Do Dont m make t them g guess How to improve your architecture - - PowerPoint PPT Presentation

do don t m make t them g guess
SMART_READER_LITE
LIVE PREVIEW

Do Dont m make t them g guess How to improve your architecture - - PowerPoint PPT Presentation

Do Dont m make t them g guess How to improve your architecture visualizations OReilly Software Architecture Conference New York City, February 27, 2018 Jochem Schulenklopper, Xebia @jschulenklopper Do Dont t ma make th them


slide-1
SLIDE 1

Do Don’t m make t them g guess

How to improve your architecture visualizations

O’Reilly Software Architecture Conference New York City, February 27, 2018 Jochem Schulenklopper, Xebia @jschulenklopper

slide-2
SLIDE 2

Do Don’t t ma make th them m guess How to improve your architecture visualizations

Communicating (about) architecture to non-IT and business stakeholders is a valuable skill for architects. After all, many architectural-relevant decisions are made by others, so they need to be informed with clear, honest, intelligible and helpful information and

  • advice. This presentation will show theory and practical tips on eight

different facets of visual communication of architecture. Jochem Schulenklopper, Xebia jschulenklopper@xebia.com

slide-3
SLIDE 3

Who’s th

them?

And wh

why can’t we let them gu gues ess?

slide-4
SLIDE 4

Se Service ces, s, modules, s, libraries So Software components In Integ egration Perfor

  • rmance, s

scalability Con Consistency, a availability, s stability Fr Frameworks, s, languages, s, platforms SOL SOLID, , GR GRASP SP, , DRY, , KISS SS

slide-5
SLIDE 5

Is Issues es, changes es Ol Old-fa fashioned applications Cos Costs, i investments, r revenue Me Metri rics, KPIs PIs, ROI Op Opportunities, s, threats Vu Vulnera rabilities, risks CAP CAPEX v

  • vs. O

OPEX

slide-6
SLIDE 6

‘Architecting’ Getting input Providing information

slide-7
SLIDE 7

Co Communication \kə-ˌmyü-nə-ˈkā-shən\ Using words, sounds, signs, or behaviors to ex express or ex exchange information

  • r to convey ideas, thoughts, feelings,

... to to someone else

slide-8
SLIDE 8

Co Communication \kə-ˌmyü-nə-ˈkā-shən\ Getting a message ac across and under understood

Protip: it helps to use a language your audience understands

slide-9
SLIDE 9

The ‘other’ architects use visualizations all all th the e tim time

http://www.lego.com/en-us/architecture/products/new-york-city-21028

slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13

Simplified working ex example for today

(not far removed from many architecture visualizations we see)

Customer web FinApp B2B Portal Legacy CRM SQL Server 2000 PostgreSQL 8.x ACME backend Some apps in AWS EC2 AD Big Data processing

slide-14
SLIDE 14

Improve your architecture visualizations, using...

  • 1. Pre-attentive processing
  • 2. ‘Gestalt’ principles
  • 3. Color
  • 4. Text
  • 5. Icons, images
  • 6. Graphs and (interactive) data visualizations
  • 7. Storytelling
  • 8. Sketchnoting
slide-15
SLIDE 15

6 4 4 8 9 4 8 9 6 3 8 5 2 8 2 3 2 4 8 8 5 2 6 4 7 8 8 9 3 4 8 4 3 7 9 3 2 1 3 8 7 2 7 1 2 9 2 7 1 8 3 6 3 4 2 7 2 5 2 7 1 5 1 5 4 3 5 6 9 2 9 8 3 3 6 2 4 1 2 9 5 7 1 2 1 7 2 4 8 5 6 1 7 2 8 7 4 3 8 7

slide-16
SLIDE 16

6 4 4 8 9 4 8 9 6 3 8 5 2 8 2 3 2 4 8 8 5 2 6 4 7 8 8 9 3 4 8 4 3 7 9 3 2 1 3 8 7 2 7 1 2 9 2 7 1 8 3 6 3 4 2 7 2 5 2 7 1 5 1 5 4 3 5 6 9 2 9 8 3 3 6 2 4 1 2 9 5 7 1 2 1 7 2 4 8 5 6 1 7 2 8 7 4 3 8 7

slide-17
SLIDE 17

gdsnungncgwlymqlbcuwpefuoeoroik nyi Pr

Pre-at atte tentive ve ftapjqfgowatxjhbqls

glqtbxr proce

cessing dxpapqneamijhfhi

evtoycv of

  • f lvfzvwtwt vis

visual al dyynkhbq

cdloh at

attribute tes irextgxbyeeasdmyse

tzaqhppdhwqhyfxmpuxbypwxguamk

slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23
slide-24
SLIDE 24
slide-25
SLIDE 25
slide-26
SLIDE 26
slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29
slide-30
SLIDE 30

Wa Warning: close your eyes if you’ve

got pho

photosens nsit itiv ive ep epilep ilepsy :-)

slide-31
SLIDE 31
slide-32
SLIDE 32
slide-33
SLIDE 33
slide-34
SLIDE 34

Protip: don’t make objects equal if the object

cts aren’t equal

(according to some measure)

@jschulenklopper

slide-35
SLIDE 35

And since not everybody is here:

don’t assume that objects

ar are e eq equal al if they lo look eq equal al

@jschulenklopper

slide-36
SLIDE 36
slide-37
SLIDE 37
slide-38
SLIDE 38

https://www.neurosciencemarketing.com/blog/articles/gestalt-principles.htm

slide-39
SLIDE 39
slide-40
SLIDE 40
slide-41
SLIDE 41
slide-42
SLIDE 42
slide-43
SLIDE 43
slide-44
SLIDE 44
slide-45
SLIDE 45
slide-46
SLIDE 46
slide-47
SLIDE 47
slide-48
SLIDE 48

Protip: gr

group things

when th

thin ings s ar are alik alike

(again, according to some measure)

@jschulenklopper

slide-49
SLIDE 49

Customer web FinApp B2B Portal Legacy CRM SQL Server 2000 PostgreSQL 8.x ACME backend Some apps in AWS EC2 AD Big Data processing

slide-50
SLIDE 50
slide-51
SLIDE 51
slide-52
SLIDE 52

http://web.mta.info/maps/submap.html

slide-53
SLIDE 53
slide-54
SLIDE 54

Image credit: Daniel Burns, @dburnsdesign

slide-55
SLIDE 55

Trust Confidence Stability Safety Harmony Healthy Clean Purity Light Energy Attention Happy Wealth Wisdom Royalty Success Enthusiasm Creativity Passion Strength Energy Mystery Elegance Power

slide-56
SLIDE 56

https://kieranhealy.org/blog/archives/2015/06/12/americas-ur-choropleths/

slide-57
SLIDE 57

http://www-personal.umich.edu/~mejn/election/2016/

slide-58
SLIDE 58

http://www-personal.umich.edu/~mejn/election/2016/

slide-59
SLIDE 59

http://www.colour-blindness.com/colour-blindness-tests/ishihara-colour-test-plates/

slide-60
SLIDE 60
slide-61
SLIDE 61
slide-62
SLIDE 62
slide-63
SLIDE 63

Protip: use color to convey

  • r bo

boost y your me ur messa ssage

(but use it wisely, and not just to prettify)

@jschulenklopper

slide-64
SLIDE 64

CustomerWeb FinApp B2B Portal Apps in EC2 Legacy CRM

Accounts Big Data processing

ACME backend ACME’s IT - today Version 0.8

  • Feb. 27, 2018

author@acme.org ~80k # users 560 27 99.7% uptime 176 # open defects

slide-65
SLIDE 65

This should be TURNED OFF before 4Q2018 PoC in 2018: INTEGRATING these three Minor UPGRADE required to v. 9.1 EXPENSIVE!

slide-66
SLIDE 66

boring, and ugly

just right

very ry creativ ive, no not readable le

too few

Ascender Descender Do not Stem Tail Serif Crossbar Use Counter Eye Terminal Jargon Condensed Kerning

this is way, way too much text to convey such a simple tip

too small

suitable

  • large
slide-67
SLIDE 67

Protip: K.

K.I.S.S.

(and do not use jargon)

Yes, that’s a joke. “K.I.S.S.” is jargon.

@jschulenklopper

slide-68
SLIDE 68

https://www.behance.net/gallery/7868787/MA

slide-69
SLIDE 69
slide-70
SLIDE 70
slide-71
SLIDE 71

http://www.flaticon.com/packs/basic-flat-icons

slide-72
SLIDE 72
slide-73
SLIDE 73

GDPR anyone? Where’s our “personal data”?

Icon made by Freepik from www.flaticon.com

slide-74
SLIDE 74

Protip: be prude

prudent with pict ctures,

and in

intellig elligen ent with ic icons

(Use them, but with caution)

@jschulenklopper

slide-75
SLIDE 75 50 100 150 200 250 300 350 400 450 MILLISONS USD

Vinyl records are back, unquestionably! revenue 2005 - 2015

Source: US-based data compiled by the Recording Industry Association of America
slide-76
SLIDE 76 500 1000 1500 2000 2500 3000 MILLIONS USD

... but it’s still nothing compared to the ‘80s revenue 1973 - 2015

Source: US-based data compiled by the Recording Industry Association of America
slide-77
SLIDE 77

There are three kinds of lies: lies, big lies, and statistics graphs.

  • Benjamin Disraeli could have said this
slide-78
SLIDE 78

http://www.labnol.org/software/find-right-chart-type-for-your-data/6523/

slide-79
SLIDE 79

Who or Which? Where? When? What? How or Why? How much?

slide-80
SLIDE 80

Business processes

slide-81
SLIDE 81

ArchiMate example

http://www.archimate.nl/en/about_archimate/example.html

slide-82
SLIDE 82

Flow of information through business

slide-83
SLIDE 83

Radar plots

Ma Mark rket Bu Business IT IT Te Technology

slide-84
SLIDE 84

Application si size Impo Importanc nce

  • f application

Qua Quality of application

I M I M P P R R O O V V E E P H P H A A S S E E O O U U T T M A M A I I N N T T A A I I N N ACCE CEPT

Application portfolio visualizations

https://portfolioviz.com

slide-85
SLIDE 85

https://github.com/grafana/grafana

slide-86
SLIDE 86

https://d3js.org/

slide-87
SLIDE 87
slide-88
SLIDE 88

Jupyter notebooks & Observable

http://jupyter.org/ https://beta.observablehq.com/

slide-89
SLIDE 89

Sit Sites

  • https://informationisbeautiful.net/
  • http://flowingdata.com/
  • http://www.visualisingdata.com/

Bo Books

  • http://www.visualisingdata.com/book/
  • https://www.edwardtufte.com/tufte/books_vdqi
  • http://book.flowingdata.com/

To Tools

  • https://d3js.org/
  • https://rawgraphs.io/
  • https://www.tableau.com/

Some inspiration for data- based visualizations

slide-90
SLIDE 90

Protip: be ho

hone nest, cl clear, in intelligib elligible le and act ctionable

(and look for a high data-ink ratio)

@jschulenklopper

slide-91
SLIDE 91

https://www.nytimes.com/interactive/2016/12/21/upshot/Mapping-the-Shadows-of-New-York-City.html

slide-92
SLIDE 92

The universe is made of stories, not of atoms

  • Muriel Rukeyser
slide-93
SLIDE 93

Pu Public-ke key cr cryptography, also called asymmetric c cr cryptography, is a communication where people exchange messages that can only be read by one another. In public key cryptography, each user has a pair of cryptographic keys:

  • a public key
  • a private key

The private key is kept secret, while the public key may be widely distributed and used by other users. Incoming messages are encrypted with the recipient's public key and can only be decrypted with their corresponding private key. The keys are related mathematically, but the user's private key cannot be easily got from the widely used public key. The most usual problem with this method arises when private key is accidentally leaked. The two main branches of public key cryptography are:

  • Public

c key encr cryption: a message encrypted with a recipient's public key cannot be decrypted except by the recipient private key. This is used to ensure secrecy.

  • Di

Digital s signatures: a message signed with a sender's private key can be verified by anyone who has the sender's public key. So if the sender signed the message no one can alter it. This is used to get authenticity.

slide-94
SLIDE 94
slide-95
SLIDE 95

Business processes in landscape

slide-96
SLIDE 96

Evolution of an application or landscape

tyesteryear ttomorrow

ttoday

slide-97
SLIDE 97

Protip: “Once

ce upon a time...”

(Take a minute more, and imagine a story)

@jschulenklopper

slide-98
SLIDE 98

http://rohdesign.com/

slide-99
SLIDE 99

Quicker, more versatile than other drawing tools

https://www.jetpens.com/blog/sketchnotes-a-guide-to-visual-note-taking/pt/892

slide-100
SLIDE 100

Low-fidelity >> high-fidelity

https://www.lifeofanarchitect.com/architectural-sketches-002-the-series/

slide-101
SLIDE 101

Creates and shows a story at the same time

slide-102
SLIDE 102

Protip: sketch

ch, doodle, draw

and scribble mo

more a and mo nd more

(And hold back from PowerPoint, Visio, Illustrator, OmniGraffle, ...)

@jschulenklopper

slide-103
SLIDE 103

So So, do , don’t n’t m make t the hem g gue uess

I’d love to see us all us all make better architecture visualizations

Jochem Schulenklopper, Xebia @jschulenklopper