SlideShare a Scribd company logo
Building Enterprise Architecture
Benefits of Enterprise Architecture
• Finance – Better understanding of investment
decisions, cost allocations.
• Stakeholders – May change their view of risk.
• Product Development – Improved agility.
• Business and IT Relations – Removes the chasm.
• IT Planning – Improved understanding of options,
trade-offs.
• Partners, Suppliers, Vendors – Understanding of
vision and processes.
Planning an Enterprise Architecture
Steps to be Undertaken
• GOAL: Formulate and Realise the Technical Blueprint
– Agree architecture strategy in context of business & technical drivers
– Baseline business & technical requirements that influence blueprint
– Establish the conceptual, logical and physical frameworks
– Align Enterprise Information Model to Business requirements
– Establish a roadmap to show evolution strategy to required state
– Prioritise candidate architectural components based on estimated ROI
– Develop plans for developing and deploying technical capabilities
– Initiate “proof of concept” projects to prove capability challenges
– Assure realisation through Production Acceptance process
• i.e. ARB, Design Authority, Production Certification
The Enterprise Architecture Model
Integration
Information
Infrastructure
Application
Conceptual
Logical
Physical
Business Unit
Program
Project
Scope
Scope
LevelLevel
TypeType
Enterprise
Security
Security
Architecture
Integration
Architecture
Information
Architecture
Technical
Architecture
Application
Architecture
Business
Architecture
ISR?
Traceability
Enterprise Architecture Principles
1. Focus on the “how” part of the architecture model.
2. Justification and ROI come from “why”
3. Architecture is about the qualities of the solution, not the
functional behavior of an application.
4. Architecture is about making trade-off decisions explicit.
5. Explicit architecture models are needed to address system
complexity and delivery problems.
6. Architecture must demonstrate how the technology solutions
solve the business objectives and needs.
7. Data and application integration solutions must be driven by an
understanding of specific business process needs.
Focus on the “How” Part of Architecture
• Definition
– The Enterprise Architecture is a formal definition of
how standard computing components (hardware,
network, software, and data) work together to support
business processes and functions.
– In addition, the Enterprise Architecture provides
qualities required to support future business changes.
– “Architecture is the selection of, arrangement, and
connection between enterprise components and the
rationale for each.”
It is the definition of the pieces and how and why the
pieces fit together.
Problem with Current Technical Abstraction
• Does not accurately represent layer separations
• Does not provide guidance to implementation teams
• Does not help identify shared services/components
Shared Services and Components
Legacy Integration
Application Adapter
Technology Adapter
Data Adapter
Business Services
LRUC
Services
Application Services
Workflow
Security
Session
Technology Services
Persistence
Messaging
Events
Applications
Route
Entry
Customer
Care
Billing General
Ledger
Information BusCustomer Enforcement Billing Inventory
PressurePressure
Business
Driver
Business
Driver
ProgrammeProgramme
CapabilityCapabilityImpactImpact
PhasePhase
Enhanced
Capability
Enhanced
Capability
Business
Function
Business
Function
Business
Process
Business
Process
StakeholderStakeholder
Business
Process
Activity
Business
Process
Activity
Business
Entity
Business
Entity
Desired
change
Desired
change
ImplementationImplementation
Business Entity
Relationship
Business Entity
Relationship
ContextContext AttributeAttribute
Attribute
Source
Attribute
Source
ActorsActors
OrganisationOrganisation
InterfacesInterfaces
TiersTiers Architecture
View
Architecture
View
TransactionTransaction MessagesMessages
PracticePractice
FeatureFeature
ComponentsComponents
ConfigurationConfiguration
COTS ProductCOTS Product
Business Architecture
Technical Architecture
VolumemetricsVolumemetrics
Key to Implementation
1) Implementation” of a
“Business Process
Activity”
2) Business Entity
supporting a “Business
Process”
Integrate Business & Technology Architectures
Proposed Approach
• Part 1: Preparing for market - BCL Gateway 2
– Execute Baseline Gap analysis on LRUC IT capabilities
– Establish architecture principles and objectives
– Adjust PRL for additional Architectural requirements
– Establish Enterprise information model
– Alignment of IT blueprint to support business model
– Contribute Architectural guidance to the Procurement exercise
– Start preparing Integration, Security & Information Frameworks
• Part 2: Ensuring joined up delivery - BCL Gateway 3
– Enable Technical Delivery through Model Driven Architecture
– Development of Component Policy– plug the gaps
– Define services framework
– Architectural realisation through governance & Implementation
Enterprise Blueprint objectives
• Align technical procurement activities to ensure
support for the business strategy
• Mitigate technical risk through POC identification
• Provide a template for integrating capabilities
related to future direction
• Reduce redundancy between integration
components and business applications
• Enable technical capabilities for rapid response to
changing business requirements
Deliverables
• Architecture Blueprint - which will
– Define appropriate system integration wrappers
– Define Informational messaging model
– Define Service Integration template
– Identify required POC
• Capability framework – which will
– Define integration across the Application, Information
and Technology layers.
• Technology Roadmap aligned to Programme plan

More Related Content

What's hot

Architecture Series 5-5 Effective Enterprise Architecture Action Plan
Architecture Series 5-5   Effective Enterprise Architecture Action PlanArchitecture Series 5-5   Effective Enterprise Architecture Action Plan
Architecture Series 5-5 Effective Enterprise Architecture Action Plan
Frankie Hsiang
 
Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Introduction to Enterprise Architecture
Introduction to Enterprise Architecture
Leo Shuster
 
TOGAF 9.2 - Transforming Business
TOGAF 9.2  -  Transforming BusinessTOGAF 9.2  -  Transforming Business
TOGAF 9.2 - Transforming Business
Real IRM
 
Enterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHubEnterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHub
RichardNowack
 
Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...
Alan McSweeney
 
Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!
Sam Mandebvu
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise Architecture
Alan McSweeney
 
Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2
Jean Gehring
 
Chapter19 rapid application development
Chapter19 rapid application developmentChapter19 rapid application development
Chapter19 rapid application development
Dhani Ahmad
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Prashanth Panduranga
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution Architecture
Alan McSweeney
 
Software Architecture: views and viewpoints
Software Architecture: views and viewpointsSoftware Architecture: views and viewpoints
Software Architecture: views and viewpoints
Henry Muccini
 
Solution Architecture Framework
Solution Architecture FrameworkSolution Architecture Framework
Solution Architecture Framework
FirmansyahIrma1
 
Architecture solution architecture method
Architecture solution architecture methodArchitecture solution architecture method
Architecture solution architecture method
Chris Eaton
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Nathaniel Palmer
 
BTABOK / ITABOK
BTABOK / ITABOKBTABOK / ITABOK
BTABOK / ITABOK
Maganathin Veeraragaloo
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core concepts
Paul Sullivan
 
US DOC ACMM Wallchart
US DOC ACMM WallchartUS DOC ACMM Wallchart
US DOC ACMM Wallchart
Paul Sullivan
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for Dummies
Sebastien Juras
 

What's hot (20)

Architecture Series 5-5 Effective Enterprise Architecture Action Plan
Architecture Series 5-5   Effective Enterprise Architecture Action PlanArchitecture Series 5-5   Effective Enterprise Architecture Action Plan
Architecture Series 5-5 Effective Enterprise Architecture Action Plan
 
Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Introduction to Enterprise Architecture
Introduction to Enterprise Architecture
 
TOGAF 9.2 - Transforming Business
TOGAF 9.2  -  Transforming BusinessTOGAF 9.2  -  Transforming Business
TOGAF 9.2 - Transforming Business
 
Enterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHubEnterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHub
 
Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...
 
Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!
 
TOGAF Complete Slide Deck
TOGAF Complete Slide DeckTOGAF Complete Slide Deck
TOGAF Complete Slide Deck
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise Architecture
 
Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2
 
Chapter19 rapid application development
Chapter19 rapid application developmentChapter19 rapid application development
Chapter19 rapid application development
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution Architecture
 
Software Architecture: views and viewpoints
Software Architecture: views and viewpointsSoftware Architecture: views and viewpoints
Software Architecture: views and viewpoints
 
Solution Architecture Framework
Solution Architecture FrameworkSolution Architecture Framework
Solution Architecture Framework
 
Architecture solution architecture method
Architecture solution architecture methodArchitecture solution architecture method
Architecture solution architecture method
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)
 
BTABOK / ITABOK
BTABOK / ITABOKBTABOK / ITABOK
BTABOK / ITABOK
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core concepts
 
US DOC ACMM Wallchart
US DOC ACMM WallchartUS DOC ACMM Wallchart
US DOC ACMM Wallchart
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for Dummies
 

Similar to Enterprise arhitecture blueprint objectives

Ict startegy and architecture
Ict startegy and architecture Ict startegy and architecture
Ict startegy and architecture
Nikola Terziev, CISA
 
Enterprise Architecture
Enterprise Architecture Enterprise Architecture
Enterprise Architecture
Axis Technology, LLC
 
Hk yeditepe university-systemsengg-seminar-102012
Hk yeditepe university-systemsengg-seminar-102012Hk yeditepe university-systemsengg-seminar-102012
Hk yeditepe university-systemsengg-seminar-102012Hakan KIRAN
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
William Francis
 
Creating an Agile Enterprise Architecture
Creating an Agile Enterprise ArchitectureCreating an Agile Enterprise Architecture
Creating an Agile Enterprise Architecture
Cognizant
 
Online Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USAOnline Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USA
Xoom Trainings
 
SISG Services - Overview 2016
SISG Services - Overview 2016SISG Services - Overview 2016
SISG Services - Overview 2016Dave Getty
 
Togaf online training
Togaf online trainingTogaf online training
Togaf online training
xoomlakshmi
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?
Jeff Jakubiak
 
CMAD Group Workbook 3.2 Op Model Enable
CMAD Group Workbook 3.2 Op Model EnableCMAD Group Workbook 3.2 Op Model Enable
CMAD Group Workbook 3.2 Op Model EnableAlexander Doré
 
En Portfolio Caps 2009
En Portfolio Caps 2009En Portfolio Caps 2009
En Portfolio Caps 2009
Patrick ST JEAN
 
TOGAF
TOGAFTOGAF
Max Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product ArchitectureMax Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product Architecture
iasaglobal
 
Align technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsAlign technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessments
The Spitfire Group
 
Enterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service ProvidersEnterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service Providers
Pritam Dey
 
Architecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkArchitecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information Framework
Cognizant
 
Togaf 9.2 Introduction
Togaf 9.2 IntroductionTogaf 9.2 Introduction
Togaf 9.2 Introduction
Mohamed Zakarya Abdelgawad
 
MEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptxMEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptx
WissamShehab1
 
Sisg Services Overview
Sisg Services OverviewSisg Services Overview
Sisg Services Overview
dgetty
 

Similar to Enterprise arhitecture blueprint objectives (20)

Ict startegy and architecture
Ict startegy and architecture Ict startegy and architecture
Ict startegy and architecture
 
Enterprise Architecture
Enterprise Architecture Enterprise Architecture
Enterprise Architecture
 
Hk yeditepe university-systemsengg-seminar-102012
Hk yeditepe university-systemsengg-seminar-102012Hk yeditepe university-systemsengg-seminar-102012
Hk yeditepe university-systemsengg-seminar-102012
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
Creating an Agile Enterprise Architecture
Creating an Agile Enterprise ArchitectureCreating an Agile Enterprise Architecture
Creating an Agile Enterprise Architecture
 
Sternberger CTO eArchitect CV
Sternberger CTO eArchitect CVSternberger CTO eArchitect CV
Sternberger CTO eArchitect CV
 
Online Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USAOnline Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USA
 
SISG Services - Overview 2016
SISG Services - Overview 2016SISG Services - Overview 2016
SISG Services - Overview 2016
 
Togaf online training
Togaf online trainingTogaf online training
Togaf online training
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?
 
CMAD Group Workbook 3.2 Op Model Enable
CMAD Group Workbook 3.2 Op Model EnableCMAD Group Workbook 3.2 Op Model Enable
CMAD Group Workbook 3.2 Op Model Enable
 
En Portfolio Caps 2009
En Portfolio Caps 2009En Portfolio Caps 2009
En Portfolio Caps 2009
 
TOGAF
TOGAFTOGAF
TOGAF
 
Max Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product ArchitectureMax Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product Architecture
 
Align technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsAlign technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessments
 
Enterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service ProvidersEnterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service Providers
 
Architecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkArchitecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information Framework
 
Togaf 9.2 Introduction
Togaf 9.2 IntroductionTogaf 9.2 Introduction
Togaf 9.2 Introduction
 
MEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptxMEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptx
 
Sisg Services Overview
Sisg Services OverviewSisg Services Overview
Sisg Services Overview
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Enterprise arhitecture blueprint objectives

  • 2. Benefits of Enterprise Architecture • Finance – Better understanding of investment decisions, cost allocations. • Stakeholders – May change their view of risk. • Product Development – Improved agility. • Business and IT Relations – Removes the chasm. • IT Planning – Improved understanding of options, trade-offs. • Partners, Suppliers, Vendors – Understanding of vision and processes.
  • 3. Planning an Enterprise Architecture Steps to be Undertaken • GOAL: Formulate and Realise the Technical Blueprint – Agree architecture strategy in context of business & technical drivers – Baseline business & technical requirements that influence blueprint – Establish the conceptual, logical and physical frameworks – Align Enterprise Information Model to Business requirements – Establish a roadmap to show evolution strategy to required state – Prioritise candidate architectural components based on estimated ROI – Develop plans for developing and deploying technical capabilities – Initiate “proof of concept” projects to prove capability challenges – Assure realisation through Production Acceptance process • i.e. ARB, Design Authority, Production Certification
  • 4. The Enterprise Architecture Model Integration Information Infrastructure Application Conceptual Logical Physical Business Unit Program Project Scope Scope LevelLevel TypeType Enterprise Security Security Architecture Integration Architecture Information Architecture Technical Architecture Application Architecture Business Architecture ISR? Traceability
  • 5. Enterprise Architecture Principles 1. Focus on the “how” part of the architecture model. 2. Justification and ROI come from “why” 3. Architecture is about the qualities of the solution, not the functional behavior of an application. 4. Architecture is about making trade-off decisions explicit. 5. Explicit architecture models are needed to address system complexity and delivery problems. 6. Architecture must demonstrate how the technology solutions solve the business objectives and needs. 7. Data and application integration solutions must be driven by an understanding of specific business process needs.
  • 6. Focus on the “How” Part of Architecture • Definition – The Enterprise Architecture is a formal definition of how standard computing components (hardware, network, software, and data) work together to support business processes and functions. – In addition, the Enterprise Architecture provides qualities required to support future business changes. – “Architecture is the selection of, arrangement, and connection between enterprise components and the rationale for each.” It is the definition of the pieces and how and why the pieces fit together.
  • 7. Problem with Current Technical Abstraction • Does not accurately represent layer separations • Does not provide guidance to implementation teams • Does not help identify shared services/components Shared Services and Components Legacy Integration Application Adapter Technology Adapter Data Adapter Business Services LRUC Services Application Services Workflow Security Session Technology Services Persistence Messaging Events Applications Route Entry Customer Care Billing General Ledger Information BusCustomer Enforcement Billing Inventory
  • 8. PressurePressure Business Driver Business Driver ProgrammeProgramme CapabilityCapabilityImpactImpact PhasePhase Enhanced Capability Enhanced Capability Business Function Business Function Business Process Business Process StakeholderStakeholder Business Process Activity Business Process Activity Business Entity Business Entity Desired change Desired change ImplementationImplementation Business Entity Relationship Business Entity Relationship ContextContext AttributeAttribute Attribute Source Attribute Source ActorsActors OrganisationOrganisation InterfacesInterfaces TiersTiers Architecture View Architecture View TransactionTransaction MessagesMessages PracticePractice FeatureFeature ComponentsComponents ConfigurationConfiguration COTS ProductCOTS Product Business Architecture Technical Architecture VolumemetricsVolumemetrics Key to Implementation 1) Implementation” of a “Business Process Activity” 2) Business Entity supporting a “Business Process” Integrate Business & Technology Architectures
  • 9. Proposed Approach • Part 1: Preparing for market - BCL Gateway 2 – Execute Baseline Gap analysis on LRUC IT capabilities – Establish architecture principles and objectives – Adjust PRL for additional Architectural requirements – Establish Enterprise information model – Alignment of IT blueprint to support business model – Contribute Architectural guidance to the Procurement exercise – Start preparing Integration, Security & Information Frameworks • Part 2: Ensuring joined up delivery - BCL Gateway 3 – Enable Technical Delivery through Model Driven Architecture – Development of Component Policy– plug the gaps – Define services framework – Architectural realisation through governance & Implementation
  • 10. Enterprise Blueprint objectives • Align technical procurement activities to ensure support for the business strategy • Mitigate technical risk through POC identification • Provide a template for integrating capabilities related to future direction • Reduce redundancy between integration components and business applications • Enable technical capabilities for rapid response to changing business requirements
  • 11. Deliverables • Architecture Blueprint - which will – Define appropriate system integration wrappers – Define Informational messaging model – Define Service Integration template – Identify required POC • Capability framework – which will – Define integration across the Application, Information and Technology layers. • Technology Roadmap aligned to Programme plan

Editor's Notes

  1. The last part of part 1 starts building the necessary information for the output based specification Part 2 is engaged as we move through check point 2 . Re use from Part 1 is optimised. We do what is sensible to the level of detail for part 1 and are pragmatic So how much work is involved how many capabilities of technology can there be…………….