Software Architecture Published: July 17, 2024 A 路 B 路 C 路 D 路 E 路 F 路 G 路 H 路 I 路 K 路 L 路 M 路 N 路 O 路 P 路 Q 路 R 路 S 路 T 路 U 路 V 路 W 路 X 路 ZA Abstraction Abstraction: Blackbox Abstraction: Whitebox Abstractness Active Directory Adapter Aggregation Anti Patterns API (Application Programming Interface) API Endpoint API Gateway Appropriateness Architectural Decision Architectural Tactic Architectural View Architecture Description Architecture Evaluation Architecture Goal Architecture Model Architecture Pattern Architecture Style Artifact Association ATAM B Bottom-Up Approach Bridge Build Block View Building Block Business Architecture Business Process Modeling C C4 Model Cloud Computing Cohesion Command Command Query Separation Complexity Composition Concept Conceptual Integrity Consistency Constraint Container Context Context View Coupling CQRS (Command Query Responsibility Segregation) Cross-Cutting Concept Curriculum Cyclomatic Complexity D Data Architecture Data Flow Decomposition Dependency Dependency Injection Dependency Inversion Principle Deployment Deployment View Design Pattern Design Pattern Examples Design Patterns Design Principle Design Rationale DI (Dependency Injection) Domain-Driven Design (DDD) Domain Model DRY (Don't Repeat Yourself) E Embedded System Encapsulation Enterprise Architecture Enterprise IT Architecture Environment ESB (Enterprise Service Bus) Event-Driven Architecture Event-Driven Programming Event Sourcing F Facade Factory Fallacies of Distributed Computing Fault Tolerance Firewall Fork Framework Full Stack Development Functional Programming G Garbage Collection GraphQL H High Availability I Immutable Data Integration Platform Interface Segregation Principle Inversion of Control ISO9126 ISO25010 IT Governance IT Infrastructure K Kanban Kubernetes L Lambda Architecture Latency Layer Legacy System Liskov Substitution Principle Load Balancing M Machine Learning Maintainability Microservice Microservices Middleware Model-Driven Architecture (MDA) Model Driven Software Development Model-View Controller (MVC) Modular Programming Modularization Module Monitoring Monolithic Architecture Multi-Tenancy N Namespace Network Architecture Network Design Node (in UML) Node (Node.js) Non-Functional Requirements NoSQL O OAuth Observer Open Source Open-Closed Principle Operational Technology (OT) Orchestration P Parallel Processing Platform as a Service Polyglot Persistence POSA (Pattern-Oriented Software Architecture) Proof of Concept Proxy Proxy Server Public Key Infrastructure R Refactoring Representational State Transfer (REST) Reverse Proxy S Scalability Security Token Serverless Computing Service-Oriented Architecture (SOA) Shiny Single Sign-On (SSO) Single Responsibility Principle Single SOAP (Simple Object Access Protocol) Software Architecture Software Development Life Cycle Software as a Service (SaaS) Solution Architecture SSOT (Single Source of Truth) Statelessness Swagger System Architecture T Template for Documentation Temporal Coupling TOGAF (The Open Group Architecture Framework) Token-Based Authentication Top-Down Approach Traceability Trade-Off Two-Factor Authentication (2FA) U Unified Modeling Language (UML) Unit Test Unit Testing Usability User Experience (UX) User Interface (UI) Uses Relation V Version Control Virtual Machine (VM) Virtual Private Network (VPN) Virtualization W View Waterfall Development Web Application Web Development Web Services WebSockets WinAPI (Windows API) Workflow Management System (WFMS) Wrapper X x86 Assembly Language XAML (Extensible Application Markup Language) XML (Extensible Markup Language) XML Parser XMPP (Extensible Messaging and Presence Protocol) XPath XSL (Extensible Stylesheet Language) XSLT (Extensible Stylesheet Language Transformations) Z Zero-Day Vulnerability Zero Trust Security Share Article: Copy Link Previous Article Haussmann Architecture Next Article Achieving Customer Data Excellence