SlideShare a Scribd company logo
ENTERPRISE ARCHITECTURE 3.0
DAVID SPROTT
“. . our institutions need to radically decentralize . . . the future is not to be predicted, but to be achieved
through a new dynamic paradigm including self-organizing, emergent and sometimes resilient networks
involving millions of stakeholders. Command and control being replaced with self-organizing networks.
Linear and non-linear organizations.” Don Tapscott at the Drucker Forum, November 2013 ©Everware-CBDI Inc
CHANNEL OR
EXPERIENCE

PRODUCT
LINE, DOMAIN,
ECOSYSTEM OR
FAMILY

PARTICIPANT

BUSINESS SERVICE
(API / SOLUTION)

NETWORK
OUTCOME

PROCESS

CAPABILITY

SOFTWARE
SERVICE

RECORD

LINK

RESOURCE

INFORMATION TYPE

THE ENTERPRISE AS A NETWORK
©Everware-CBDI Inc
SCOPE: Defined set of Capabilities
ROADMAP

BUSINESS SERIVCE / API /SOLUTION

PRODUCT
LINE

FAMILY

CLUSTER

PATTERNS

POLICY

COMMON ASSET ARCHITECTURE
...

PLATFORM ARCHITECTURE
REFERENCE ARCHITECTURE
BUSINESS

SERVICE AND
APPLICATION

IMPLEMENTATION

TECHNOLOGY

DEPLOYMENT

GOVERNANCE

FEDERATED ENTERPRISE ARCHITECTURE MODEL

©Everware-CBDI Inc
To-Be Model

As-Is Model
Minimum necessary EA Framework defines structure
for federated architecture

EA Framework

Domain
Domain

Capabilities

Capabilities

Domain

Solution Architectures

Domain

Capabilities

Solution Architectures
The aim is frequently to seek the highest level of
commonality and focus on scalable and re-usable
modules in order to maximize re-use at the
enterprise level.

Capabilities
The aim is always to organize the business as
independent capabilities which provide services to the
enterprise and the networks it engages with.

ENTERPRISE ARCHITECTURE IN TRANSITION

©Everware-CBDI Inc
Ea 3.0

More Related Content

Viewers also liked

Schrenk ed ready x li 2014
Schrenk ed ready x li 2014Schrenk ed ready x li 2014
Schrenk ed ready x li 2014Ryan Schrenk
 
Motos i parkour
Motos i parkourMotos i parkour
Motos i parkour
josep miquel
 
То, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIAN
То, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIANТо, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIAN
То, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIAN
Abdullah Baspren
 
Sitios de intermediarios más representativos del Web
Sitios de intermediarios más representativos del WebSitios de intermediarios más representativos del Web
Sitios de intermediarios más representativos del Webmijacaza
 
I Houghton Post2015 Paper V200812
I Houghton Post2015 Paper V200812I Houghton Post2015 Paper V200812
I Houghton Post2015 Paper V200812
irunguh
 
Kim Kardashian Fleet Media
Kim Kardashian Fleet MediaKim Kardashian Fleet Media
Kim Kardashian Fleet Media
JeffMoore
 
Fundamental issues of Enterprise Systems
Fundamental issues of Enterprise SystemsFundamental issues of Enterprise Systems
Fundamental issues of Enterprise Systems
Johan Magnusson
 
رسالة الى الباحثين عن الحقيقة
رسالة الى الباحثين عن الحقيقةرسالة الى الباحثين عن الحقيقة
رسالة الى الباحثين عن الحقيقة
Abdullah Baspren
 
Grata
GrataGrata
Arituculo La Era Del Jefe Humilde
Arituculo La Era Del Jefe HumildeArituculo La Era Del Jefe Humilde
Arituculo La Era Del Jefe HumildeBeatriz Adriana
 
This Is Muhammad _Russian
This  Is  Muhammad _RussianThis  Is  Muhammad _Russian
This Is Muhammad _Russian
Abdullah Baspren
 
Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti Al...
Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti  Al...Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti  Al...
Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti Al...Abdullah Baspren
 
Franklin Teacher Blog
Franklin Teacher BlogFranklin Teacher Blog
Franklin Teacher Blogguestb72938
 
El arte de la guerra aplicado a la administracion (guerra de flanqueos)
El arte de la guerra aplicado a la administracion (guerra de flanqueos)El arte de la guerra aplicado a la administracion (guerra de flanqueos)
El arte de la guerra aplicado a la administracion (guerra de flanqueos)
Tonnyo Rodriguez Castillo
 
ما يفعله الشيعة في عاشوراء بدعة وضلالة
ما يفعله الشيعة في عاشوراء بدعة وضلالةما يفعله الشيعة في عاشوراء بدعة وضلالة
ما يفعله الشيعة في عاشوراء بدعة وضلالة
Abdullah Baspren
 
Protecting civic space in Kenya IHoughton SMuchai March 2014
Protecting civic space in Kenya IHoughton SMuchai March 2014Protecting civic space in Kenya IHoughton SMuchai March 2014
Protecting civic space in Kenya IHoughton SMuchai March 2014
irunguh
 
When Training Smells
When Training SmellsWhen Training Smells
When Training Smells
pquinn1
 
PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...
PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...
PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...
Laurence Massem
 
Slides Weber2
Slides Weber2Slides Weber2
Slides Weber2
Weber_work
 
Pedoman Ringkas Bergambar Untuk Memahami Islam_ Indonesia
Pedoman Ringkas Bergambar Untuk Memahami Islam_ IndonesiaPedoman Ringkas Bergambar Untuk Memahami Islam_ Indonesia
Pedoman Ringkas Bergambar Untuk Memahami Islam_ Indonesia
Abdullah Baspren
 

Viewers also liked (20)

Schrenk ed ready x li 2014
Schrenk ed ready x li 2014Schrenk ed ready x li 2014
Schrenk ed ready x li 2014
 
Motos i parkour
Motos i parkourMotos i parkour
Motos i parkour
 
То, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIAN
То, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIANТо, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIAN
То, что делают шииты в День ‘Ашура – это нововведение и заблуждение _ RUSSIAN
 
Sitios de intermediarios más representativos del Web
Sitios de intermediarios más representativos del WebSitios de intermediarios más representativos del Web
Sitios de intermediarios más representativos del Web
 
I Houghton Post2015 Paper V200812
I Houghton Post2015 Paper V200812I Houghton Post2015 Paper V200812
I Houghton Post2015 Paper V200812
 
Kim Kardashian Fleet Media
Kim Kardashian Fleet MediaKim Kardashian Fleet Media
Kim Kardashian Fleet Media
 
Fundamental issues of Enterprise Systems
Fundamental issues of Enterprise SystemsFundamental issues of Enterprise Systems
Fundamental issues of Enterprise Systems
 
رسالة الى الباحثين عن الحقيقة
رسالة الى الباحثين عن الحقيقةرسالة الى الباحثين عن الحقيقة
رسالة الى الباحثين عن الحقيقة
 
Grata
GrataGrata
Grata
 
Arituculo La Era Del Jefe Humilde
Arituculo La Era Del Jefe HumildeArituculo La Era Del Jefe Humilde
Arituculo La Era Del Jefe Humilde
 
This Is Muhammad _Russian
This  Is  Muhammad _RussianThis  Is  Muhammad _Russian
This Is Muhammad _Russian
 
Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti Al...
Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti  Al...Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti  Al...
Gratë Në Islam Kundrejt Grave Në TraditëN Judeo Kristianemiti & Realiteti Al...
 
Franklin Teacher Blog
Franklin Teacher BlogFranklin Teacher Blog
Franklin Teacher Blog
 
El arte de la guerra aplicado a la administracion (guerra de flanqueos)
El arte de la guerra aplicado a la administracion (guerra de flanqueos)El arte de la guerra aplicado a la administracion (guerra de flanqueos)
El arte de la guerra aplicado a la administracion (guerra de flanqueos)
 
ما يفعله الشيعة في عاشوراء بدعة وضلالة
ما يفعله الشيعة في عاشوراء بدعة وضلالةما يفعله الشيعة في عاشوراء بدعة وضلالة
ما يفعله الشيعة في عاشوراء بدعة وضلالة
 
Protecting civic space in Kenya IHoughton SMuchai March 2014
Protecting civic space in Kenya IHoughton SMuchai March 2014Protecting civic space in Kenya IHoughton SMuchai March 2014
Protecting civic space in Kenya IHoughton SMuchai March 2014
 
When Training Smells
When Training SmellsWhen Training Smells
When Training Smells
 
PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...
PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...
PMI® - a Daily Revenue and Productivity Management Solution for Hotel and Res...
 
Slides Weber2
Slides Weber2Slides Weber2
Slides Weber2
 
Pedoman Ringkas Bergambar Untuk Memahami Islam_ Indonesia
Pedoman Ringkas Bergambar Untuk Memahami Islam_ IndonesiaPedoman Ringkas Bergambar Untuk Memahami Islam_ Indonesia
Pedoman Ringkas Bergambar Untuk Memahami Islam_ Indonesia
 

Similar to Ea 3.0

Cloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessCloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessDavid Linthicum
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Mark Skilton
 
Cloud Computing
Cloud ComputingCloud Computing
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
IRJET Journal
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computingck4eric
 
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
Novosco
 
Introduction au Cloud computing
Introduction au Cloud computingIntroduction au Cloud computing
Introduction au Cloud computing
Prof. Jacques Folon (Ph.D)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ajit Yadav
 
Whitepaper the application network
Whitepaper   the application networkWhitepaper   the application network
Whitepaper the application network
BeatEggli
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
Mark Hinkle
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
Sonovate
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
SHAIMA A R
 
EDHEC Keynote Digital Oct 14 2017
EDHEC Keynote Digital Oct 14 2017EDHEC Keynote Digital Oct 14 2017
EDHEC Keynote Digital Oct 14 2017
Greger Ottosson
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CloudIDSummit
 
Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!Debasish Patra
 
ABC's of Cloud Computing for Middle Market Enterprises
ABC's of Cloud Computing for Middle Market EnterprisesABC's of Cloud Computing for Middle Market Enterprises
ABC's of Cloud Computing for Middle Market Enterprises
RUBENSTEIN / JUSTMAN MANAGEMENT CONSULTANTS (RJMC)
 
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
Amazon Web Services
 

Similar to Ea 3.0 (20)

Cloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessCloud Computing Impact On Small Business
Cloud Computing Impact On Small Business
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computing
 
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
 
Introduction au Cloud computing
Introduction au Cloud computingIntroduction au Cloud computing
Introduction au Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Whitepaper the application network
Whitepaper   the application networkWhitepaper   the application network
Whitepaper the application network
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Sap cloud ecosystem
Sap cloud ecosystemSap cloud ecosystem
Sap cloud ecosystem
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
EDHEC Keynote Digital Oct 14 2017
EDHEC Keynote Digital Oct 14 2017EDHEC Keynote Digital Oct 14 2017
EDHEC Keynote Digital Oct 14 2017
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
 
Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!
 
ABC's of Cloud Computing for Middle Market Enterprises
ABC's of Cloud Computing for Middle Market EnterprisesABC's of Cloud Computing for Middle Market Enterprises
ABC's of Cloud Computing for Middle Market Enterprises
 
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
 

More from David Sprott

Enterprise Agile - The Undiscovered Country
Enterprise Agile - The Undiscovered CountryEnterprise Agile - The Undiscovered Country
Enterprise Agile - The Undiscovered Country
David Sprott
 
Agile business modeling meta model
Agile business modeling meta modelAgile business modeling meta model
Agile business modeling meta modelDavid Sprott
 
Agile business modeling meta model
Agile business modeling meta modelAgile business modeling meta model
Agile business modeling meta modelDavid Sprott
 
Everware cbdi-mm l1
Everware cbdi-mm l1Everware cbdi-mm l1
Everware cbdi-mm l1
David Sprott
 
Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1
David Sprott
 
SOA and M&A
SOA and M&ASOA and M&A
SOA and M&A
David Sprott
 

More from David Sprott (6)

Enterprise Agile - The Undiscovered Country
Enterprise Agile - The Undiscovered CountryEnterprise Agile - The Undiscovered Country
Enterprise Agile - The Undiscovered Country
 
Agile business modeling meta model
Agile business modeling meta modelAgile business modeling meta model
Agile business modeling meta model
 
Agile business modeling meta model
Agile business modeling meta modelAgile business modeling meta model
Agile business modeling meta model
 
Everware cbdi-mm l1
Everware cbdi-mm l1Everware cbdi-mm l1
Everware cbdi-mm l1
 
Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1
 
SOA and M&A
SOA and M&ASOA and M&A
SOA and M&A
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Ea 3.0

  • 2. “. . our institutions need to radically decentralize . . . the future is not to be predicted, but to be achieved through a new dynamic paradigm including self-organizing, emergent and sometimes resilient networks involving millions of stakeholders. Command and control being replaced with self-organizing networks. Linear and non-linear organizations.” Don Tapscott at the Drucker Forum, November 2013 ©Everware-CBDI Inc
  • 3. CHANNEL OR EXPERIENCE PRODUCT LINE, DOMAIN, ECOSYSTEM OR FAMILY PARTICIPANT BUSINESS SERVICE (API / SOLUTION) NETWORK OUTCOME PROCESS CAPABILITY SOFTWARE SERVICE RECORD LINK RESOURCE INFORMATION TYPE THE ENTERPRISE AS A NETWORK ©Everware-CBDI Inc
  • 4. SCOPE: Defined set of Capabilities ROADMAP BUSINESS SERIVCE / API /SOLUTION PRODUCT LINE FAMILY CLUSTER PATTERNS POLICY COMMON ASSET ARCHITECTURE ... PLATFORM ARCHITECTURE REFERENCE ARCHITECTURE BUSINESS SERVICE AND APPLICATION IMPLEMENTATION TECHNOLOGY DEPLOYMENT GOVERNANCE FEDERATED ENTERPRISE ARCHITECTURE MODEL ©Everware-CBDI Inc
  • 5. To-Be Model As-Is Model Minimum necessary EA Framework defines structure for federated architecture EA Framework Domain Domain Capabilities Capabilities Domain Solution Architectures Domain Capabilities Solution Architectures The aim is frequently to seek the highest level of commonality and focus on scalable and re-usable modules in order to maximize re-use at the enterprise level. Capabilities The aim is always to organize the business as independent capabilities which provide services to the enterprise and the networks it engages with. ENTERPRISE ARCHITECTURE IN TRANSITION ©Everware-CBDI Inc