SlideShare a Scribd company logo
1 of 15
Download to read offline
kresimir.barbarosa@saliunca.com
+386 51 209 194
DO	NOT	LET	IT	CONTROL	YOU
TREATransparent Enterprise Architecture
Information technology solutions
are not merely black boxes frozen
in space and time but belong to an
ever-expansive and increasingly
interconnected environment, with
systems working in unison for
delivery of business services
wherever and whenever they are
needed. Their scope and
complexity grows in time and this
occurs on several levels: system,
software, hardware, and network;
each one of them undergo
changes that influence the entire
environment. Efficiently managing
and leveraging such an
environment at all times becomes
a great challenge, one that takes
up much of IT personnel
timesheet.
• system
• software
• hardware
• network
Manegement frameworki
Complexity occurs on several levels
Introduction
DO	NOT	LET	IT	CONTROL	YOU
• Which technologies from different vendors
are in use by our solutions?
• How many applications are in use and how
do they interface with each other and
users?
• Which systems are hosted where? Are they
physical or virtual?
• Are we taking advantage of our resources
optimally? Are there any bottlenecks?
• Is there unnecessary duplication of
functions?
• Who is administering particular systems
and how?
Management platformi
The absence of a complete picture
arises many questions:
Occupied by numerous tasks, IT staff
is unable to fully serve the business
user with fresh, innovative approaches
that drive the company’s further
development. This puts considerable
pressure on IT both internal and
external, which results in inefficient
use of resources and delays in
achieving business goals. Superfluous
tasks like manual management of
systems grow increasingly harder for
they are prone to human error,
perhaps even dependent on key
individuals involved and their obscure
knowledge of the environment. The
absence of a complete picture of the
situation across the environment
hampers overall agility as numerous
questions arise.
The problem
DO	NOT	LET	IT	CONTROL	YOU
• Are our systems up-to-date and
protected against known threats?
• Are our systems’ current
deployments documented and still
supported by the vendor?
• Is our licensing current, the capacity
compliant and aligned with business
needs?
• Where in their lifecycles are our
systems at this time, are support and
spare parts still available?
Management platformi
Non-technical benefits:
There are several levels of integration among
systems that have long ceased being
isolated siloes and as such depend on each
other in delivery of business services. In case
any of them become compromised, so do
the solutions built on top of them.
Furthermore, every solution has a lifecycle of
its own that necessitates keeping proper
documentation so planning, maintenance
and management can all be tackled at an
appropriate time. Architectural model of the
environment is not intended to replace
systems’ documentation that contains key
data on a particular system, but to tie them
all together on a larger scale, and describe
their place within the environment. Besides
technical benefits it also provides much
insight into software licensing, deployed
components and their compliance,
communication security and the ability to
discover opportunities for infrastructure
optimisation.
The ecosystem
DO	NOT	LET	IT	CONTROL	YOU
• Do we have reliable backups of our
data?
• Are our systems safe and secure, are
there any potential weak points?
• Where are potential single points of
failure and how do they affect key
systems availability?
Management platformi
Data protection issues:
Mission-critical systems’ availability
is always limited by their weakest
link, which in case of deep
integrations can be any one in a
host of components. Review,
identification and remediation of
potential issues ensures appropriate
actions can be taken before a
possible crisis may occur. Knowing
answers to data protection issues
such as those outlined on the right
can be a crucial difference between
having a resilient or a vulnerable
environment in time of need.
Business continuity
DO	NOT	LET	IT	CONTROL	YOU
By utilizing a single all-encompassing
architectural model of the
environment, the company is able to
regain control over the entirety of
included IT assets wherever they are
and however they happen to be
delivered, whereas the possible level
of detail inclusion is virtually unlimited
and open to growth in time. A unified
model of the entire environment
provides a visual, segmented situation
on four different levels.
• Technology (infrastructure and
systems)
• Application (components and
interfaces)
• Business (processes and roles)
• Relational (relationships among
artifacts)
Management platformi
4 levels of unified model of the
entire environment:
The solution
DO	NOT	LET	IT	CONTROL	YOU
Having awareness of the current
situation throughout the
environment establishes a
baseline starting point from which
the company is able to align IT
assets with business requirements
in a strategic manner. On this basis
the whole organization becomes
nimbler and capable of focusing
on further development instead of
crisis management, which
ultimately leads down the path of
gaining a real competitive edge
over others.
1.MODEL
2.OPTIMIZE
3.GROW
Management platform
The roadmap to this solution
lies in the following three
steps below:
i
DO	NOT	LET	IT	CONTROL	YOU
Modeling the environment is the first
step which involves information
gathering on the entire infrastructure
inventory starting with hardware,
networking and zones, software
systems and their components,
applications and their interfaces, and
various user types. All of these represent
inputs for appropriate Archimate®
standard artifacts that form relationships
tying them all together, accompanied by
important metadata such as software
maintenance levels, system
administrators, network addresses,
dates, makes and models etc. This
process involves assets in both on-
premise and cloud infrastructures.
Complete architectural
model representing the
entirety of the organization's
IT assets, allowing for a
thorough understanding of
the environment and
providing answers to the
questions outlined above.
Management platformi
End result of this step:
STEP 1: MODEL
DO	NOT	LET	IT	CONTROL	YOU
The second step is to leverage the model in order
to discover relevant interdependencies between
particular artifacts, which can be displayed
visually up to eight layers deep. All integration
points between systems can thus be evaluated
for bottlenecks, security issues, possible role
duplication and whether mission-critical systems
are in fact highly available on all required levels
throughout their stacks. The model also provides
insight into actual deployment of systems aiding
in evaluation of their licensing, lifecycle and
requirements compliance. It has become
increasingly difficult for larger environments to
keep track of all their assets, and efficiently scale
them alongside changing business needs,
however using the architectural model it becomes
possible to do so from a single point, regardless if
the assets in question are on-premise systems,
SaaS or any other subscription models.
Keep track of all
environment’s assets
and efficiently scale
them alongside
changing business
needs - however using
the architectural model
it becomes possible to
do so from a single
point.
Management platformi
End result of this step:
STEP 2: OPTIMIZE
DO	NOT	LET	IT	CONTROL	YOU
With current systems hardened and
optimized, the organization can leverage the
architectural model in subsequent
implementations, modernizations and
migrations in the future. Once the model has
been established, inputting regular updates
becomes easy and transparent. An additional
benefit alongside the completely mapping of
environment is the fact that the model itself
supports further inclusion of business
processes, associated business artifacts,
actors’ motivations, interactions, and a host
of other object types, thereby offering an
additional level of insight into relationships
and interdependencies on an even higher
level that ultimately allows for the
optimization of business processes
themselves.
Scalability and
transparency of
architectural model in
subsequent
implementations,
modernisations and
migrations.
Management platformi
End result of this step:
STEP 3: GROW
DO	NOT	LET	IT	CONTROL	YOU
i
EXAMPLE
DO	NOT	LET	IT	CONTROL	YOU
Picture 1: A sample of the
complete model view which
includes (from bottom up):
networks, physical devices,
database and configuration
repositories, system
software components,
nodes, applications,
application interfaces, users,
and their relationships.
DO	NOT	LET	IT	CONTROL	YOU
Picture 2: A sample of various pieces of metadata belonging to an artifact, in this case
a UPS device; demonstration values include: make and model, date of
implementation, network address, serial number, and full name of the system
administrator
DO	NOT	LET	IT	CONTROL	YOU
Picture 3: A sample of visual representation of dependencies based on a randomly selected
artifact, in this case the view is shown four levels deep; such views provide visual discovery of
interdependence between integrated systems, infrastructure and users.
DO	NOT	LET	IT	CONTROL	YOU
Picture 4: A sample of an export of the model with its complete set of data accessible using a web
browser; such exports are to be generated each time a change is made.
DO	NOT	LET	IT	CONTROL	YOU

More Related Content

What's hot

Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9Ian Sommerville
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Info-Tech Research Group
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computingguestc1bca2
 
Management Information System - Building Systems
Management Information System - Building SystemsManagement Information System - Building Systems
Management Information System - Building SystemsAyush Man Tamrakar
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User ComputingJames Charter
 
End User Computing (EUC)
End User Computing (EUC)End User Computing (EUC)
End User Computing (EUC)Jashisha Gupta
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Luis Felipe Tabares Pérez
 
Software architecture Unit 1 notes
Software architecture Unit 1 notesSoftware architecture Unit 1 notes
Software architecture Unit 1 notesSudarshan Dhondaley
 
Improving BPM Time To Value
Improving BPM Time To ValueImproving BPM Time To Value
Improving BPM Time To ValueSandy Kemsley
 
Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization  Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization Ivano Malavolta
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin TexasJoeFaghani
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D cscpconf
 

What's hot (20)

Building an Information System
Building an Information SystemBuilding an Information System
Building an Information System
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
Iannicello "Planning: Engaging with Management and IT"
Iannicello "Planning: Engaging with Management and IT"Iannicello "Planning: Engaging with Management and IT"
Iannicello "Planning: Engaging with Management and IT"
 
Management Information System - Building Systems
Management Information System - Building SystemsManagement Information System - Building Systems
Management Information System - Building Systems
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User Computing
 
End User Computing (EUC)
End User Computing (EUC)End User Computing (EUC)
End User Computing (EUC)
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
context-sdm-brochure
context-sdm-brochurecontext-sdm-brochure
context-sdm-brochure
 
03 basic concepts
03 basic concepts03 basic concepts
03 basic concepts
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
 
Software architecture Unit 1 notes
Software architecture Unit 1 notesSoftware architecture Unit 1 notes
Software architecture Unit 1 notes
 
Improving BPM Time To Value
Improving BPM Time To ValueImproving BPM Time To Value
Improving BPM Time To Value
 
Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization  Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization
 
System Engineering Unit-1
System Engineering Unit-1System Engineering Unit-1
System Engineering Unit-1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
 

Similar to TREA - transparent enterprise architecture

Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native ComputingSaju Thomas
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArmen Arzumanyan
 
Sr_Dev_Ops_Engineer
Sr_Dev_Ops_EngineerSr_Dev_Ops_Engineer
Sr_Dev_Ops_EngineerErik McCarty
 
Virtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White PaperVirtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White PaperJohn McDonald
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design IntroductionUsman Khan
 
Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471vconovalov
 
The Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System DeploymentThe Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System DeploymentGlen Alleman
 
DevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdfDevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdfsmithlindsay766
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftKesavan Munuswamy
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for SecurityTripwire
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written reportLuis Perez
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET Journal
 

Similar to TREA - transparent enterprise architecture (20)

Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native Computing
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems Design
 
chapters
chapterschapters
chapters
 
Sr_Dev_Ops_Engineer
Sr_Dev_Ops_EngineerSr_Dev_Ops_Engineer
Sr_Dev_Ops_Engineer
 
Virtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White PaperVirtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White Paper
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design Introduction
 
Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471
 
Governance in the age of cloud
Governance in the age of cloudGovernance in the age of cloud
Governance in the age of cloud
 
The Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System DeploymentThe Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System Deployment
 
DevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdfDevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdf
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from Microsoft
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written report
 
Using Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems DevelopmentUsing Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems Development
 
Systema analysis
Systema analysisSystema analysis
Systema analysis
 
AtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White PapaerAtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White Papaer
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
 
81-T48
81-T4881-T48
81-T48
 
INTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptxINTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptx
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

TREA - transparent enterprise architecture

  • 1. kresimir.barbarosa@saliunca.com +386 51 209 194 DO NOT LET IT CONTROL YOU TREATransparent Enterprise Architecture
  • 2. Information technology solutions are not merely black boxes frozen in space and time but belong to an ever-expansive and increasingly interconnected environment, with systems working in unison for delivery of business services wherever and whenever they are needed. Their scope and complexity grows in time and this occurs on several levels: system, software, hardware, and network; each one of them undergo changes that influence the entire environment. Efficiently managing and leveraging such an environment at all times becomes a great challenge, one that takes up much of IT personnel timesheet. • system • software • hardware • network Manegement frameworki Complexity occurs on several levels Introduction DO NOT LET IT CONTROL YOU
  • 3. • Which technologies from different vendors are in use by our solutions? • How many applications are in use and how do they interface with each other and users? • Which systems are hosted where? Are they physical or virtual? • Are we taking advantage of our resources optimally? Are there any bottlenecks? • Is there unnecessary duplication of functions? • Who is administering particular systems and how? Management platformi The absence of a complete picture arises many questions: Occupied by numerous tasks, IT staff is unable to fully serve the business user with fresh, innovative approaches that drive the company’s further development. This puts considerable pressure on IT both internal and external, which results in inefficient use of resources and delays in achieving business goals. Superfluous tasks like manual management of systems grow increasingly harder for they are prone to human error, perhaps even dependent on key individuals involved and their obscure knowledge of the environment. The absence of a complete picture of the situation across the environment hampers overall agility as numerous questions arise. The problem DO NOT LET IT CONTROL YOU
  • 4. • Are our systems up-to-date and protected against known threats? • Are our systems’ current deployments documented and still supported by the vendor? • Is our licensing current, the capacity compliant and aligned with business needs? • Where in their lifecycles are our systems at this time, are support and spare parts still available? Management platformi Non-technical benefits: There are several levels of integration among systems that have long ceased being isolated siloes and as such depend on each other in delivery of business services. In case any of them become compromised, so do the solutions built on top of them. Furthermore, every solution has a lifecycle of its own that necessitates keeping proper documentation so planning, maintenance and management can all be tackled at an appropriate time. Architectural model of the environment is not intended to replace systems’ documentation that contains key data on a particular system, but to tie them all together on a larger scale, and describe their place within the environment. Besides technical benefits it also provides much insight into software licensing, deployed components and their compliance, communication security and the ability to discover opportunities for infrastructure optimisation. The ecosystem DO NOT LET IT CONTROL YOU
  • 5. • Do we have reliable backups of our data? • Are our systems safe and secure, are there any potential weak points? • Where are potential single points of failure and how do they affect key systems availability? Management platformi Data protection issues: Mission-critical systems’ availability is always limited by their weakest link, which in case of deep integrations can be any one in a host of components. Review, identification and remediation of potential issues ensures appropriate actions can be taken before a possible crisis may occur. Knowing answers to data protection issues such as those outlined on the right can be a crucial difference between having a resilient or a vulnerable environment in time of need. Business continuity DO NOT LET IT CONTROL YOU
  • 6. By utilizing a single all-encompassing architectural model of the environment, the company is able to regain control over the entirety of included IT assets wherever they are and however they happen to be delivered, whereas the possible level of detail inclusion is virtually unlimited and open to growth in time. A unified model of the entire environment provides a visual, segmented situation on four different levels. • Technology (infrastructure and systems) • Application (components and interfaces) • Business (processes and roles) • Relational (relationships among artifacts) Management platformi 4 levels of unified model of the entire environment: The solution DO NOT LET IT CONTROL YOU
  • 7. Having awareness of the current situation throughout the environment establishes a baseline starting point from which the company is able to align IT assets with business requirements in a strategic manner. On this basis the whole organization becomes nimbler and capable of focusing on further development instead of crisis management, which ultimately leads down the path of gaining a real competitive edge over others. 1.MODEL 2.OPTIMIZE 3.GROW Management platform The roadmap to this solution lies in the following three steps below: i DO NOT LET IT CONTROL YOU
  • 8. Modeling the environment is the first step which involves information gathering on the entire infrastructure inventory starting with hardware, networking and zones, software systems and their components, applications and their interfaces, and various user types. All of these represent inputs for appropriate Archimate® standard artifacts that form relationships tying them all together, accompanied by important metadata such as software maintenance levels, system administrators, network addresses, dates, makes and models etc. This process involves assets in both on- premise and cloud infrastructures. Complete architectural model representing the entirety of the organization's IT assets, allowing for a thorough understanding of the environment and providing answers to the questions outlined above. Management platformi End result of this step: STEP 1: MODEL DO NOT LET IT CONTROL YOU
  • 9. The second step is to leverage the model in order to discover relevant interdependencies between particular artifacts, which can be displayed visually up to eight layers deep. All integration points between systems can thus be evaluated for bottlenecks, security issues, possible role duplication and whether mission-critical systems are in fact highly available on all required levels throughout their stacks. The model also provides insight into actual deployment of systems aiding in evaluation of their licensing, lifecycle and requirements compliance. It has become increasingly difficult for larger environments to keep track of all their assets, and efficiently scale them alongside changing business needs, however using the architectural model it becomes possible to do so from a single point, regardless if the assets in question are on-premise systems, SaaS or any other subscription models. Keep track of all environment’s assets and efficiently scale them alongside changing business needs - however using the architectural model it becomes possible to do so from a single point. Management platformi End result of this step: STEP 2: OPTIMIZE DO NOT LET IT CONTROL YOU
  • 10. With current systems hardened and optimized, the organization can leverage the architectural model in subsequent implementations, modernizations and migrations in the future. Once the model has been established, inputting regular updates becomes easy and transparent. An additional benefit alongside the completely mapping of environment is the fact that the model itself supports further inclusion of business processes, associated business artifacts, actors’ motivations, interactions, and a host of other object types, thereby offering an additional level of insight into relationships and interdependencies on an even higher level that ultimately allows for the optimization of business processes themselves. Scalability and transparency of architectural model in subsequent implementations, modernisations and migrations. Management platformi End result of this step: STEP 3: GROW DO NOT LET IT CONTROL YOU
  • 12. Picture 1: A sample of the complete model view which includes (from bottom up): networks, physical devices, database and configuration repositories, system software components, nodes, applications, application interfaces, users, and their relationships. DO NOT LET IT CONTROL YOU
  • 13. Picture 2: A sample of various pieces of metadata belonging to an artifact, in this case a UPS device; demonstration values include: make and model, date of implementation, network address, serial number, and full name of the system administrator DO NOT LET IT CONTROL YOU
  • 14. Picture 3: A sample of visual representation of dependencies based on a randomly selected artifact, in this case the view is shown four levels deep; such views provide visual discovery of interdependence between integrated systems, infrastructure and users. DO NOT LET IT CONTROL YOU
  • 15. Picture 4: A sample of an export of the model with its complete set of data accessible using a web browser; such exports are to be generated each time a change is made. DO NOT LET IT CONTROL YOU