Author: Uma Mahesh

Five Things You Need to Know about DataOps

DataOps can help you bring together your data, team, tools and processes to become a truly data-driven organization Did you know that DataOps is one of the three innovation triggers listed in data management by Gartner in their 2018 innovation insight report? That means there’s a lot of interest around the concept and several people

DevOps – Containers Orchestration

Introduction Nowadays software packaged as container images and ran in containers is an industry-accepted standard of running and distributing applications. Some of the benefits of using containers are: A high degree of portability Consistent operations processes Scalability and resiliency mostly Enabling common tooling thanks to open standards As with everything, there are no free lunches!

Microservices Data Management

In this article, we are going to discuss Microservices Data Management in order to understand data considerations for microservices. As you know that we learned practices and patterns about Microservices Data Design patterns and add them into our design toolbox. And we will use these pattern and practices when designing e-commerce microservice architecture. By the end of the article, you will learn how to manage data in Microservices Architectures with applying Microservices Data Design patterns and principles.

Architecture Vision

The level of detail addressed in Architecture Vision will depend on the scope and goals of the Request for Architecture Work, or the subset of scope and goals associated with this iteration of architecture development. The order of the steps in Architecture Vision as well as the time at which they are formally started and

Architecture Compliance Review Checklists

The following review checklists provide a wide range of typical questions that may be used in conducting Architecture Compliance reviews, relating to various aspects of the architecture. The organization of the questions includes the basic disciplines of system engineering, information management, security, and systems management. The checklists are based on material provided by a member