1.3. Typical Technologies
Although we're just scratching the surface of software fortresses, we can already discuss how some common technologies might be used within the software fortress architecture. Here are just a few obvious technology mappings. I will discuss them and others in detail later:
Data strongboxes, the repositories of fortress data, are often implemented as physical databases, especially in business application fortresses.
Workers inside the business application fortress are often implemented as distributed components.
Walls, the parts of the fortress that keep out the riffraff, are often implemented with physical firewalls and/or operating system security services, such as access control lists (ACLs).
Guards, the parts of the fortress ...
Get Software Fortresses: Modeling Enterprise Architectures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.