Gartner TIME Model: Effective Application Portfolio Management

Reading Time: 3 minutesApplication Portfolio Management (APM) is a strategic discipline for managing an enterprise’s software applications as a portfolio of assets. The Gartner TIME Model is the industry-standard framework for this process, enabling organizations to make data-driven decisions to optimize costs, reduce risk, and align IT investments with business objectives.

Using Internal Developer Platforms (IDPs) in the Enterprise

Reading Time: 4 minutesThe modern enterprise faces a critical challenge: the increasing complexity of cloud-native technologies imposes a significant cognitive load on developers, hindering productivity and slowing innovation.

Database Migration Strategy in the Enterprise

Reading Time: 4 minutesA database migration must be treated as a strategic business transformation, not just a technology project.

Build a Security Metrics Program to Drive Maturity

Reading Time: 3 minutesThis document provides a condensed blueprint for establishing a security metrics program focused on driving organizational maturity.

Role of the Enterprise Architect

Reading Time: 3 minutesStatus: Final Blueprint Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: January 9, 2022 Location: Dhaka, Bangladesh Version: 1.0 Executive Summary The Enterprise Architect (EA) is a pivotal strategic role that integrates business strategy with Read More …

Cloud-based Risk & BCM Software Platform – Off-the-shelf or Custom Build?

Reading Time: 3 minutesStatus: Final Blueprint Summary Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: February 22, 2024 Location: Dhaka, Bangladesh Version: 1.0 1. The Strategic Imperative for Integrated Resilience The modern business landscape demands a proactive, integrated Read More …

Securing the Software Supply Chain: Best Practices for Open-Source Library Ingestion

Reading Time: 4 minutesStatus: Final Blueprint (Summary) Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: October 10, 2022 Version: 1.0 1. Executive Summary The modern enterprise runs on open-source software (OSS), which creates a vast and unmanaged attack Read More …

Importance of Identifying & Tracking Hackers Activities into Your Network, But for How Long? Are You Skilled Enough?

Reading Time: 4 minutesOverview To conduct a deep-dive investigation into the principles, practices, and challenges of identifying, tracking, and analyzing malicious actor activities within a corporate network. This document will culminate in a comprehensive, interactive report designed for C-suite executives, IT security leadership, Read More …

Supercharge Your Security: A Modern Approach with Zero Trust

Reading Time: 2 minutesImage source: Security Adoption Resources | Microsoft Learn Traditional security models that rely on a fortified perimeter are no longer enough. With the rise of remote work, cloud applications, and increasingly sophisticated cyber threats, organizations need a more dynamic and Read More …

How Attackers Conduct a Typical Business Email Compromise (BEC) Attack

Reading Time: 3 minutesIn a typical Business Email Compromise (BEC) attack, attackers impersonate trusted individuals or organizations to deceive employees into taking harmful actions like transferring funds or sharing sensitive information. This involves research, email manipulation, and often social engineering tactics to exploit Read More …

Cloud Computing Reference Architecture

Reading Time: 9 minutesImage Source: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication500-292.pdf Cloud computing has become an integral part of modern IT infrastructure, enabling enterprises to achieve scalability, efficiency, and agility. This paper discusses the Cloud Computing Reference Architecture (CCRA), including its key adoption requirements, standard bodies of knowledge Read More …

Automatic Car Toll System

Reading Time: 2 minutesEmphasizing on the technology requirements, implementation challenges, and platform security management: Image Source: Transportation | ITS Intelligent Transportation Solutions Overview The Automatic Car Toll System (ACTS) is an innovative solution aimed at streamlining toll collection processes for highways and bridges. Read More …

Securing Personal Blogs – Key Security & Compliance Steps (Part-1/5)

Reading Time: 3 minutes1.  Introduction With the increasing threats to online security, securing personal blogs is not just about maintaining content integrity but also ensuring protection against cyberattacks and compliance with global data privacy laws. This paper explores essential security mechanisms and compliance Read More …

Case Study: Implementing Enterprise Architecture in an ISP Business in Bangladesh

Reading Time: 3 minutesBackground: with an increasing demand for reliable internet services in Bangladesh, a twenty years ofd ISP aimed to differentiate itself by providing high-quality, affordable services while ensuring efficient operations and scalability. To achieve these goals, Enterprise Architecture (EA) was implemented Read More …

Azure Well-Architected Framework (WAF)

Reading Time: 5 minutesThe Azure Well-Architected Framework (WAF) encompasses five essential tenets that guide solution architects in building robust and efficient workloads on Microsoft Azure:  These tenets collectively provide a strong foundation for designing and operating workloads on Azure, ensuring they deliver business value over time. Read More …

ITOOF – IT Operation and Organization Framework

Reading Time: 2 minutesQUOTED FROM THE VIDEO from YouTube by Adrian Grigoriu “The ITOOF, or IT Operation and Organization Framework, is an IT Service Management (ITSM) framework designed to help plan, build, organize, and describe the organization and operation of an IT department. Read More …

OS Feature Comparison: Windows, Linux, Mac

Reading Time: < 1 minuteThis document is prepared for official needs, and is proven to be vital where a new or growing company needs to standardize their internal laptop’s OS. We were to choose a standardized OS that needs to be put in, into Read More …

Complete Network Diagram for 500 Users Using Microsoft Solution

Reading Time: < 1 minuteBelow is the complete diagram for an organization for 500 users. This design includes the following Microsoft Services: Page-1: Complete Design Topology Page-2: Exchange Server 2013 Design Topology with DAG Page-3: Lync Server 2013 Design Topology with PSTN Page-4: Active Read More …

Microsoft System Center 2012 R2 Configuration Manager: List of Default Reports

Reading Time: < 1 minuteRecently an organization requested to perform a quick asset management (inventory) along with some reports from the SCCM 2012 R2 I’ve recently deployed. More than 2500 devices were enrolled in a period of a month. and by default: we have Read More …

Windows Search: Find Files Modified on a Specific Date

Reading Time: < 1 minuteIt’s a rather small & interesting post regarding searching files by it’s modified date. To some extent this knowledge became essential  when people are handling too many office files. So, on a specific date how do you search for modified Read More …

DNS Resource Record Types

Reading Time: < 1 minuteDNS resource records can be used to provide DNS-based data about computers on a TCP/IP network. Well I don’t know if there is a network other than TCP/IP network, other than the internal isolated lab network for engineering purposes. Anyway, Read More …

Configuring Two-Factor Authentication in Lync Server 2013

Reading Time: < 1 minuteA two factor authentication requires a domain username and then followed by a password, and afterwards a Certificate PIN or RSA PIN or similar or identical featured access types. Now in Windows Servers, implementing a Smart Card feature or a Read More …

Block E-Mail Attachments on Mobile Devices

Reading Time: < 1 minuteEver curious about blocking users attachments from their mails? In their handheld devices? Run the following command to check if the policy is set or not as a default option for all mail boxes under Exchange Server. Get-ActiveSyncMailboxPolicy And since Read More …

Prepare to Deploy Active Directory – Checklist

Reading Time: 2 minutesNumber One – Hardware: Is your hardware ready for the AD? How good are your sizing for this? Are they (PDC, BDC) going to be virtualized or not? Well in my opinion theres no need for deploying a stand alone Read More …

Microsoft Exchange Server 2013 Operating System (OS) Requirements

Reading Time: < 1 minuteA friend of mine requested this; as you might already know that Exchange Server 2013 can be installed on Winwk12R2 and also optimized. But none the less older versions of windows server do support Exchange 2013…and the list follows Exchange Read More …

Channel9 Video: Deploying and Managing Exchange Server 2013

Reading Time: < 1 minuteAs a continual effort to let IT folks know that how these Exchange Server 2013 solution works, how to manage and maintain it. Microsoft released those video’s in the Channel9 site on October 2013. Content follows:         Read More …