
Technology is Crack and We are the Dealers
By Paul Preiss, IASA Global CEO and founder Everyone knows the hype curve. It’s considered a stable and a standard of our industry. Ever ask yourself why? We are a world full of professional adults […]
By Paul Preiss, IASA Global CEO and founder Everyone knows the hype curve. It’s considered a stable and a standard of our industry. Ever ask yourself why? We are a world full of professional adults […]
By Andy Mills The Application Programming Interface (API) is now the bedrock of our digital ecosystem, acting as the glue between systems and applications and enabling businesses to rapidly deliver services. However, APIs are frequently […]
By Shammy Narayanan A few days back, I took to LinkedIn to highlight the culinary catastrophe of mutton Biryani being crowned a “Non-Guilty” pleasure on a food delivery app. In a world where Biryani is […]
By Jason Baragry, Chief Enterprise Architect at Ardoq Change is a constant for any organization. The drivers pushing change can be internal or external and include market pressures, regulatory and legal compliance, and adaptation to […]
By Siddesh Mahadik Mergers and acquisitions are in the news again, and this time it is the financial institutions themselves that have been merged, or forcibly acquired in H1 2023 due to the recent banking […]
Featured in this week’s spotlight is Susan Saunders, Senior Enterprise Architect of WPP – Strategy & Architecture. Saunders is responsible for Big Picture Architecture, Architecture Governance and dual facilitator of WPP Architecture Community of Practice. […]
By Crystal Morin, Cybersecurity Strategist It should come as no surprise that developers prefer building cloud-based applications because the cloud makes it easier to deploy and run apps. According to Stack Overflow’s 2023 Developer Survey, […]
By Andy Ruth, Notable Architect (Part 1 appeared Tuesday here.) As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the […]
By Andy Ruth, Notable Architect As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the request, so identity, device, […]
By James Brown, of Haynes Boone Like electricity or the internet, artificial intelligence (“AI”) has the potential to change our world. Whilst it may bring huge benefits, there is also a considerable risk of harm. Many […]