O'Reilly logo

Software Fortresses: Modeling Enterprise Architectures by Janet Van Sickler, Roger Sessions

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1.3. Typical Technologies

Although we're just scratching the surface of software fortresses, we can already discuss how some common technologies might be used within the software fortress architecture. Here are just a few obvious technology mappings. I will discuss them and others in detail later:

  • Data strongboxes, the repositories of fortress data, are often implemented as physical databases, especially in business application fortresses.

  • Workers inside the business application fortress are often implemented as distributed components.

  • Walls, the parts of the fortress that keep out the riffraff, are often implemented with physical firewalls and/or operating system security services, such as access control lists (ACLs).

  • Guards, the parts of the fortress ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required