Home
About
Privacy
Services
Contact
International Technology Ventures Inc.
Consulting Services Offered:
Cloud Architecture:
Cloud: Readiness Assessment
Cloud: Adoption Strategy
Cloud: Migration Planning
Cloud: Phased Adoption
Cloud: Containerization
Cloud: Capacity & Scalability
Cloud: Monolith Refactoring Strategies
APIs & Web Services:
API: Domain Driven Design (DDD)
API: Domain Boundary Selection/Definition
API: Canonical Message Modeling
API: Service Design
API: Fault Tolerance & High Availability
API: Operational Best Practices
Enterprise Architecture (EA):
EA: Assessments (Due Diligence, Vendor RFPs, Organizational)
EA: Technology Governance Board (TGB) - Setup & Facilitation
EA: Architecture Review Board (ARB) - Setup & Facilitation
EA: Technology Reference Model (TRM) - Setup & Facilitation
EA: Strategic Planning
EA: Roadmap Planning
EA: Architecture Views & Models
EA: Business Capability Modeling
EA: Architecture Maturity Models
EA: Documentation Review & Creation
EA: Drafting of Principles, Policies, Standards, Specifications
EA: Interim CTO Consulting
EA: Coaching & Mentoring
EA: Customized Training Programs & Workshops
Solution Architecture (SA):
SA: Requirements Discovery
SA: Analysis
SA: Solution Architecture Design
SA: Algorithm Analysis, Selection, Design
SA: Independent Design Review
SA: Proof-of-Concept Implementations
SA: Technology Evaluations
Data & Information Management:
Data Architecture
Data Privacy & Compliance Reviews
Data Security Analysis
Data Model Analysis & Design
Performance Tuning Analysis & Recommendations
Data Technology Selection
Data Technology Evaluations
Enterprise Application Integration (EAI):
EAI: Pattern Selection - and Anti-Pattern Avoidance
EAI: Architecture
EAI: Tooling Evaluation & Selection
EAI: Designing for Performance
EAI: Designing for Scalability
EAI: Designing for High Availability
Security Architecture Considerations:
Secure Coding Practices (e.g. SANS Top 25, CIS Top 20, OWASP Top 10)
Encryption of data at-rest
Encryption of data in-transit
Authentication & Authorization
System Hardening
Intrusion Detection/Monitoring
Security Vulnerability Code Scanning