The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities.
They explain how to move beyond basic scanning by adopting a zero trust mindset toward CI/CD pipelines and external dependencies.
By Sonya Moisset, Andra Lezza, Stefania Chaplin, Celine Pypaert, Emma Yuan Fang
A monthly overview of things you need to know as an architect or aspiring architect.
Facilitating the Spread of Knowledge and Innovation in Professional Software Development
Unlock the full InfoQ experience by logging in!
Stay updated with your favorite authors and topics, engage with content, and download exclusive resources.
Digital sovereignty is about maintaining control of critical systems by limiting reliance on any single vendor.
Open standards and portable architectures reduce lock‑in and keep migration options open, even when providers change pricing, licensing, or viability.
Full independence is impossible, but disciplined design and clear guardrails strengthen resilience.
Anurag Kale discusses the transition from centralized data bottlenecks to a decentralized Data Mesh architecture at Horse Powertrain.
He explains the four pillars - domain ownership, data as a product, self-serve platforms, and federated governance - to empower autonomous teams.