Gartner Blog Network

Category: 'architecture' Blog Posts

from the Gartner Blog Network

Assessing Blockchain Platforms

by Homan Farahmand  |  April 11, 2019

What constitutes a blockchain platform, its design goals, and how that should be assessed have been a source of passionate debate among experts. This can be confusing for technical professionals...

Read more »

Training versus Inference

by Paul Debeasi  |  February 14, 2019

Few data-driven technologies provide greater opportunity to derive value from Internet of Things (IoT) initiatives as machine learning. The accelerated growth of data captured from the sensors in IoT solutions...

Read more »

Machine Learning Integration Options

by Paul Debeasi  |  January 30, 2019

Machine learning projects are inherently different from traditional IT projects in that they are significantly more heuristic and experimental, requiring skills spanning multiple domains, including statistical analysis, data analysis and...

Read more »

Architect Machine Learning with IoT

by Paul Debeasi  |  January 25, 2019

Developers with no data science experience are now able to integrate Machine Learning (ML) with IoT. As the number of IoT endpoints proliferate, the need for organizations to understand how...

Read more »

Security Architecture Frameworks - Yay or Nay?

by Anton Chuvakin  |  October 24, 2018

This post is about a topic that few of us ponder often: security architecture frameworks. We have some exciting research plans in this area, hence this blog series. Perhaps one...

Read more »

In 2018, What Is Security Architecture?

by Anton Chuvakin  |  August 31, 2018

Summer is a less busy time here in terms of client calls [hey … you can book an analyst call for tomorrow … even with me :-)], so we get...

Read more »

Decentralized Identity Hard Work Begins

by Homan Farahmand  |  February 15, 2018

Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Read more »

Robotic Process Automation Knocking on IAM Door!

by Homan Farahmand  |  February 3, 2017

Manual and tedious identity governance and administration tasks can bring chills to many IT leaders when it comes to planning resources in a budget cycle. It is almost an accepted...

Read more »

Testing Your IAM Planning Decisions Needs a Robust Risk Model

by Homan Farahmand  |  April 27, 2016

IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Read more »

Chasing the Long Tail of Fine-grained Authorization

by Homan Farahmand  |  February 9, 2016

Coarse-grained and fine-grained authorization are similar to classic and quantum physics in many ways. One studies the larger objects and the other deals with subatomic particles. With what scientists know...

Read more »