Solutions architect's handbook:
The new edition incorporates new chapters on disruptive technologies, such Internet of Things (IoT), quantum computing, data engineering, and machine learning. It also includes updated discussions on cloud-native architecture, blockchain data storage, and mainframe modernization with public cloud. T...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham - Mumbai
Packt Publishing Safari
2022
|
Ausgabe: | Second edition |
Schriftenreihe: | Expert insight
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | The new edition incorporates new chapters on disruptive technologies, such Internet of Things (IoT), quantum computing, data engineering, and machine learning. It also includes updated discussions on cloud-native architecture, blockchain data storage, and mainframe modernization with public cloud. This book provides an understanding of solution architecture and how it fits into an agile enterprise environment. It will take you through the journey of solution architecture design by providing detailed knowledge of design pillars, advanced design patterns, anti-patterns, and the cloud-native aspects of modern software design. By the end of this book, you'll have learned techniques that enable you to create efficient architecture designs that meet your business requirements. |
Beschreibung: | xxix, 559 Seiten Illustrationen, Diagramme |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048209421 | ||
003 | DE-604 | ||
005 | 20230216 | ||
007 | t | ||
008 | 220510s2022 a||| |||| 00||| eng d | ||
020 | |z 9781801816618 |9 978-1-80181-661-8 | ||
020 | |z 1801816611 |9 1-80181-661-1 | ||
035 | |a (OCoLC)1371314543 | ||
035 | |a (DE-599)BVBBV048209421 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
100 | 1 | |a Shrivastava, Saurabh |e Verfasser |0 (DE-588)122339610X |4 aut | |
245 | 1 | 0 | |a Solutions architect's handbook |c Saurabh Shrivastasa ; Neelanjali Srivastav |
250 | |a Second edition | ||
264 | 1 | |a Birmingham - Mumbai |b Packt Publishing |b Safari |c 2022 | |
300 | |a xxix, 559 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Expert insight | |
520 | |a The new edition incorporates new chapters on disruptive technologies, such Internet of Things (IoT), quantum computing, data engineering, and machine learning. It also includes updated discussions on cloud-native architecture, blockchain data storage, and mainframe modernization with public cloud. This book provides an understanding of solution architecture and how it fits into an agile enterprise environment. It will take you through the journey of solution architecture design by providing detailed knowledge of design pillars, advanced design patterns, anti-patterns, and the cloud-native aspects of modern software design. By the end of this book, you'll have learned techniques that enable you to create efficient architecture designs that meet your business requirements. | ||
650 | 0 | 7 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Srivastav, Neelanjali |e Sonstige |0 (DE-588)1223396185 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033590299&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033590299 |
Datensatz im Suchindex
_version_ | 1804183981119242240 |
---|---|
adam_text | Table of Contents Preface Chapter 1 : The Meaning of Solution Architecture xxiii 1 What is solution architecture? The evolution of solution architecture Why is solution architecture important? The benefits of solution architecture Addressing the business needs and quality of delivery Selecting the best technology platform Addressing solution constraints and issues Helping in resource and cost management Managing solution delivery and project life cycle Addressing non-functional requirements Solution architecture in the public cloud What is the public cloud? Public clouds, private clouds, and hybrid clouds The public cloud architecture Thinking cloud-native architecture Public cloud providers and cloud service offerings Summary 2 6 7 8 9 10 11 11 12 12 14 15 15 16 18 19 20 Chapter 2: Solution Architects in an Organization 21 Types of roles for a solution architect Generalist solution architect roles 22 24 24 24 25 25 26 Enterprise solution architect Solution architect Technical architect Cloud architect Architect evangelist [xi]
Table of Contents 27 Specialist solution architect roles 27 28 28 30 30 31 Infrastructure architect Network architect Data architect Machine learning architect Security architect DevOps architect Understanding a solution architect s responsibilities Analyzing user requirements Defining non-functional requirements Engaging and working with stakeholders Handling various architecture constraints Making technology selections Developing a proof of concept and a prototype Designing solutions and staying through delivery Ensuring post-launch operability and maintenance Working as a technology evangelist Solution architects in an agile organization Why the agile methodology? Agile manifesto Agile process and terminology 32 33 34 36 37 39 39 40 42 43 43 44 45 46 47 47 48 49 Scrum ceremonies Agile tools and terms Agile versus waterfall Agile architecture Summary Chapter 3: Attributes of the Solution Architecture Scalability and elasticity The capacity dilemma in scaling Scaling your architecture Static content scaling Server fleet elasticity Database scaling High availability and resiliency Fault tolerance and redundancy Disaster recovery and business continuity Extensibility and reusability Usability and accessibility Portability and interoperability Operational excellence and maintainability Security and compliance Authentication and authorization [xii] 50 53 54 56 56 58 58 59 60 62 64 66 68 69 70 71 72
Table of Contents Web security Network security Infrastructure security Data security Cost optimization and budget Summary Chapter 4: Principles of Solution Architecture Design Scaling workloads Predictive scaling Reactive scaling Building a resilient architecture Design for performance Using replaceable resources Creating immutable infrastructure Canary testing 73 73 73 74 74 75 77 78 79 82 83 85 87 87 88 Think loose coupling 88 Think service not server 91 Using the right storage for the right requirements 93 Think data-driven design 95 Overcoming architectural constraints 96 Taking the minimum viable product approach 97 Adding security everywhere 98 Applying automation everywhere 100 Summary 101 Chapter 5: Cloud Migration and Hybrid Cloud Architecture Design 103 Benefits of cloud native architecture 104 Popular public cloud choices 106 Creating a cloud migration strategy 107 Lift and Shift migration 109 Rehost Replatform Relocate The cloud native approach Refactor Repurchase Retain or retire Retain Retire Choosing a cloud strategy Steps for cloud migration Discovering your workload Analyzing the information -------------------------------------------------------------------------- [ xiii ] 109 110 111 111 112 112 113 113 114 115 116 117 119
Table of Contents Creating a migration plan Designing the application Performing application migration to the cloud Data migration Server migration 121 125 129 130 131 Integration, validation, and cutover 132 134 Live migration cutover Operating the cloud application Application optimization in the cloud Creating hybrid cloud architecture Taking a multi-cloud approach Designing cloud native architecture Summary Further reading Chapter 6: Solution Architecture Design Patterns Building an ո-tier layered architecture The web layer The application layer The database layer Creating a multi-tenant SaaS-based architecture Building stateless and stateful architecture designs Understanding service-oriented architecture SOAP web service architecture RESTful web service architecture Building an SOA-based e-commerce website architecture Building a serverless architecture Creating a microservice architecture Real-time voting application reference architecture Building a queue-based architecture Queuing chain pattern Job observer pattern Creating an event-driven architecture Publisher/subscriber model Event stream model Building a cache-based architecture Cache distribution pattern in a three-tier web architecture Rename distribution pattern Cache proxy pattern Rewrite proxy pattern App caching pattern Memcached versus Redis [xiv] 135 136 138 140 141 143 144 145 146 147 148 148 149 151 153 154 159 160 161 163 165 167 168 169 171 171 172 173 175 177 178 179 180 182
Table of Contents Understanding the circuit breaker pattern Implementing the bulkheads pattern Creating a floating IP pattern Deploying an application with a container The benefit of containers Container deployment Building container-based architecture Database handling in application architecture High-availability database pattern Avoiding anti-patterns in solution architecture Summary Chapter 7: Performance Considerations Design principles for architecture performance Reducing latency Improving throughput Handling concurrency Applying caching Technology selection for performance optimization Making a computational choice Selecting the server instance Working with containers Going serverless Choosing storage Working with block storage and storage area network Working with file storage and network area storage Working with object storage and cloud data storage Choosing the database Online transactional processing Nonrelational databases Online analytical processing Building a data search functionality Improving network performance Defining a DNS routing strategy Implementing a load balancer Applying auto-scaling Managing performance monitoring Summary Chapter 8: Security Considerations Designing principles for architectural security Implementing authentication and authorization control Applying security everywhere Reducing the blast radius [xv] 183 183 185 186 187 189 190 192 194 195 197 199 200 200 202 203 205 206 207 207 210 213 214 215 215 216 218 218 219 220 220 221 222 223 224 226 227 229 230 230 231 231
Table of Contents Monitoring and auditing everything all the time Automating everything Protecting data Responding to security incidents Selecting technology for architectural security User identity and access management 232 232 233 233 234 234 Federated identity management and single sign-on Kerberos Microsoft Active Directory Amazon Web Services Directory Service Google Identity federation with Active Directory Security Assertion Markup Language OAuth and OpenlD Connect JSON Web Token 236 236 238 239 239 240 241 243 Handling web security Web app security vulnerabilities Web security mitigation Securing an application and its infrastructure Application and operating system hardening Software vulnerabilities and secure code Network, firewall, and trusted boundary Intrusion detection system and intrusion prevention system Data security Data classification Data encryption at rest Data encryption in transit Security and compliance certifications The cloud s shared security responsibility model Summary Chapter 9: Architectural Reliability Considerations Design principles for architectural reliability Making systems self-healing Applying automation Creating a distributed system Monitoring and adding capacity Performing recovery validation Technology selection for architectural reliability Planning the Recovery Time Objective and Recovery Point Objective Replicating data Synchronous versus asynchronous replication Replication methods Planning disaster recovery Backup and restore Pilot light 244 244 247 250 250 251 251 254 256 256 257 261 263 264 266 269 270 270 271 272 272 273
273 274 275 275 276 277 279 281 -------------------------------------------------------------------- [ xvi ]-----------------------------------------------------------------------
Table of Contents 283 286 Warm standby Multi-site Applying best practices for DR Improving reliability with the cloud Summary Chapter 10: Operational Excellence Considerations Designing principles for operational excellence Automating manual tasks Making incremental and reversible changes Predicting failures and responding Learning from mistakes and refining Keeping the operational runbook updated Selecting technologies for operational excellence Planning for operational excellence 287 288 289 291 292 292 293 293 294 294 295 295 296 298 IT asset management Configuration management The functioning of operational excellence 301 Monitoring system health Handling alerts and incident response 302 308 Improving operational excellence 311 311 313 314 IT operations analytics Root cause analysis Auditing and reporting Achieving operational excellence in the public cloud Summary Chapter 11: Cost Considerations Design principles for cost optimization Calculating the total cost of ownership Planning the budget and forecast Managing demand and service catalogs Keeping track of expenditure Continuous cost optimization Techniques for cost optimization Reducing architectural complexity Increasing IT efficiency Applying standardization and governance 315 316 319 320 320 322 324 325 325 326 326 328 330 331 Resource cost tagging Monitoring cost usage and report Cost optimization in the public cloud Summary [ xvii ] 333 337 339
Table of Contents Chapter 12: DevOps and Solution Architecture Framework Introducing DevOps Understanding the benefits of DevOps Understanding the components of DevOps Continuous integration/continuous deployment Continuous monitoring and improvement Infrastructure as Code Configuration management Introducing DevSecOps Combining DevSecOps and CI/CD Implementing a CD strategy In-place deployment Rolling deployment Blue-green deployment Red-black deployment Immutable deployment Implementing continuous testing in the CI/CD pipeline A/В testing Using DevOps tools for CI/CD Code editor Source code management Continuous integration server Code deployment Code pipeline Implementing DevOps best practices Building DevOps and DevSecOps in the cloud Summary Chapter 13: Data Engineering for Solution Architecture What is big data architecture? Designing big data processing pipelines Data ingestion Technology choices for data ingestion Ingesting data to the cloud Storing data Technology choices for data storage Structured data stores NoSQL databases Search data stores Unstructured data stores Object storage Blockchain data store Streaming data stores 341 342 343 344 345 347 348 351 353 353 356 356 357 357 359 359 360 361 363 363 363 364 366 368 369 371 373 375 376 378 380 382 382 383 385 386 388 390 390 391 391 392 [ xviii ]
Table of Contents Processing data and performing analytics Technology choices for data processing and analysis Visualizing data Technology choices for data visualization Designing big data architectures Data lake architecture Lakehouse architecture Data mesh architecture Streaming data architecture Big data architecture best practices Summary Chapter 14: Machine Learning Architecture What is machine learning? Working with data science and ML Evaluating ML models - overfitting versus underfitting Supervised and unsupervised machine learning algorithms Machine learning in the cloud Building machine learning architecture Prepare and label Select and build Train and tune Deploy and manage Machine learning reference architecture Machine learning operations MLOps principles MLOps best practices Deep learning Summary Chapter 15: The Internet of Things Architecture 393 395 398 398 399 401 405 407 409 410 413 415 416 418 420 422 423 424 425 426 426 427 427 430 430 431 433 436 437 438 440 441 What is the Internet of Things? Components of loT architecture Managing loT devices 441 442 Microcontroller device management Microprocessor device management Connecting and controlling loT devices Performing analytics on loT data loT in the cloud Building an industrial loT solution Connected Factory loT architecture Implementing a digital twin [xix] 444 446 447 449 451 452
Table of Contents Summary 455 Chapter 16: Quantum Computing The building blocks of quantum computers Qubits Superposition Entanglement The working mechanism of quantum computers Quantum gates Pauli gates The Hadamard gate Other quantum gates Quantum circuits Types of quantum computers Quantum computing in real life Quantum computing in the cloud Summary Chapter 17: Rearchitecting Legacy Systems Learning the challenges of legacy systems Difficulty in keeping up with user demand Higher cost of maintenance and update Shortage of skills and documentation Vulnerable to corporate security issues Incompatibility with other systems Benefits of system modernization Defining a strategy for system modernization Assessment of a legacy application Defining the modernization approach Looking at legacy system modernization techniques Encapsulation, rehosting, and replatforming Refactoring and rearchitecting Redesigning and replacing Defining a cloud migration strategy for legacy systems Documentation and support Mainframe migration with the public cloud Migrating standalone applications Migrating applications with shared code Application decoupling using a standalone API Application decoupling using a shared library Application decoupling using message queues Summary [xx] 457 458 458 459 460 460 462 462 464 464 465 467 468 469 470 473 474 476 476 477 478 479 480 481 482 484 485 486 487 487 489 490 491 491 493 493 494 494 496
Table of Contents Chapter 18: Solution Architecture Document Purpose of the SAD Views of the SAD Structure of the SAD Solution overview Business context Conceptual solution overview Solution architecture Information architecture Application architecture Data architecture Integration architecture Infrastructure architecture Security architecture Solution implementation Solution management Appendix IT procurement documentation for a solution architecture Summary Chapter 19: Learning Soft Skills to Become a Better Solution Architect Acquiring pre-sales skills Presenting to C-level executives Taking ownership and accountability Defining strategy execution with objectives and key results Thinking big Being flexible and adaptable Design thinking Being a builder by engaging in coding hands-on Becoming better with continuous learning Being a mentor to others Becoming a technology evangelist and thought leader Summary Other Books You May Enjoy Index ---------------------------------------------------------------------[xxi] 497 498 499 501 503 504 506 507 508 508 509 510 510 511 512 512 513 513 514 517 518 519 521 522 523 524 525 527 528 530 531 532 535 539
|
adam_txt |
Table of Contents Preface Chapter 1 : The Meaning of Solution Architecture xxiii 1 What is solution architecture? The evolution of solution architecture Why is solution architecture important? The benefits of solution architecture Addressing the business needs and quality of delivery Selecting the best technology platform Addressing solution constraints and issues Helping in resource and cost management Managing solution delivery and project life cycle Addressing non-functional requirements Solution architecture in the public cloud What is the public cloud? Public clouds, private clouds, and hybrid clouds The public cloud architecture Thinking cloud-native architecture Public cloud providers and cloud service offerings Summary 2 6 7 8 9 10 11 11 12 12 14 15 15 16 18 19 20 Chapter 2: Solution Architects in an Organization 21 Types of roles for a solution architect Generalist solution architect roles 22 24 24 24 25 25 26 Enterprise solution architect Solution architect Technical architect Cloud architect Architect evangelist [xi]
Table of Contents 27 Specialist solution architect roles 27 28 28 30 30 31 Infrastructure architect Network architect Data architect Machine learning architect Security architect DevOps architect Understanding a solution architect's responsibilities Analyzing user requirements Defining non-functional requirements Engaging and working with stakeholders Handling various architecture constraints Making technology selections Developing a proof of concept and a prototype Designing solutions and staying through delivery Ensuring post-launch operability and maintenance Working as a technology evangelist Solution architects in an agile organization Why the agile methodology? Agile manifesto Agile process and terminology 32 33 34 36 37 39 39 40 42 43 43 44 45 46 47 47 48 49 Scrum ceremonies Agile tools and terms Agile versus waterfall Agile architecture Summary Chapter 3: Attributes of the Solution Architecture Scalability and elasticity The capacity dilemma in scaling Scaling your architecture Static content scaling Server fleet elasticity Database scaling High availability and resiliency Fault tolerance and redundancy Disaster recovery and business continuity Extensibility and reusability Usability and accessibility Portability and interoperability Operational excellence and maintainability Security and compliance Authentication and authorization [xii] 50 53 54 56 56 58 58 59 60 62 64 66 68 69 70 71 72
Table of Contents Web security Network security Infrastructure security Data security Cost optimization and budget Summary Chapter 4: Principles of Solution Architecture Design Scaling workloads Predictive scaling Reactive scaling Building a resilient architecture Design for performance Using replaceable resources Creating immutable infrastructure Canary testing 73 73 73 74 74 75 77 78 79 82 83 85 87 87 88 Think loose coupling 88 Think service not server 91 Using the right storage for the right requirements 93 Think data-driven design 95 Overcoming architectural constraints 96 Taking the minimum viable product approach 97 Adding security everywhere 98 Applying automation everywhere 100 Summary 101 Chapter 5: Cloud Migration and Hybrid Cloud Architecture Design 103 Benefits of cloud native architecture 104 Popular public cloud choices 106 Creating a cloud migration strategy 107 Lift and Shift migration 109 Rehost Replatform Relocate The cloud native approach Refactor Repurchase Retain or retire Retain Retire Choosing a cloud strategy Steps for cloud migration Discovering your workload Analyzing the information -------------------------------------------------------------------------- [ xiii ] 109 110 111 111 112 112 113 113 114 115 116 117 119
Table of Contents Creating a migration plan Designing the application Performing application migration to the cloud Data migration Server migration 121 125 129 130 131 Integration, validation, and cutover 132 134 Live migration cutover Operating the cloud application Application optimization in the cloud Creating hybrid cloud architecture Taking a multi-cloud approach Designing cloud native architecture Summary Further reading Chapter 6: Solution Architecture Design Patterns Building an ո-tier layered architecture The web layer The application layer The database layer Creating a multi-tenant SaaS-based architecture Building stateless and stateful architecture designs Understanding service-oriented architecture SOAP web service architecture RESTful web service architecture Building an SOA-based e-commerce website architecture Building a serverless architecture Creating a microservice architecture Real-time voting application reference architecture Building a queue-based architecture Queuing chain pattern Job observer pattern Creating an event-driven architecture Publisher/subscriber model Event stream model Building a cache-based architecture Cache distribution pattern in a three-tier web architecture Rename distribution pattern Cache proxy pattern Rewrite proxy pattern App caching pattern Memcached versus Redis [xiv] 135 136 138 140 141 143 144 145 146 147 148 148 149 151 153 154 159 160 161 163 165 167 168 169 171 171 172 173 175 177 178 179 180 182
Table of Contents Understanding the circuit breaker pattern Implementing the bulkheads pattern Creating a floating IP pattern Deploying an application with a container The benefit of containers Container deployment Building container-based architecture Database handling in application architecture High-availability database pattern Avoiding anti-patterns in solution architecture Summary Chapter 7: Performance Considerations Design principles for architecture performance Reducing latency Improving throughput Handling concurrency Applying caching Technology selection for performance optimization Making a computational choice Selecting the server instance Working with containers Going serverless Choosing storage Working with block storage and storage area network Working with file storage and network area storage Working with object storage and cloud data storage Choosing the database Online transactional processing Nonrelational databases Online analytical processing Building a data search functionality Improving network performance Defining a DNS routing strategy Implementing a load balancer Applying auto-scaling Managing performance monitoring Summary Chapter 8: Security Considerations Designing principles for architectural security Implementing authentication and authorization control Applying security everywhere Reducing the blast radius [xv] 183 183 185 186 187 189 190 192 194 195 197 199 200 200 202 203 205 206 207 207 210 213 214 215 215 216 218 218 219 220 220 221 222 223 224 226 227 229 230 230 231 231
Table of Contents Monitoring and auditing everything all the time Automating everything Protecting data Responding to security incidents Selecting technology for architectural security User identity and access management 232 232 233 233 234 234 Federated identity management and single sign-on Kerberos Microsoft Active Directory Amazon Web Services Directory Service Google Identity federation with Active Directory Security Assertion Markup Language OAuth and OpenlD Connect JSON Web Token 236 236 238 239 239 240 241 243 Handling web security Web app security vulnerabilities Web security mitigation Securing an application and its infrastructure Application and operating system hardening Software vulnerabilities and secure code Network, firewall, and trusted boundary Intrusion detection system and intrusion prevention system Data security Data classification Data encryption at rest Data encryption in transit Security and compliance certifications The cloud's shared security responsibility model Summary Chapter 9: Architectural Reliability Considerations Design principles for architectural reliability Making systems self-healing Applying automation Creating a distributed system Monitoring and adding capacity Performing recovery validation Technology selection for architectural reliability Planning the Recovery Time Objective and Recovery Point Objective Replicating data Synchronous versus asynchronous replication Replication methods Planning disaster recovery Backup and restore Pilot light 244 244 247 250 250 251 251 254 256 256 257 261 263 264 266 269 270 270 271 272 272 273
273 274 275 275 276 277 279 281 -------------------------------------------------------------------- [ xvi ]-----------------------------------------------------------------------
Table of Contents 283 286 Warm standby Multi-site Applying best practices for DR Improving reliability with the cloud Summary Chapter 10: Operational Excellence Considerations Designing principles for operational excellence Automating manual tasks Making incremental and reversible changes Predicting failures and responding Learning from mistakes and refining Keeping the operational runbook updated Selecting technologies for operational excellence Planning for operational excellence 287 288 289 291 292 292 293 293 294 294 295 295 296 298 IT asset management Configuration management The functioning of operational excellence 301 Monitoring system health Handling alerts and incident response 302 308 Improving operational excellence 311 311 313 314 IT operations analytics Root cause analysis Auditing and reporting Achieving operational excellence in the public cloud Summary Chapter 11: Cost Considerations Design principles for cost optimization Calculating the total cost of ownership Planning the budget and forecast Managing demand and service catalogs Keeping track of expenditure Continuous cost optimization Techniques for cost optimization Reducing architectural complexity Increasing IT efficiency Applying standardization and governance 315 316 319 320 320 322 324 325 325 326 326 328 330 331 Resource cost tagging Monitoring cost usage and report Cost optimization in the public cloud Summary [ xvii ] 333 337 339
Table of Contents Chapter 12: DevOps and Solution Architecture Framework Introducing DevOps Understanding the benefits of DevOps Understanding the components of DevOps Continuous integration/continuous deployment Continuous monitoring and improvement Infrastructure as Code Configuration management Introducing DevSecOps Combining DevSecOps and CI/CD Implementing a CD strategy In-place deployment Rolling deployment Blue-green deployment Red-black deployment Immutable deployment Implementing continuous testing in the CI/CD pipeline A/В testing Using DevOps tools for CI/CD Code editor Source code management Continuous integration server Code deployment Code pipeline Implementing DevOps best practices Building DevOps and DevSecOps in the cloud Summary Chapter 13: Data Engineering for Solution Architecture What is big data architecture? Designing big data processing pipelines Data ingestion Technology choices for data ingestion Ingesting data to the cloud Storing data Technology choices for data storage Structured data stores NoSQL databases Search data stores Unstructured data stores Object storage Blockchain data store Streaming data stores 341 342 343 344 345 347 348 351 353 353 356 356 357 357 359 359 360 361 363 363 363 364 366 368 369 371 373 375 376 378 380 382 382 383 385 386 388 390 390 391 391 392 [ xviii ]
Table of Contents Processing data and performing analytics Technology choices for data processing and analysis Visualizing data Technology choices for data visualization Designing big data architectures Data lake architecture Lakehouse architecture Data mesh architecture Streaming data architecture Big data architecture best practices Summary Chapter 14: Machine Learning Architecture What is machine learning? Working with data science and ML Evaluating ML models - overfitting versus underfitting Supervised and unsupervised machine learning algorithms Machine learning in the cloud Building machine learning architecture Prepare and label Select and build Train and tune Deploy and manage Machine learning reference architecture Machine learning operations MLOps principles MLOps best practices Deep learning Summary Chapter 15: The Internet of Things Architecture 393 395 398 398 399 401 405 407 409 410 413 415 416 418 420 422 423 424 425 426 426 427 427 430 430 431 433 436 437 438 440 441 What is the Internet of Things? Components of loT architecture Managing loT devices 441 442 Microcontroller device management Microprocessor device management Connecting and controlling loT devices Performing analytics on loT data loT in the cloud Building an industrial loT solution Connected Factory loT architecture Implementing a digital twin [xix] 444 446 447 449 451 452
Table of Contents Summary 455 Chapter 16: Quantum Computing The building blocks of quantum computers Qubits Superposition Entanglement The working mechanism of quantum computers Quantum gates Pauli gates The Hadamard gate Other quantum gates Quantum circuits Types of quantum computers Quantum computing in real life Quantum computing in the cloud Summary Chapter 17: Rearchitecting Legacy Systems Learning the challenges of legacy systems Difficulty in keeping up with user demand Higher cost of maintenance and update Shortage of skills and documentation Vulnerable to corporate security issues Incompatibility with other systems Benefits of system modernization Defining a strategy for system modernization Assessment of a legacy application Defining the modernization approach Looking at legacy system modernization techniques Encapsulation, rehosting, and replatforming Refactoring and rearchitecting Redesigning and replacing Defining a cloud migration strategy for legacy systems Documentation and support Mainframe migration with the public cloud Migrating standalone applications Migrating applications with shared code Application decoupling using a standalone API Application decoupling using a shared library Application decoupling using message queues Summary [xx] 457 458 458 459 460 460 462 462 464 464 465 467 468 469 470 473 474 476 476 477 478 479 480 481 482 484 485 486 487 487 489 490 491 491 493 493 494 494 496
Table of Contents Chapter 18: Solution Architecture Document Purpose of the SAD Views of the SAD Structure of the SAD Solution overview Business context Conceptual solution overview Solution architecture Information architecture Application architecture Data architecture Integration architecture Infrastructure architecture Security architecture Solution implementation Solution management Appendix IT procurement documentation for a solution architecture Summary Chapter 19: Learning Soft Skills to Become a Better Solution Architect Acquiring pre-sales skills Presenting to C-level executives Taking ownership and accountability Defining strategy execution with objectives and key results Thinking big Being flexible and adaptable Design thinking Being a builder by engaging in coding hands-on Becoming better with continuous learning Being a mentor to others Becoming a technology evangelist and thought leader Summary Other Books You May Enjoy Index ---------------------------------------------------------------------[xxi] 497 498 499 501 503 504 506 507 508 508 509 510 510 511 512 512 513 513 514 517 518 519 521 522 523 524 525 527 528 530 531 532 535 539 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Shrivastava, Saurabh |
author_GND | (DE-588)122339610X (DE-588)1223396185 |
author_facet | Shrivastava, Saurabh |
author_role | aut |
author_sort | Shrivastava, Saurabh |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV048209421 |
classification_rvk | ST 230 |
ctrlnum | (OCoLC)1371314543 (DE-599)BVBBV048209421 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02381nam a2200397 c 4500</leader><controlfield tag="001">BV048209421</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230216 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220510s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781801816618</subfield><subfield code="9">978-1-80181-661-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1801816611</subfield><subfield code="9">1-80181-661-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1371314543</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048209421</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shrivastava, Saurabh</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122339610X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Solutions architect's handbook</subfield><subfield code="c">Saurabh Shrivastasa ; Neelanjali Srivastav</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham - Mumbai</subfield><subfield code="b">Packt Publishing</subfield><subfield code="b">Safari</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxix, 559 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Expert insight</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The new edition incorporates new chapters on disruptive technologies, such Internet of Things (IoT), quantum computing, data engineering, and machine learning. It also includes updated discussions on cloud-native architecture, blockchain data storage, and mainframe modernization with public cloud. This book provides an understanding of solution architecture and how it fits into an agile enterprise environment. It will take you through the journey of solution architecture design by providing detailed knowledge of design pillars, advanced design patterns, anti-patterns, and the cloud-native aspects of modern software design. By the end of this book, you'll have learned techniques that enable you to create efficient architecture designs that meet your business requirements. </subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Srivastav, Neelanjali</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1223396185</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033590299&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033590299</subfield></datafield></record></collection> |
id | DE-604.BV048209421 |
illustrated | Illustrated |
index_date | 2024-07-03T19:48:05Z |
indexdate | 2024-07-10T09:32:04Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033590299 |
oclc_num | 1371314543 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xxix, 559 Seiten Illustrationen, Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing Safari |
record_format | marc |
series2 | Expert insight |
spelling | Shrivastava, Saurabh Verfasser (DE-588)122339610X aut Solutions architect's handbook Saurabh Shrivastasa ; Neelanjali Srivastav Second edition Birmingham - Mumbai Packt Publishing Safari 2022 xxix, 559 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Expert insight The new edition incorporates new chapters on disruptive technologies, such Internet of Things (IoT), quantum computing, data engineering, and machine learning. It also includes updated discussions on cloud-native architecture, blockchain data storage, and mainframe modernization with public cloud. This book provides an understanding of solution architecture and how it fits into an agile enterprise environment. It will take you through the journey of solution architecture design by providing detailed knowledge of design pillars, advanced design patterns, anti-patterns, and the cloud-native aspects of modern software design. By the end of this book, you'll have learned techniques that enable you to create efficient architecture designs that meet your business requirements. Architektur Informatik (DE-588)4139374-0 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s Architektur Informatik (DE-588)4139374-0 s DE-604 Srivastav, Neelanjali Sonstige (DE-588)1223396185 oth Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033590299&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Shrivastava, Saurabh Solutions architect's handbook Architektur Informatik (DE-588)4139374-0 gnd Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)4139374-0 (DE-588)7623494-0 |
title | Solutions architect's handbook |
title_auth | Solutions architect's handbook |
title_exact_search | Solutions architect's handbook |
title_exact_search_txtP | Solutions architect's handbook |
title_full | Solutions architect's handbook Saurabh Shrivastasa ; Neelanjali Srivastav |
title_fullStr | Solutions architect's handbook Saurabh Shrivastasa ; Neelanjali Srivastav |
title_full_unstemmed | Solutions architect's handbook Saurabh Shrivastasa ; Neelanjali Srivastav |
title_short | Solutions architect's handbook |
title_sort | solutions architect s handbook |
topic | Architektur Informatik (DE-588)4139374-0 gnd Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | Architektur Informatik Cloud Computing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033590299&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT shrivastavasaurabh solutionsarchitectshandbook AT srivastavneelanjali solutionsarchitectshandbook |