Agile Architecture Method Explained

From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 23:03, 12 December 2008 (edit)
JD (Talk | contribs)

← Previous diff
Revision as of 23:10, 12 December 2008 (edit)
JD (Talk | contribs)

Next diff →
Line 10: Line 10:
== Chapters == == Chapters ==
The following overview shows you how to execute the agile architecture method: The following overview shows you how to execute the agile architecture method:
-* [[Security Engineering Explained - Introduction | Introduction]]+* [[Agile Architecture Method Explained - Introduction | Introduction]]
-* [[Security Engineering Explained - Chapter 1 - Security Engineering Approach | Chapter 1 - Security Engineering Approach]]+* [[Agile Architecture Method Explained - Chapter 1 - Agile Architecture Method | Chapter 1 - Agile Architecture Method]]
-* [[Security Engineering Explained - Chapter 2 - Security Objectives | Chapter 2 - Security Objectives]]+* [[Agile Architecture Method Explained - Chapter 2 - Step 1: Identify Architecture Objectives | Chapter 2 - Step 1: Identify Architecture Objectives]]
-* [[Security Engineering Explained - Chapter 3 - Security Design Guidelines | Chapter 3 - Security Design Guidelines]]+* [[Agile Architecture Method Explained - Chapter 3 - Step 2: Identify Key Scenarios | Chapter 3 - Step 2: Identify Key Scenarios]]
-* [[Security Engineering Explained - Chapter 4 - Threat Modeling | Chapter 4 - Threat Modeling]]+* [[Agile Architecture Method Explained - Chapter 4 - Step 3: Application Overview | Chapter 4 - Step 3: Application Overview]]
-* [[Security Engineering Explained - Chapter 5 - Security Architecture and Design Review | Chapter 5 - Security Architecture and Design Review]]+* [[Agile Architecture Method Explained - Chapter 5 - Step 4: Key Hot Spots | Chapter 5 - Step 4: Key Hot Spots]]
-* [[Security Engineering Explained - Chapter 6 - Security Code Review | Chapter 6 - Security Code Review]]+* [[Agile Architecture Method Explained - Chapter 6 - Step 5: Candidate Solutions | Chapter 6 - Step 5: Candidate Solutions]]
-* [[Security Engineering Explained - Chapter 7 - Security Deployment Review | Chapter 7 - Security Deployment Review]]+* [[Agile Architecture Method Explained - Chapter 7 - Reviewing Your Architecture | Chapter 7 - Reviewing Your Architecture]]
 +* [[Agile Architecture Method Explained - Chapter 8 - Communicating Your Architecture | Chapter 8 - Communicating Your Architecture]]

Revision as of 23:10, 12 December 2008

- J.D. Meier , Alex Homer, David Hill, Jason Taylor , Prashant Bansode , Lonnie Wall, Rob Boucher Jr, Akshay Bogawat.


This guide summarizes the patterns & practices approach to agile architecture design. An agile architecture approach is lightweight, iterative and leverages an understanding of the key hotspots where architecture and design mistakes are most often made. Agile architecture activities include identification of architecture objectives, determination of architecturally significant scenarios, identification of your application type, understanding deployment constraints, choice of architectural styles, determination of technology options, identification of key hot spots, and creation of candidate solutions. These activities are iterative, with an understanding that you may not know everything you need to know at the start and will adjust your approach as additional information becomes available. We wrote this guide to accomplish the following:

  • To help you design more effective architectures.
  • To help you choose the right technologies.
  • To help you make more effective choices for key engineering decisions.


Chapters

The following overview shows you how to execute the agile architecture method:

Personal tools