International Technology Ventures Inc.

Consulting Services Offered:

Cloud Architecture:

  • Cloud: Readiness Assessment
  • Cloud: Adoption Strategy
  • Cloud: Migration Planning
  • Cloud: Phased Adoption
  • Cloud: Containerization
  • Cloud: Capacity & Scalability
  • Cloud: Monolith Refactoring Strategies

APIs & Web Services:

  • API: Domain Driven Design (DDD)
  • API: Domain Boundary Selection/Definition
  • API: Canonical Message Modeling
  • API: Service Design
  • API: Fault Tolerance & High Availability
  • API: Operational Best Practices

Enterprise Architecture (EA):

  • EA: Assessments (Due Diligence, Vendor RFPs, Organizational)
  • EA: Technology Governance Board (TGB) - Setup & Facilitation
  • EA: Architecture Review Board (ARB) - Setup & Facilitation
  • EA: Technology Reference Model (TRM) - Setup & Facilitation
  • EA: Strategic Planning
  • EA: Roadmap Planning
  • EA: Architecture Views & Models
  • EA: Business Capability Modeling
  • EA: Architecture Maturity Models
  • EA: Documentation Review & Creation
  • EA: Drafting of Principles, Policies, Standards, Specifications
  • EA: Interim CTO Consulting
  • EA: Coaching & Mentoring
  • EA: Customized Training Programs & Workshops

Solution Architecture (SA):

  • SA: Requirements Discovery
  • SA: Analysis
  • SA: Solution Architecture Design
  • SA: Algorithm Analysis, Selection, Design
  • SA: Independent Design Review
  • SA: Proof-of-Concept Implementations
  • SA: Technology Evaluations

Data & Information Management:

  • Data Architecture
  • Data Privacy & Compliance Reviews
  • Data Security Analysis
  • Data Model Analysis & Design
  • Performance Tuning Analysis & Recommendations
  • Data Technology Selection
  • Data Technology Evaluations

Enterprise Application Integration (EAI):

  • EAI: Pattern Selection - and Anti-Pattern Avoidance
  • EAI: Architecture
  • EAI: Tooling Evaluation & Selection
  • EAI: Designing for Performance
  • EAI: Designing for Scalability
  • EAI: Designing for High Availability

Security Architecture Considerations:

  • Secure Coding Practices (e.g. SANS Top 25, CIS Top 20, OWASP Top 10)
  • Encryption of data at-rest
  • Encryption of data in-transit
  • Authentication & Authorization
  • System Hardening
  • Intrusion Detection/Monitoring
  • Security Vulnerability Code Scanning