design principles (prnewswire). To successfully implement an agile EA, Info-Tech recommends the following: 1. Design the operating EA model, 2. Define the organizational EA model to sustainably meet stakeholders’ needs, and 3. Implement the EA model with strong communication and in phases. Using this model, Info-Tech Research Group has been able to successfully advise CIOs and other IT leaders in creating and implementing stronger business architectures that are sustainable and regularly improve towards the desired future state for different business processes,
https://www.prnewswire.com/news-releases/an-agile-enterprise-architecture-operating-model-is-achievable-says-info-tech-research-group-301509347.html
Anthony Wong says
According to this Redhat article, there are various upcoming trends when it comes to Enterprise Architecture. To highlight one is the integration of artificial intelligence and machine learning. The benefits of this can help data scientists provide greater business intelligence for the business to make favorable decisions further increase their revenue. However, the article states, enterprise architects will face challenges when it comes to what data is being collected and taking in account the end users feedback and incorporating a solution into their design. Data has become increasingly demanded due to the modeling and insight it provides to an organization.
https://www.redhat.com/architect/2022-trends-enterprise-architects
Mitchell Dulaney says
“Five areas where EA matters more than ever”
Robert Scheier describes for CIO.com five ways that enterprise architecture has become even more critical to the IT functions of modern organizations. First, he explains that effective enterprise architecture enables resiliency and adaptability by mapping out processes that require the input of suppliers and contract employees who are more at-risk of becoming unavailable for a number of reasons, as well as utilizing cloud computing and other on-demand resources to make up for reduced internal resources. Enterprise architecture can also play a role in recruitment and employee retention, by ensuring that systems and processes that employees have to use are working efficiently and by improving the onboarding process for new staff. Effective enterprise architecture improves the tracking of different data sets throughout an organization, and enables the company to pinpoint areas where direct communication via API’s between different data processing systems would improve business functions.
https://www.cio.com/article/350284/five-areas-where-ea-matters-more-than-ever.html
Tal Eidenzon says
Microsoft Confirms Exploitation of ‘Follina’ Zero-Day Vulnerability
New Zero-Day Vulnerability confirmed by Microsoft: malicious Word file designed to execute PowerShell code. The exploit would be sent to the target via an attached Word document, which upon launching would call a remote code execution that would be able to wreak havoc on the system with the same elevated privileges with which the document was opened.
Additionally, Microsoft did not release patching for it even though it became aware of the issue in April.
https://www.securityweek.com/microsoft-confirms-exploitation-follina-zero-day-vulnerability