Gartner Blog Network

Tag: 'architecture' Blog Posts

from the Gartner Blog Network

The Account Repository Pattern in Security Architecture

by Brian Iverson  |  March 9, 2015

I have a bad habit of including lots of sidebar notes in my research. I don't want to be known as the guy who writes 20- or even 30-page research...

Read more »

It's Always a Good Time for Security and IAM to Build a Strong Foundation

by Brian Iverson  |  March 4, 2015

A recent blog post by Gunnar Peterson has characterized 2015 as the year when "information security has finally caught the car". The attention of businesses is continually being focused on security...

Read more »

The Missing 'P': Politics

by Brian Iverson  |  February 21, 2015

Those who are familiar with Gartner's research on identity and access management or attended some of our presentations should recognize the venerable "Seven P's" model. [caption id="" align="aligncenter" width="600"] Gartner's Seven-P's Model[/caption] There is...

Read more »

Visualizing the Discipline of Cloud Architecture

by Richard Watson  |  February 9, 2015

Cloud architecture is a hot topic in my Gartner client discussions. Experienced architects understand that cloud represents a discontinuity in established patterns and we need new architecture models and practices...

Read more »

provided vs exposed

by Aneel Lakhani  |  July 29, 2013

If you're offering infrastructure as a service, you have to have infrastructure to offer and it has to be exposed. But if you're offering something else, then: The infrastructure doesn't...

Read more »

The New Gartner Mobile Reference Architecture

by Paul Debeasi  |  August 13, 2012

Summary: Gartner has introduced the first and only Mobile Reference Architecture for enterprise IT organizations. The Mobile Reference Architecture is an integrated set of research that helps IT organizations make...

Read more »

Bach to Basics: Why You Should Care About Cloud Internals

by Jay Heiser  |  July 8, 2011

Just as the transition from a physically-secure batch-oriented environment to a remotely-accessible multi-tasking/multi-user environment had huge implications for security, the evolution from multi-user host-based environments to multi-tenant cloud-based environments represents...

Read more »

Abstracting IaaS... or not

by Lydia Leong  |  June 24, 2010

Customer inquiry around cloud IaaS these days is mostly of a practical sort -- less "what is my broad long-term strategy going to be" or "help me with my initial...

Read more »

When Social Software Vendors Start Talking about Architecture, Something Is Changing

by Jeffrey Mann  |  June 27, 2009

I talk with a fair number of vendors every month about their collaboration and social software offerings. Usually, these briefings have a familiar pattern (the easiest to use, the most...

Read more »

To Successfully Centralize – Don’t Stress Commonalities, Stress Differences?

by Kristin Moyer  |  March 3, 2009

Hi, Mary Knox here. Over the past few weeks, I’ve spoken with a number of clients about their efforts to centralize data or processes, both to reduce costs and to...

Read more »