- Application structure
- Modularity u
- Components u
- Directories u
- GRASP u
- SOLID e
- GoF patterns u
- CQS u
- Leaking abstractions k
- Multiparadigm code u
- Contract programming u
- Platform-agnostic u
- Transport-agnostic k
- Framework-agnostic u
- Code coverage u
- Cohesion u
- Coupling k
- Cyclomatic complexity h
- Reliability u
- Quality u
- Availability u
- Flexibility u
- Law of Demeter (LoD) u
- Application architecture
- Isolation between layer u
- Domain-specific language (DSL) u
- System vs applied code u
- Multilayer approach u
- Hexagonal architecture k
- Separation of concerns (SoC) u
- Metaprogramming e
- Inversion of control (IoC) e
- Dependency injection (DI) e
- Clean architecture u
- Domain-driven design (DDD) u
- Pub/sub u
- Message brocker u
- Agent u
- Service locator u
- Message Queue (MQ) u
- CQRS u
- Event sourcing u
- E-R data modeling h
- Entity-relationship diagram u
- IDEF1X
- UML u
- Work breakdown structure
- Budget estimation h
- Distributed systems u
- High-intensive computing k
- Load balancing u
- Gateways u
- On-premises k
- IaaS u
- PaaS u
- SaaS u
- FaaS clouds u
- Serverless u
- Vendor lock-in u
- Bus factor
- Solution architecture
- A software requirements specification (SRS) h
- Solution visions h
- Solution capabilities h
- System design h
- Process modelling h
- Data modelling u
- Solution components k
- Risk assessment h
- Non Functional Requirements (NFR) h
- Clouds u
- BPMN h
- Low-code u
- No-code u
- Metric u
- Metric abuse
- ACID u
- CAP theorem
- Single source of truth (SSOT) u
- Enterprise architecture
- Understanding business needs u
- Enterprise strategy u
- Integration with subsystems
- Enterprise vision k
- Enterprise capabilities k
- Project scope k
- Enterprise service bus
- Service-oriented architecture k
- Microservices u
- Process choreography h
- Service orchestration k
- Data warehouse k
- Business Intelligence
- OLAP
- OLTP
- Conways Law u
- Quality assurance u
- Engineering Hygiene