How and Who Writes your Software
Can you trust and verify the software you are using (or developed internally) is secure, safe, and functions as intended? Do you know where the software was developed, who maintains is, how it is maintained, and how it is changed? In this age of increasing cyberattacks, these questions are now an imperative. Listen in for some insight into this very important topic.
Category
- Agility
- Architecture Models
- Architecture Views
- Artificial Intelligence
- Assemble to Order
- BTP
- Benefits
- Big Data
- Bill of Materials
- Book
- Business Architect
- Business Architecture
- Business Architecture Framework
- Business Architecture Participants
- Business Architecture Tools
- Business Capability
- Capabilities
- Capability Ability
- Certification
- Certification Levels
- Certification Mistakes
- Change Management
- Checklist
- Cloud
- Cloud Decommission
- Coding
- Communication
- Competition
- Complexity
- Confirmation Bias
- Consulting
- Cybersecurity
- Data
- Data Architecture
- Data Lake
- Data Modeling
- Data Sludge
- Data Swamp
- Differentiators
- Digital Transformation
- Distance Learning
- Enterprise Architect
- Enterprise Architecture
- Enterprise Architecture Framework
- Enterprise Architecture Participants
- Enterprise Architecture Tools
- Evaluation Checklist
- Evaluation Criteria
- Event Model
- Experiences needed