1.3. Typical Technologies

Although we're just scratching the surface of software fortresses, we can already discuss how some common technologies might be used within the software fortress architecture. Here are just a few obvious technology mappings. I will discuss them and others in detail later:

  • Data strongboxes, the repositories of fortress data, are often implemented as physical databases, especially in business application fortresses.

  • Workers inside the business application fortress are often implemented as distributed components.

  • Walls, the parts of the fortress that keep out the riffraff, are often implemented with physical firewalls and/or operating system security services, such as access control lists (ACLs).

  • Guards, the parts of the fortress ...

Get Software Fortresses: Modeling Enterprise Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.