Pini Cohen, CTO of STKI, presented on adaptive architecture and the evolving role of CTOs and architects. The presentation covered topics like microservices, API management, integration patterns, event-driven architecture, and low-code development. It discussed how technologies are changing rapidly, requiring CTOs to focus on adaptability and composable applications to meet business needs.
How does the cio contrinute to other CxOs?Einat Shimoni
This presentations descrobes how the CIO contributes to other CxOs in application areas such as "Systems of engagement" versus "Systems of records". Web, mobile, omni-channel, digital, social, CRM, and also - ERP, CRM, HR and talent management, Knowledge management and analytics.
Recommended for CTOs, architects, IT Managers
COVID-19 has emphasized the fact that business agility and hence technology agility are the most if not the only factors for business success. However, technology agility in most IT departments is not the “strongest muscle”. Technology adoption of Cloud, Devops, Integration, Low-Code and Zero Trust are affecting all IT departments and even the entire organization. New
processes and relationships between the various branches of the IT department should emerge, forsaking old habits and technologies. New technologies and roles\responsibilities are taking their place.
Recommended for CXOs and all IT Managers
If COVID-19 has demonstrated anything it is that organizations can no longer rely on traditional long-term strategic direction-setting, in order to succeed and grow. Today, organizations need to be able to quickly identify changes and respond with speed.
Adaptive enterprises have the technical and organizational agility to do this. In this session, we will present the organizational structure, technologies and concepts that make up an adaptive organization and discuss topics such as: Concierge hyper-personalization services; Personalized (PBC) Business Capabilities; adaptive organizational structure; Centers of Excellence; center office; hyper-automation and data centric organizations.
Recommended for CIOs and Applications Managers
In this session we will discuss how next generation business applications enable the
creation of much needed hyper-personalized experiences for customers and employees.
Center Office is a new delivery model that is emerging in response to the need to deliver
end to end hyper-personalized solutions that improve on older enterprise (legacy)
applications. Center Office relies on technologies such as APIs, microservices and
Hyperautomation (next level of automation that meshes AI tools with RPA,, enabling
scaling for complex business processes).
How do we manage employees' experiences as well as preserve talent and create
collaborative workplaces for teams? which new skills are needed? what will the
workforce of the future look like? Which new tools are needed for HR (employee well-
being)?
How does the cio contrinute to other CxOs?Einat Shimoni
This presentations descrobes how the CIO contributes to other CxOs in application areas such as "Systems of engagement" versus "Systems of records". Web, mobile, omni-channel, digital, social, CRM, and also - ERP, CRM, HR and talent management, Knowledge management and analytics.
Recommended for CTOs, architects, IT Managers
COVID-19 has emphasized the fact that business agility and hence technology agility are the most if not the only factors for business success. However, technology agility in most IT departments is not the “strongest muscle”. Technology adoption of Cloud, Devops, Integration, Low-Code and Zero Trust are affecting all IT departments and even the entire organization. New
processes and relationships between the various branches of the IT department should emerge, forsaking old habits and technologies. New technologies and roles\responsibilities are taking their place.
Recommended for CXOs and all IT Managers
If COVID-19 has demonstrated anything it is that organizations can no longer rely on traditional long-term strategic direction-setting, in order to succeed and grow. Today, organizations need to be able to quickly identify changes and respond with speed.
Adaptive enterprises have the technical and organizational agility to do this. In this session, we will present the organizational structure, technologies and concepts that make up an adaptive organization and discuss topics such as: Concierge hyper-personalization services; Personalized (PBC) Business Capabilities; adaptive organizational structure; Centers of Excellence; center office; hyper-automation and data centric organizations.
Recommended for CIOs and Applications Managers
In this session we will discuss how next generation business applications enable the
creation of much needed hyper-personalized experiences for customers and employees.
Center Office is a new delivery model that is emerging in response to the need to deliver
end to end hyper-personalized solutions that improve on older enterprise (legacy)
applications. Center Office relies on technologies such as APIs, microservices and
Hyperautomation (next level of automation that meshes AI tools with RPA,, enabling
scaling for complex business processes).
How do we manage employees' experiences as well as preserve talent and create
collaborative workplaces for teams? which new skills are needed? what will the
workforce of the future look like? Which new tools are needed for HR (employee well-
being)?
STKI researches and publishes once a year a complete Market Study about the Israeli Information Technology Scene. This is a version 2 that includes changes that were found after companies presented (again) their 2018 results and STKI analysts accepted the changes.
STKI researches and publishes once a year a complete Market Study about the Israeli Information Technology Scene. This is a version 2 that includes changes that were found after companies presented (again) their 2018 results and STKI analysts accepted the changes.
Recommended for CDOs and all Data & Analytics Managers
The past 2 years have had a huge impact on organizations journeys to become data driven. Existing data architectures were disrupted; rigid structures and processes were questioned, and many data strategies were re-written.
On the one hand, the global pandemic emphasized the need for organizations to raise the bar, implement strategies, improve data literacy and culture, increase investments in data and analytics, and explore AI opportunities.
On the other, it also presented new challenges such as: the war for data talent and the wide literacy gap. Inadequate structures as well as outdated processes were exposed. Major changes in the data landscape (Data Fabric, Data Mesh, Transition to Data Clouds) will further disrupt existing data architectures and enhance the need for a new adaptive architecture and organization.
Presentation describes innovation process for IT, from digital transformation though data centric and finally automation revolution, outcome driven innovation and data, process and technical debt
Attending a job Interview for B1 and B2 Englsih learnersErika906060
It is a sample of an interview for a business english class for pre-intermediate and intermediate english students with emphasis on the speking ability.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
1. 1
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
CTO’s presentation:
Age of Implementation
Pini Cohen, CTO STKI
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
2. 2
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Agenda
Intro: CTO’s and Architects
Adaptive Architecture
Cloud CoE
DevOps CoE
Zero Trust
2
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
3. 3
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
What is happening with CTO’s and
Architects?
More technologies to deal with
Technology last short time
Customization of technology is less
viable
Dependencies in technologies is
increasing
3
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
4. 4
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Microservices
implications:
•You can do whatever you
want, use database,
programming language
etc., as long as you get the
job done and other
services can depend on
you.
4
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
5. 5
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
This is how core legacy architecture looks
likes
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
6. 6
Copyright@STKI_2020 Do not remove source or attribution from any slide, graph or portion of graph
Solution: The
new architect
6
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
7. 7
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
What is happening with
CTO’s & Architects ?
we are
having more
fun!!
7
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
8. 8
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Not everything is so shiny
Not everything is so shiny
8
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
9. 9
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
The IT talent war*
*In the holly land
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
10. 10
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Massive move of personal from Enterprise IT to High-tech
10
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
11. 11
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
IT has little experience in Knowledge Transfer
11
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
12. 12
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
This will result
IT
Organization
•Downtime
•IT is a barrier for
the business
•Implement KM
platforms in IT
•Demand for Cloud
& SLA based
services
IT
Suppliers
•Sell products with
their operations
services
•High demand for
staffing services
(“gulglot”) but
hard (impossible?)
to fulfill
•Cloud & SLA
based services
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
13. 13
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Adaptive
Architecture
13
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
14. 14
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Adaptive Architecture
ADAPTIVE emerges as the top objective for the organization. Modern
architecture Integration is the core of being Adaptive
API’s are the most important indication of “what is happening” in modern
application
API’s and Event Driven will enable the use of Legacy system in modern
business processes
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
15. 15
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Adaptive Composable Organizational
Applications
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
16. 16
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Internal integration
ESB
The evolution of integration patterns
16
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
17. 17
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Internal integration
ESB
API gateway
The evolution of integration patterns
17
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
18. 18
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
API Gateway
• Protocol transformation
• Scheme validation (content filters like XSD, filed limits, field format, etc.)
• Authentication & security
• Basic logics
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
19. 19
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Internal integration
ESB
API gateway
Cloud integration:
IPaaS
The evolution of integration patterns
19
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
20. 20
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
IPaaS –
Integration
Platform as a
Service
• For cloud connectivity
• Enable integration capabilities for ‘ad hoc’ or ‘citizen’ integrators”
• “I have more adaptors cloud SaaS”
• Selected products: Zapier, iConduct, Workato, Celigo, Snaplogic
20
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
21. 21
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Internal integration
ESB
External (specific API)
API gateway
Cloud integration
IPaaSadvanced ESB
API management
The evolution of integration patterns
21
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
22. 22
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Business manager to CIO:
I want to sell
product X by
our systems
I want to sell
product Y by
our systems
I want to sell
product Z by
our systems
I want to sell
product A by
our systems
CIO CIO
CIO
CIO
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
23. 23
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Business manager to CIO:
I want to sell
product X by
our systems
CIO
• Place new products in my catalog –
dynamically
• Check stock variability in suppliers ERP
• Process payment (3rd party SW)
• Transfer money immediately to supplier
• Update delivery status and location (3rd
party)
• Update buyer when product was delivered
• Update “consumer club” in both our
systems and suppliers systems
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
24. 24
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
API Management
24
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
25. 25
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
BOI Open Banking Regulation
25
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
26. 26
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
API Management – the hottest project in market!
I’m Hot!
26
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
27. 27
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Will API management replace ESB?
It shouldn't – no oorchestration, no transformation, no adapters ( tech
and content), no messaging, no guarantee delivery, etc,
Still – green field organizations (enterprises and start-ups) are not
using ESB at all
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
28. 28
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
* Gradually when possible
API management tools are
replacing ESB*
28
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
29. 29
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Internal integration
ESB
External (specific API)
API gateway
Cloud integration
IPaaSadvanced ESB
External partners
API management
developer portal
Industry API Standards
The evolution of integration patterns
29
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
30. 30
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Why API interoperability standards are critical for business agility?
“complete name” “full name” “full description” “Shem Male”
"The Hongkong and Shanghai Banking Corporation Limited“ is stored in field
Bank A Bank B Bank C Bank D
These banks can only manually co-ordinate.
This is not suitable for modern business!!
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
31. 31
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
The solution: standard Open API –
"banks": [
{
"id": "hsbc",
"short_name": "HSBC",
"full_name": "The Hongkong and Shanghai Banking
Corporation Limited",
"logo": "url of internet standard image",
"website": "www.postbank.de"
}
]
}
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
32. 32
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Internal integration
ESB
External (specific API)
API gateway
Cloud integration
IPaaSadvanced ESB
External partners
API management
developer portal
Industry API Standards
The evolution of integration patterns
Microservices
ServiceMesh
32
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
33. 33
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Source: http://martinfowler.com/
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
34. 34
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI’s work Copyright@2016. Do not remove source or attribution from any slide, graph or portion of graph
34
API gateway /ESB
will not scale in
microservices
production
environment API
Gateway
34
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
35. 35
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
https://medium.com/microservices-in-practice/service-mesh-for-microservices-2953109a3c9a
service mesh pattern
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
36. 36
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Direct (unsupervised) API calls
36
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
37. 37
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Advanced Integration capabilities are the key to adaptive business
API centric development & operations are a key for availability, efficiency
(reuse) & security
Advanced Integration capabilities are the key to adaptive business
API centric development & operations are a key for availability, efficiency
(reuse) & security
37
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
38. 38
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Event Driven Architecture (EDA)
38
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Traditional programming: direct connection
By topic
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
39. 39
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Event driven - “If you love someone set him free”
• Traditional programming:
Make_Order {
…
…
Call Order_Fulfilment (id of
order).
Wait for response (ack)
• }
• EDA programming:
Make_Order {
…
…
Publish event:
Order_created(id of order)
//do not wait
• }
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
40. 40
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Event driven benefits & drawbacks
•Enables adaptive business processes
•Enables work of separate teams
•Fits microservices, self contained systems, DevOps,
serverless
•Basically for a-synchronous purpose
•Distributed transactions are difficult!!
•Needs to reskill architects & programmers
40
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
41. 41
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Low Code
“A low-code development
platform (LCDP) is a software that
provides a development environment
used to create application
software through graphical user
interfaces and configuration instead
of traditional hand-coded computer
programming.” Wikipedia
תפוקה הרבה
,
קוד פחות
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
42. 42
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
The advantages
TTM
Fit for junior/legacy
developers
Low technical debt
Good for business
(application) experiments
(MVP)
42
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
43. 43
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
The barriers
Prior experience- 4GL
Politics
Cost of entry
Lockdown
43
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
44. 44
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Lesson learned
from (Israeli) 4GL:
•Citizen developers should work
under IT guidance/supervision:
•Security, Central Identity,
Regulations, Monitoring
•Updates of infrastructure
•CAB – change advisory board
•Documentation and Architecture
guidance
44
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
44
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
45. 45
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI’s work Copyright@2016. Do not remove source or attribution from any slide, graph or portion of graph
Will 2022 be the "LowCode Year" in
Israel?
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
45
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
46. 46
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Literacy
API Economy principals
Standards
API standards, Identity
standards, Cyber
security standards
Architecture
Event Driven, API
management vs.
ServiceMesh , Rest vs.
GraphQL
Tools
API management tools
IPaaS tools
Governance
Regulations , apply
standards
Use Cases Identification
and Prioritization
Priorities in DevOps efforts and tooling
Skills
Architect upskill for
Event Driven
Processes
API first culture , API testing
automation
Architecture
Integration
CoE
Governance – be integral part of development process
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
47. 47
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Cloud CoE
47
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
48. 48
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Reasons for
moving to cloud
• There is (almost) no option since new business applications are only cloud based. Applying modern business processes without using cloud software will be very difficult and unconventional.
New business applications
are only cloud based
Applying modern business
processes without using
cloud software will be very
difficult and unconventional
48
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
49. 49
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
More reasons for
moving to cloud:
• Cloud improve IT speed & agility and
hence business agility
• Cloud computing enables “fail fast”
(leanMVP) business culture
• Cloud drives technology innovation which
drives business innovation
• Cloud computing helps with compliance
• Cloud computing companies invest much
more on cyber security than traditional IT
• Cloud computing helps with IT-Business
alignment
49
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
50. 50
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Repatriation?
Cloud
50
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
51. 51
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Repatriation debate
51
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
52. 52
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Repatriation from cloud in Enterprise IT?
Cloud
Not Yet
52
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
53. 53
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Cloud unexpected
complexity:
•Cloud budget planning
•Bill Shock
•Lack of flexibility in cloud
contracts
•Forgotten areas in cloud SaaS
deals
•In general - mistakes in the
cloud are more harmful
53
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
54. 54
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Reduce the
dominance of
Windows Server
and VMWARE
ESX
54
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
55. 55
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Cloud technical
team is integral
part of the
general teams
55
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
56. 56
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Fact: most
resources are still
spent the on-
premise/traditional
infrastructure
Treat on premise
as cloud!!
56
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
57. 57
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Infrastructure as Code
•Central scriptcode repository (GIT) for
all infrasecurity
•Central workflow for all infrasecurity
57
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
58. 58
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Place infrastructure
as code KPI for all
infrasecurity
departments
58
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
59. 59
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Server is running unnecessarily in
traditional DC – not a big deal
Server is running unnecessarily in
Cloud – very big deal $$
“Pay by the minute” is new for IT* – FINOPS is the
answer
*what are “Spot Instances”?
59
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
60. 60
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Define and implement
mandatory tags for all
cloud resources in the
resource group level – DO
IT NOW
60
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
61. 61
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Cloud cost optimization tools
Build in tools:
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
62. 62
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Literacy
Explaining cloud business and
technology implications
Standards
Example: tagging
(FINOPS) standards,
security standards.
Identity standards
Architecture
Microservices, Event
Driven, Serverless
Tools
Which cloud, Cloud cost
optimization tools ,
Cloud identity tools,
cloud integration tools
Governance
Cloud related
regulations
Use Cases Identification
and Prioritization
Priorities in cloud migration
Skills
Cloud development,
Infrastructure as code
education
Processes
FINOPS, cloud licensing
management, Cloud asset
management
Cloud
CoE
CoE is an enabler, not doer itself. “One DBA team!”
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
63. 63
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
DevOps CoE
63
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
64. 64
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Traditional deployment
• From dev to test to prod – takes ages..
64
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
65. 65
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
DevOps aims at:
• DevOps enables the benefits of Adaptive development to be felt at
the organizational level. DevOps does this by allowing for fast and
responsive, yet stable, operations that can be kept in sync with the
pace of innovation coming out of the development process.
Source:
http://dev2ops.org/blog/2010/2/22/what-is-DevOps.html
http://en.wikipedia.org/wiki/File:DevOps.png
65
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
66. 66
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Some perspective: DevOps at Amazon
Source: http://www.bogotobogo.com/DevOps/DevOps_Jenkins_Chef_Puppet_Graphite_Logstash.php
66
11.6 seconds : Mean time between
deployments (weekday)
Mean
1,079 : Max # of deployments in a single
hour
Max
10,000 : Mean # of hosts simultaneously
receiving a deployment
Mean
30,000 : Max # of hosts simultaneously
receiving a deployment
Max
66
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
67. 67
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
“Let there be DevOps”
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
68. 68
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
DevOps Tools
Monitoring/Observability/AIOPS
Collaboration
Configuration Automation
Testing
Issue Trekking/ITSM
Release Management
Security
Continues Integration
Artifacts/ Package Management
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
69. 69
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Legacy systems
must be part of
Value Stream
mapping &
DevOps
69
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
70. 70
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Measure until code
is in production and
not until value is
created
70
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
71. 71
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Value Stream
Mapping?
•Value stream enables you to
create a detailed visualization of
your workflows.
•This visualization represents
how your products and services
flow from supplier to customer
via your company.
•Value Stream tools should get
their input from ALM tools and
from manual inputs
71
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
72. 72
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
IMPROVING DATABASE PROVISIONING PROCESS TO
MEET BUSINESS DEMANDS
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
73. 73
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
IMPROVING DATABASE PROVISIONING PROCESS TO
MEET BUSINESS DEMANDS
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
74. 74
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Value stream mapping:
Source: https://www.scielo.br/j/jistm/a/wRTL87bgXHG6zZd8GGNNvxt/?format=pdf&lang=en
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
75. 75
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI: start
DevOps with
Value stream
mapping
75
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
76. 76
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Operations team (NOC) vs. ESM (monitoring) team
76
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
77. 77
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
SRE is what happens
when you ask a software
engineer to design an
operations team
•SRE – Site Reliability
Engineering
•Automation (code, tooling) in
operations, self healing
architecture
•MTTR instead of MTBF
•Error Budget
•Developers responsibility for
operations
77
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
78. 78
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Developers
are not
responsible
of operations
78
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
79. 79
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Observability:
the new
Monitoring
79
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
80. 80
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Expected correlation in
golden signals. What is
anomaly?
80
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Normal behavior: Traffic--> Saturation --> Latency --> Error
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
81. 81
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Literacy
Explain DevOps to business
Standards
Naming conventions for
infrastructure, testing
standards, Monitoring
(Observability)
standards
Architecture
Microservices, Monitoring
(Observability) health
API’s
Tools
DevOps orchestrator,
Integration to Source
Control, Ticketing tools,
DEVSECOPS tools
Governance
Which type of DevOps
and controls (testing)
for each application
type
Use Cases Identification
and Prioritization
Priorities in DevOps efforts and tooling
Skills
Cloud development,
Infrastructure as code
education
Processes
Let Developers part of the
operations responsibility,
Unify the development and
operations processes and
KPI’s
DevOps
CoE
Cooperation between Development and
InfraOps departments is crucial in the
success of DevOps CoE
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
82. 82
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI Webinar:
Coping with
Complex IT
Environment
27.10.21
CTO’s Architects,
Development, Infra &
Operations
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
83. 83
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Zero Trust CoE
83
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
84. 84
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Before:
Inside = safe
We are inside
Outside = not safe
84
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
85. 85
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Everything is outside !!
After:
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
86. 86
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Zero Trust :the organization has no perimeters
“Never trust – Always verify”*
Forrester-The Zero Trust eXtended (ZTX) Ecosystem
86
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
87. 87
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
What should we verify?
• The user’s identity (now)
• The device (now)
• The network (now)
• What is transferred (data, docs,
web) - now
• Role-based access control (process,
port, protocol) – preferably via
proxy – no network access
87
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
88. 88
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Who is the user in many clouds?
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
89. 89
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Cloud Identity Services principals
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
90. 90
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Possible
solution for
Zero Trust –
SASE – Secure
Access Service
Edge
90
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
91. 91
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
SASE capabilities
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
92. 92
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Close
“employees
WIFI” stay with
“guest WIFI”
92
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
93. 93
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Close the
internal
network
longer term
93
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
94. 94
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
Literacy
Explaining cloud business and
technology implications
Standards
Example: tagging
(FINOPS) standards,
security standards.
Identity standsrds
Architecture
Microservices, Event
Driven, Serverless
Tools
Which cloud, Cloud cost
optimization tools ,
Cloud identity tools,
cloud integration tools
Governance
Cloud related
regulations
Use Cases Identification
and Prioritization
Priorities in cloud migration
Skills
Cloud development,
Infrastructure as code
education
Processes
FINOPS, cloud licensing
management, Cloud asset
management
Cyber
CoE
CoE is an enabler, not a controller or a doer itself
Zero Trust is such a
big change for Cyber
Security – everybody
should take a big
breath
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL
95. 95
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
The End:
Implement
while
doing fun!!
Copyright@STKI_2021 Do not remove source or attribution from any slide, graph or portion of graph
STKI IT Knowledge Integrators
COMPANY CONFIDENTIAL