Skip to content →

Category: Architecture

The role of PowerShell in IT-aware Services and Applications

Several months ago, I happened to share a nice conversation about the potential of PowerShell as part of the IT/Enterprise Architecture. Then I discovered that the benefits of architecting IT-aware Applications are still widely unknown or misunderstood. That’s the reason I would like to share my thoughts on this subject pointing out the special role that PowerShell can play in this field.

IT-aware Services and Applications

IT-aware Services and Applications incorporate the necessary instrumentation so that IT and Operations Teams can control, monitor, diagnose and operate them using the same semantics that the business uses in addition to the ...

Continue reading ...

Leave a Comment

APIs and the “Technology Mix”

Today I would like to recall a really nice conference I saw last January: “Infrastructure in the Cloud Era”. This presentation was performed at O'Reilly Velocity Conference 2009 by Adam Jacob (Co-Founder at OpsCode) and Ezra Zygmuntowicz (Co-Founder at EngineYard).

They cover the theory of how you should be thinking about building a Fully Automated Infrastructure classifying their analysis in the following areas:

  • Bootstrapping: Corporate Approvals, Agile Approvals, Cloud.
  • Configuration: Manual, Ad-Hoc, Infrastructure as Code.
  • Command and Control: Manual, Ad-Hoc, Framework.

They conclude, in the context of a Cloud Infrastructures, that ...

Continue reading ...

3 Comments

NMTools Framework Services explained

Those who have tried NMTools may have realized that provides certain services that are always needed whenever one have to deal with a large environment.

Network Services

In this context, we understand Network Services as the ability to express your Target Node set through different input sources and the capacity to iterate through it handling every exception that might occur.

For example, your Target might be a host name, an IP address, a collection/combination of host names and/or IP addresses, an IP range or a CDIR network notation. Additionally, this information may come from the command-line, from a file or ...

Continue reading ...

Leave a Comment