Agility: Automation for Better Outcomes and Feedback

A bad habit of several developers has to do with entering in a long tunnel of coding for an application project, relegating a more or less acceptable executable for the last project stages. That has several risks:   Feedback from users and customers delayed, what can carry a poor customer satisfaction for who was going…

1

From Classes To Components

 In  n-tier, distributed applications, we have to decide which logic deploy where. Those deployments are all about installing components in specific places but, what are components exactly? What distinguishes a component with respect of a mere class? Actually, as classes do, components take ownership of cohesive responsability but components are logical units from a physical perspective. In…

0

Software Architecture: Past, Present and Future

 What  is exactly software architecture? Do we really need it? Why have we only recently been discussing it? Is there suddenly a contagious fever about software architecture infecting those who claim to be architects? Who are they actually: gurus, just senior developers, or maybe smooth-talkers? These are questions that developers, junior and senior, are asking…

2

Architecture Best Practices

 In  “Last Call To Design Patterns” we described design patterns as “reusable solutions for frequent problems”. It’s all about thoughtful approaches to avoid common pitfalls And, actually, Patterns are just one of a set of disciplines which help us to achieve software easy to understand and maintain. But, as PhD. Joe Hummel states in his…

0

Passing Data Between Layers and/or Tiers

 While  we were commenting some high-level strategies for data-access in a previous article, we mentioned a popular pattern used to interchange information between layers or tiers. We are talking about the Data Transfer Object (DTO) pattern. As the MS Patterns & Practices‘ book “Enterprise Solution Patterns” states, this solution strategy helps to reach Reduced number of remote calls Improved…

0

Data Access Strategies

 We  have seen in the post about 3-Layer architectures, that the Data Access Layer isn’t the persistence repository, but a set of strategies for accessing itThe challenge you as an architect have to face when designing this layer is multiple: How much possible is the RDBMS being replaced for a competitor? This possibility is usually…

1

3-Tier, 3-Layer, MVC: a Trio of Famous Trios

 Contemporary  applications are being based on three popular architectural approaches. They are 3-layered architecture 3-tier architecture Model-View-Controller architecture There exists certain degree of confusion between all the three approaches. Mostly the first two are often referred as if they were the same one (see at Wikipedia). This can happen, possibly, because the three approaches aren’t…

7

Layered Applications: Let’s Talk About Business

 I  remember a time when applications were just end to end programs, collections of lines of code with no distinction between presentation, domain logic and data access. Such kind of applications is remembered as spaghetti code Fortunately nowadays enterprise applications are made in a better organized way: Layered Architectures helped reach that goal, separating in a clear and…

0

Aims and Means of Asymmetric Cryptography

 Usually  we tend to center the concept of Authentication to mere users, through and exhibited password as a credential But beyond the user, how to be sure about authenticity of other assets? For example, how can we be sure about, once the user is authenticated, every received message, claiming in its header that it comes from…

0

How Sure Are You About Security?

 Even  though it´s surprising, an important number of architects don’t worry enough about security aspects Talking with some of them, they considered that Security is a topic so complex -they are right in this appreciation- that developers don’t have to care about it, just delegating its concerns to infrastructure pieces like firewalls and directory servers I…

0