News

This repository contains a logical architecture diagram illustrating a cloud-based security monitoring system. It demonstrates how various infrastructure components, including servers and security ...
Sadly, companies often end up with a cloud architecture that works. “It works” does not describe an optimal solution. The functional-yet-less-optimal architecture will deliver far less value ...
The transformation of user requirements into system requirements models can be achieved using the 4 Step Rule Set (4SRS) method that transforms UML use case diagrams into system-level object diagrams.
This repository contains a logical architecture diagram that I created for a cloud-based security monitoring setup. It shows how different components, like servers and security tools, are connected to ...