Join David Linthicum for an in-depth discussion in this video Other services to consider, part of Cloud Architecture: Design Decisions.
- So in this area we need to consider special things.…So purpose-built systems,…and IoT big data systems,…all kinds of things that will pop up,…as things that you need to address as an architect…that you may not deal with in traditional business systems.…And that's okay, these challenges are fun to address,…and they're not as hard to solve as you think.…So as technology changes, you need to learn to adjust.…This is not, by the way, kind of a manage by magazine…approach where we're going to chase every hype driven…technology out there and when you see new problems…that arise in the business, not necessarily pushing…all the technology that seems to be popular today,…you know, into those problems, and to solve those problems.…
So again, this is a balance between what is hyped,…what is considered cool versus what you actually need to do…to solve a business problem.…And there's some value in the systems that are popping up,…specifically the systems that are popping up…on public cloud based systems,…serverless computing, IoT based systems, big data systems,…
This course is targeted at IT professionals who have a basic understanding of the cloud and are ready to move on to creating a cloud architecture. David Linthicum begins with the business case and requirement patterns, and then moves onto mapping requirements to individual architecture concepts. There are multiple aspects to consider: storage, processing, governance, management and monitoring, security, performance, and more. David also includes discussion of advanced topics such as serverless architectures and containers. Watch and learn how to make sense of today's requirements, and plan your cloud-based architecture to scale with what your company needs to succeed tomorrow.
- Advanced architecture
- Building a business case
- Defining storage, processing, database, and other requirements
- Mapping requirements
- Performance and security