Architects Must Be Hands On

?

Architects Must Be Hands On

John Davies

A good ARCHiTECT SHould lEAd By ExAMplE. He (or she) should be able to fulfill any of the positions within his team, from wiring the net- work and configuring the build process to writing the unit tests and running benchmarks. Without a good understanding of the full range of technology, an architect is little more than a project manager. It is perfectly acceptable for team members to have more in-depth knowledge in their specific areas but it’s difficult to imagine how team members can have confidence in their architect if the architect doesn’t understand the technology. As has been said elsewhere, the architect is the interface between the business and the technol- ogy team, and thus must understand every aspect of the technology to be able to represent the team to the business without having to constantly refer others. Similarly the architect must understand the business in order to drive the team toward its goal of serving the business.

An architect is like an airline pilot: he might not look busy all of the time, but he uses decades of experience to constantly monitor the situation, taking immedi- ate action if he sees or hears something out of the ordinary. The project manager (co-pilot) performs the day-to-day management, leaving the architect free from the hassles of mundane tasks and people management. Ultimately the architect should be responsible for the quality of the projects and their delivery to the busi- ness. This is difficult to achieve without authority, which is critical to the success of any project.

People learn best by watching others; it’s how we learn as children. A good architect should be able to spot a problem, call the team together, and without picking out a victim, explain what the problem is or might be and provide an elegant workaround or solution. It is perfectly respectable for an architect to

??ask for help from the team. The team should feel it is part of the solution, but the architect should chair the discussion and identify the right solution(s).

Architects should be brought into the team at the earliest part of the project; they should not sit in an ivory tower dictating the way forward, but should be on the ground working with the team. Questions about direction or technology choices should not be spun off into separate investigations or new projects, but be made pragmatically through hands-on investigation or using advice from architect peers—all good architects are well connected.

Good architects should be experts in at least one tool of their trade, e.g., an IDE; remember they are hands on. It stands to reason that a software architect should know the IDE, a database architect should know the ER tool, and an information architect should know an XML modelling tool. A technical or enterprise archi- tect, however, should be at least effective with all levels of tooling, from being able to monitor network traffic with Wireshark to modelling a complex financial message in XMLSpy—no level is too low or too high.

An architect usually comes with a good resume and impressive past. He can usually impress the business and technologists, but unless he can demonstrate his ability to be hands on, it’s difficult to gain the respect of the team, difficult for the team to learn, and almost impossible for team members to deliver what they were originally employed to do.

John Davies is currently chief architect at Revolution Money in the U.S. He re- cently started a new company called Incept5.

时间: 2024-11-15 09:35:14

Architects Must Be Hands On的相关文章

Learn from Architects of Buildings

? Learn from Architects of Buildings Keith Braithwaite Architecture is a social act and the material theater of human activity. -Spiro Kostof HoW MAny SoFTWARE ARCHiTECTS see their role as exclusively, or primar- ily, technical? Is it not rather that

Architects’ Focus Is on the Boundaries and Interfaces

? Architects' Focus Is on the Boundaries and Interfaces Einar Landre SinCE loRd nElSon dESTRoyEd the French and Spanish fleet at Trafalgar in 1805, "divide and conquer" has been the mantra for dealing with complex and difficult problems. A more

info AI drive

Who we look for Here at comma, we don't care about the source of your education or your traditional puffed up resume, we care about your abilities. We are looking for the following traits: Competitors People who have done well at math competitions(US

August 30th 2016 Week 36th Tuesday

If you keep on believing, the dreams that you wish will come true. 如果你坚定信念,就能梦想成真. I always believe I am unique and I will get what I dream of. But they haven't come true yet. Maybe my efforts are not enough. Please fling yourself into your missions

给VS2008 打补丁

vs2003到2008各版本如下: vs.net2003 Visual Studio .NET 2003 Enterprise Architect Visual Studio .NET 2003 Enterprise Developer Visual Studio .NET 2003 Professional VS2005 Visual Studio 2005 Professional Visual Studio 2005 Standard Visual Studio 2005 Team Edi

微软职位内部推荐-Sr. SW Engineer for Privacy Id

微软近期Open的职位: Job posting title: Senior Software Engineer for Privacy Identification Profession: Engineering Discipline: Software Engineering Location: China, Beijing Division: Technology& Research &nbsp Are you passionate about building large scal

Synthesis of memory barriers

A framework is provided for automatic inference of memory fences in concurrent programs. A method is provided for generating a set of ordering constraints that prevent executions of a program violating a specification. One or more incoming avoidable

cypress的EZ-USB对于USB的介绍

Host is MasterThis is a fundamental USB concept. There is exactly onemaster in a USB system: the host computer. USB devicesrespond to host requests. USB devices cannot send information among themselves, as they could if USB were apeer-to-peer topolog

Big Data Analytics for Security(Big Data Analytics for Security Intelligence)

http://www.infoq.com/articles/bigdata-analytics-for-security This article first appeared in the IEEE Security & Privacymagazine and is brought to you by InfoQ & IEEE Computer Society. Enterprises routinely collect terabytes of security-relevant da