Industry Insights from Our Experts

Tag Archives: Architecture

Economies of Scale and Cloud Computing

Comments Off
Filed under Cloud Practice, Growth & Development, Software Architecture

Many of the conversations I have are with business executives who ask: “What value will I see from using the cloud?”

Measuring the Value of IT

According to a 2011 Gartner report, 66 percent of IT spending was used to sustain existing products and services. 1 The report also indicates that 20 percent of IT spending was used for improving on existing products and services, and 14 percent on introducing new ones. The report also shows that these numbers have not changed much over the last 6 years.

As mentioned in the report, there are three core activities that every business tries to achieve. The first is to sustain existing products and services. The second is to improve on existing products and services, and the third is to introduce new ones. These activities, which are also known as: “run, grow, and transform” are each activities that business invest into for IT. Read More »

Is Your Technology Solution a Good Fit for the Cloud?

Comments Off
Filed under Software Architecture

Are you considering, or just wondering about, how you might be able to leverage the “cloud” for your software application?

Let’s put this into a scenario… You are at an organization where all of your information technology resides on-premise. The desktop workstations and laptops are all interconnected via an internal network and connectivity is available to internal email, application, database, and file storage services. Heck, let’s say that even your phone system uses a centrally managed IP based software solution.  Everything you need for your day-to-day operations is available within your organization’s self-managed and on-premise technology infrastructure. Read More »

Windows Communication Foundation Security Must Reads

Comments Off
Filed under .NET, Software Architecture

I’ve been on a bit of a Windows Communication Foundation (WCF) security kick lately. Maybe because of all the Azure and cloud based development we’ve been doing here at Quercus Solutions.

Here are my top reads for all things WCF Security (so far):

  1. Windows Communication Foundation (WCF) Basic Programming Lifecycle : http://msdn.microsoft.com/en-us/library/ms732098
     - Note section titled Parameters and Return Values : Data Contracts
  2. Securing Services and Clients : http://msdn.microsoft.com/en-us/library/ms734736
  3. Message Security in WCF : http://msdn.microsoft.com/en-us/library/ms733137.aspx
  4. How to: Use Transport Security and Message Credentials : http://msdn.microsoft.com/en-us/library/ms789011
  5. Microsoft Patterns and Practices – Improving Web Services Security Guide : http://wcfsecurityguide.codeplex.com/wikipage?title=Ch%2007%20-%20Message%20and%20Transport%20Security%20in%20WCF-
    - Note the Protection Level section for ServiceContract the attributes.
    - Pay attention to the Internet Scenarios section.

Also, another great reference: http://wcfsecurityguide.codeplex.com/






Application Types

Comments Off
Filed under .NET, Software Architecture

Yes, a rich internet based web application would be awesome, but is it really what you need? I would love to own a new Porsche 911, but not if I am using it to haul around building supplies for my construction company (unless it was balsa wood, maybe).

Just like using the right vehicle for the job, so should you be using the right software application for the right job. Here is an overview of the different application types that exist today, and some information about each to help you better understand your options when considering a new software application… Read More »

Federated Claims Based Security

Comments Off
Filed under SharePoint, Software Architecture

Systems are becoming more and more interconnected each day. Coordinating all that interconnectivity becomes a challenge, especially in terms of security. A party or client, such as a user, web service, web site, or even another device, may need to collaborate with more than one system. Using a claims-based security approach, a coordinated effort can be made to provide common security information to all systems . Here is how….
Read More »

Functional and Non-Functional Requirements

Comments Off
Filed under Software Architecture

There are actually methods to the madness in the process of gathering information for software requirements. As a system end-user or a subject matter expert  it is likely that you have worked with others during some information gathering processes. Whether it was via a big meeting, or a simple phone call, someone probably has asked you a question or two about what you want the system to be or do. To help you better understand what is being asked of you, here is an overview of the two types of requirements that you are being asked about… Read More »

Software Architecture – MVVM Design Pattern Primer

Comments Off
Filed under Software Architecture

Building a new car requires the input of both a design team and an engineering team. Each team contributes to specific requirements. For example, the design team is responsible for understanding what the consumer wants in the look and feel of the car. The engineering team applies the required mechanics and functionality to the car. Both teams serve distinct purposes, however both teams need to eventually come together to produce what we will eventually drive down the road. Read More »

Usage Scenarios – Real World Information Gathering

Comments Off
Filed under Software Architecture

Let’s say you are a key system user or maybe a business subject matter expert. What would you typically tell someone when you explain what you do to accomplish a specific task? How about if you were to sit down train a new employee on a computer system. What information would you give to that new employee so that the employee can better learn how to do the job that needed to be done?

Just like training a new employee for a job, gathering information for software development projects requires a great deal of diligence. Not enough training, or giving a new employee the wrong information, could have a dramatic effect on how that new employee performs their tasks. Gathering the wrong requirements for a software project would have a dramatic effect on the delivery of a valid solution. Due diligence is required for software project requirements information gathering – making sure that the right solution is created for the right reasons. Read More »

Copyright 2017 by Quercus Solutions