
Where Should Architects Be Focused as the Hype Cycle Goes Crazy?
By Paul Preiss, od Iasa Global As I’ve heard from many a member, I’m getting a bit annoyed with the media attention to AI. If they were to be believed, I would be speaking with […]
By Paul Preiss, od Iasa Global As I’ve heard from many a member, I’m getting a bit annoyed with the media attention to AI. If they were to be believed, I would be speaking with […]
(Editor’s Note: What follows is an excerpt from Empowered Agile Transformation – Beyond the Framework, a book by Alexandra Stokes. For more on Stokes and how to buy her book, see her bio at the […]
The San Diego Supercomputer Center (SDSC) at UC San Diego has hired a new Chief Technology Officer, Rick Wagner. As a member of the center’s leadership team, he will play a key role in the […]
(Part 1 appeared yesterday in A&G here) Dr. Gopala Krishna Behara Generative AI Adoption Steps The following are the steps to follow to perform Generative AI adoption across the enterprise. Figure 2: Generative AI Adoption […]
By Shammy Narayanan A few days back, I took to LinkedIn to highlight the culinary catastrophe of mutton Biryani being crowned a “Non-Guilty” pleasure on a food delivery app. In a world where Biryani is […]
By Jason Baragry, Chief Enterprise Architect at Ardoq Change is a constant for any organization. The drivers pushing change can be internal or external and include market pressures, regulatory and legal compliance, and adaptation to […]
By Crystal Morin, Cybersecurity Strategist It should come as no surprise that developers prefer building cloud-based applications because the cloud makes it easier to deploy and run apps. According to Stack Overflow’s 2023 Developer Survey, […]
By Andy Ruth, Notable Architect (Part 1 appeared Tuesday here.) As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the […]
By Andy Ruth, Notable Architect As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the request, so identity, device, […]
The draft cyber resilience act approved recently by the Industry, Research and Energy Committee aims to ensure that products with digital features, e.g. phones or toys, are secure to use, resilient against cyber threats and […]