Enterprise architecture tools help organizations transform by capturing essential business and IT information. The tools must:
1. Include repositories for business, information, technology, and solutions viewpoints and their relationships.
2. Support modeling, decision analysis, visualization, and administration capabilities.
3. Integrate with project and portfolio management to ensure investments align with business strategy and vision.
The document discusses how enterprise architecture tools can help organizations address challenges like aligning supply and demand, integrating business and IT strategies, and executing business strategies. It outlines requisites for tools to support business strategy modeling, domain modeling, process modeling, and governance. Overall, the document argues that enterprise architecture tools are necessary to drive organizational change and
Defining the business value proposition of EA and PPM
Eliminating project risks
Accelerating project execution
Managing project and architecture inter-dependencies
Delivering realized value
Improving collaboration of Architecture and PMO
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Defining the business value proposition of EA and PPM
Eliminating project risks
Accelerating project execution
Managing project and architecture inter-dependencies
Delivering realized value
Improving collaboration of Architecture and PMO
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
Overview on the Practical Enterprise Architecture approach using TOGAF ADM for architectures development, Zachman Framework as artifacts repository and Sparx EA as a modelling tool.
During last few years, role of Enterprise Architecture has expanded from technical to strategic in an Organization. This slide deck presents: Using Enterprise Architecture in your Organization.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Design Architecture Review Board (ARB) to Enable Digital Strategy Mohan K.
Architecture Review Board (ARB) to Enable Digital Strategy Execution - *Based on case study of establishing Architecture Review Board (ARB) at a multinational manufacturing
Overview of the IT4IT tooling market in 2022.
Key trends in the IT4IT / DevOps tooling market are:
- Strategic portfolio management / portfolio backlog management (scaling agile on the enterprise level integrating with Enterprise architecture and Application / Product Portfolio Management)
- On-line collaboration & communication tools supporting team of team planning, problem solving, etc.
- Value stream management (an emerging tooling category) providing visibility across the end-to-end IT value streams
- Multi-cloud discovery & visibility on usage, costs and compliance
- Integrating DevOps tool chain (e.g. CICD pipeline) with the ITSM platform and CMDB
- Integrating security, risk and compliance management into the DevOps tool chain
- AIOps and observability management, consoliding metrics, logs, events mapped to a real-time service model
- Security operations, integrating security monitoring, vulnerability scanning, etc. into end-to-end detect to correct value streams
- Enterprise Service Management (ITSM vendors providing omni-channel services across IT, HR, Facilities, Finance, etc.)
- Leveraging AI/ML in various capabilities such test management, security operations, incident management, etc.
- Sustainability management integrated in IRM/GRC platforms
And last but not least:
- Service / Product portfolio management (managing the portfolio of service/applications, supporting product centric operating models, linked to business capabilities, product owners and teams)
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
Technical debt is an overworked term without an effective and common agreed understanding of what exactly it is, what causes it, what are its consequences, how to assess it and what to do about it.
Technical debt is the sum of additional direct and indirect implementation and operational costs incurred and risks and vulnerabilities created because of sub-optimal solution design and delivery decisions.
Technical debt is the sum of all the consequences of all the circumventions, budget reduction, time pressure, lack of knowledge, manual workarounds, short-cuts, avoidance, poor design and delivery quality and decisions to remove elements from solution scope and failure to provide foundational and backbone solution infrastructure.
Technical debt leads to a negative feedback cycle with short solution lifespan, earlier solution replacement and short-term tactical remedial actions.
All the disciplines within IT architecture have a role to play in promoting an understanding of and in the identification of how to resolve technical debt. IT architecture can provide the leadership in both remediating existing technical debt and preventing future debt.
Failing to take a complete view of the technical debt within the organisation means problems and risks remained unrecognised and unaddressed. The real scope of the problem is substantially underestimated. Technical debt is always much more than poorly written software.
Technical debt can introduce security risks and vulnerabilities into the organisation’s solution landscape. Failure to address technical debt leaves exploitable security risks and vulnerabilities in place.
Shadow IT or ghost IT is a largely unrecognised source of technical debt including security risks and vulnerabilities. Shadow IT is the consequence of a set of reactions by business functions to an actual or perceived inability or unwillingness of the IT function to respond to business needs for IT solutions. Shadow IT is frequently needed to make up for gaps in core business solutions, supplementing incomplete solutions and providing omitted functionality.
The TOGAF® Architecture Development Method recommends that "an architecture description be encoded in a standard language". As the Open Group standard for enterprise modeling, Archimate is a strong candidate for this role. This presentation will explore how a diversified financial services company selected and is using Archimate for its TOGAF® implementation. The speaker will compare available enterprise modeling languages and explain why Archimate was selected, and will explain how his organization developed an enabling metamodel and diagram templates using a leading enterprise modeling tool. Methodology transition will also be covered, including how existing diagram types were mapped to TOGAF®, and how TOGAF® diagram content was mapped to Archimate.
Delivered at February 2011 Open Group San Diego Conference
A revised TOGAF ADM for whole-of-enterprise architecture developmentTetradian Consulting
Two-page summary of whole-of-enterprise architecture methodology from book "Bridging the Silos" (Tom Graves: Tetradian Books, 2008) - use this as a reference sheet whilst working.
[Based in part on TOGAF (The Open Group Architecture Framework); extensions (c) Tetradian 2008]
A Brief Introduction to Enterprise Architecture Daljit Banger
Presentation to Metropolitan University (London) on the 16th Feb 2017.
The purpose of the session was to introduce core basic concepts around Enterprise Architecture and discuss the role of the Enterprise Architect .
Solution Architecture And Solution SecurityAlan McSweeney
This describes an approach to embedding security within the technology solution landscape. It describes a security model that encompasses the range of individual solution components up to the entire solution landscape. The solution security model allows the security status of a solution and its constituent delivery and operational components to be tracked wherever those components are located. This provides an integrated approach to solution security across all solution components and across the entire organisation topology of solutions. It allows the solution architect to validate the security of an individual solution. It enables the security status of the entire solution landscape to be assessed and recorded. Solution security is a wicked problem because there is no certainly about when the problem has been resolved and a state of security has been achieved. The security state of a solution can just be expressed along a subjective spectrum of better or worse rather than a binary true or false. Solution security can have negative consequences: prevents types of access, limits availability in different ways, restricts functionality provided, makes solution harder to use, lengthens solution delivery times, increases costs along the entire solution lifecycle, leads to loss of usability, utility and rate of use.
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
Enterprise Architectures play an important role supporting business transformation initiatives. Enterprise Architecture Governance (EAG) provides a structure for defining relevant strategies and compliance processes. This Level 3 Communications case study presents a detailed framework composed of three essential components of EAG:
1) Organizational Accountability must be clearly defi ned for all EAG aspects, and executive sponsorship is essential. Level 3 formed an executive steering committee with broad representation, preventing EAG from becoming an IT-only initiative.
2) Strategy Defi nition provides the roadmap for business transformation initiatives. Architectural guiding principles defi ne values and offer input into strategies, end states define where the company is going, and roadmaps document how to get there from.
3) Compliance Processes ensure that development initiatives are in alignment with the strategic direction. Level 3 has created a framework that gives each development initiative an architecture rating that indicates its compliance level.
Structured Approach to Solution ArchitectureAlan McSweeney
The role of solution architecture is to identify answer to a business problem and set of solution options and their components. There will be many potential solutions to a problem with varying degrees of suitability to the underlying business need. Solution options are derived from a combination of Solution Architecture Dimensions/Views which describe characteristics, features, qualities, requirements and Solution Design Factors, Limitations And Boundaries which delineate limitations. Use of structured approach can assist with solution design to create consistency. The TOGAF approach to enterprise architecture can be adapted to perform some of the analysis and design for elements of Solution Architecture Dimensions/Views.
Enterprise Architecture
Enterprise Architectural Methodologies
A Brief History of Enterprise Architecture
Zachman Framework
Business Attributes
Features & Advantages
SABSA Lifecycle
SABSA Development Process
SMP Maturity Levels
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
Overview on the Practical Enterprise Architecture approach using TOGAF ADM for architectures development, Zachman Framework as artifacts repository and Sparx EA as a modelling tool.
During last few years, role of Enterprise Architecture has expanded from technical to strategic in an Organization. This slide deck presents: Using Enterprise Architecture in your Organization.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Design Architecture Review Board (ARB) to Enable Digital Strategy Mohan K.
Architecture Review Board (ARB) to Enable Digital Strategy Execution - *Based on case study of establishing Architecture Review Board (ARB) at a multinational manufacturing
Overview of the IT4IT tooling market in 2022.
Key trends in the IT4IT / DevOps tooling market are:
- Strategic portfolio management / portfolio backlog management (scaling agile on the enterprise level integrating with Enterprise architecture and Application / Product Portfolio Management)
- On-line collaboration & communication tools supporting team of team planning, problem solving, etc.
- Value stream management (an emerging tooling category) providing visibility across the end-to-end IT value streams
- Multi-cloud discovery & visibility on usage, costs and compliance
- Integrating DevOps tool chain (e.g. CICD pipeline) with the ITSM platform and CMDB
- Integrating security, risk and compliance management into the DevOps tool chain
- AIOps and observability management, consoliding metrics, logs, events mapped to a real-time service model
- Security operations, integrating security monitoring, vulnerability scanning, etc. into end-to-end detect to correct value streams
- Enterprise Service Management (ITSM vendors providing omni-channel services across IT, HR, Facilities, Finance, etc.)
- Leveraging AI/ML in various capabilities such test management, security operations, incident management, etc.
- Sustainability management integrated in IRM/GRC platforms
And last but not least:
- Service / Product portfolio management (managing the portfolio of service/applications, supporting product centric operating models, linked to business capabilities, product owners and teams)
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
Technical debt is an overworked term without an effective and common agreed understanding of what exactly it is, what causes it, what are its consequences, how to assess it and what to do about it.
Technical debt is the sum of additional direct and indirect implementation and operational costs incurred and risks and vulnerabilities created because of sub-optimal solution design and delivery decisions.
Technical debt is the sum of all the consequences of all the circumventions, budget reduction, time pressure, lack of knowledge, manual workarounds, short-cuts, avoidance, poor design and delivery quality and decisions to remove elements from solution scope and failure to provide foundational and backbone solution infrastructure.
Technical debt leads to a negative feedback cycle with short solution lifespan, earlier solution replacement and short-term tactical remedial actions.
All the disciplines within IT architecture have a role to play in promoting an understanding of and in the identification of how to resolve technical debt. IT architecture can provide the leadership in both remediating existing technical debt and preventing future debt.
Failing to take a complete view of the technical debt within the organisation means problems and risks remained unrecognised and unaddressed. The real scope of the problem is substantially underestimated. Technical debt is always much more than poorly written software.
Technical debt can introduce security risks and vulnerabilities into the organisation’s solution landscape. Failure to address technical debt leaves exploitable security risks and vulnerabilities in place.
Shadow IT or ghost IT is a largely unrecognised source of technical debt including security risks and vulnerabilities. Shadow IT is the consequence of a set of reactions by business functions to an actual or perceived inability or unwillingness of the IT function to respond to business needs for IT solutions. Shadow IT is frequently needed to make up for gaps in core business solutions, supplementing incomplete solutions and providing omitted functionality.
The TOGAF® Architecture Development Method recommends that "an architecture description be encoded in a standard language". As the Open Group standard for enterprise modeling, Archimate is a strong candidate for this role. This presentation will explore how a diversified financial services company selected and is using Archimate for its TOGAF® implementation. The speaker will compare available enterprise modeling languages and explain why Archimate was selected, and will explain how his organization developed an enabling metamodel and diagram templates using a leading enterprise modeling tool. Methodology transition will also be covered, including how existing diagram types were mapped to TOGAF®, and how TOGAF® diagram content was mapped to Archimate.
Delivered at February 2011 Open Group San Diego Conference
A revised TOGAF ADM for whole-of-enterprise architecture developmentTetradian Consulting
Two-page summary of whole-of-enterprise architecture methodology from book "Bridging the Silos" (Tom Graves: Tetradian Books, 2008) - use this as a reference sheet whilst working.
[Based in part on TOGAF (The Open Group Architecture Framework); extensions (c) Tetradian 2008]
A Brief Introduction to Enterprise Architecture Daljit Banger
Presentation to Metropolitan University (London) on the 16th Feb 2017.
The purpose of the session was to introduce core basic concepts around Enterprise Architecture and discuss the role of the Enterprise Architect .
Solution Architecture And Solution SecurityAlan McSweeney
This describes an approach to embedding security within the technology solution landscape. It describes a security model that encompasses the range of individual solution components up to the entire solution landscape. The solution security model allows the security status of a solution and its constituent delivery and operational components to be tracked wherever those components are located. This provides an integrated approach to solution security across all solution components and across the entire organisation topology of solutions. It allows the solution architect to validate the security of an individual solution. It enables the security status of the entire solution landscape to be assessed and recorded. Solution security is a wicked problem because there is no certainly about when the problem has been resolved and a state of security has been achieved. The security state of a solution can just be expressed along a subjective spectrum of better or worse rather than a binary true or false. Solution security can have negative consequences: prevents types of access, limits availability in different ways, restricts functionality provided, makes solution harder to use, lengthens solution delivery times, increases costs along the entire solution lifecycle, leads to loss of usability, utility and rate of use.
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
Enterprise Architectures play an important role supporting business transformation initiatives. Enterprise Architecture Governance (EAG) provides a structure for defining relevant strategies and compliance processes. This Level 3 Communications case study presents a detailed framework composed of three essential components of EAG:
1) Organizational Accountability must be clearly defi ned for all EAG aspects, and executive sponsorship is essential. Level 3 formed an executive steering committee with broad representation, preventing EAG from becoming an IT-only initiative.
2) Strategy Defi nition provides the roadmap for business transformation initiatives. Architectural guiding principles defi ne values and offer input into strategies, end states define where the company is going, and roadmaps document how to get there from.
3) Compliance Processes ensure that development initiatives are in alignment with the strategic direction. Level 3 has created a framework that gives each development initiative an architecture rating that indicates its compliance level.
Structured Approach to Solution ArchitectureAlan McSweeney
The role of solution architecture is to identify answer to a business problem and set of solution options and their components. There will be many potential solutions to a problem with varying degrees of suitability to the underlying business need. Solution options are derived from a combination of Solution Architecture Dimensions/Views which describe characteristics, features, qualities, requirements and Solution Design Factors, Limitations And Boundaries which delineate limitations. Use of structured approach can assist with solution design to create consistency. The TOGAF approach to enterprise architecture can be adapted to perform some of the analysis and design for elements of Solution Architecture Dimensions/Views.
Enterprise Architecture
Enterprise Architectural Methodologies
A Brief History of Enterprise Architecture
Zachman Framework
Business Attributes
Features & Advantages
SABSA Lifecycle
SABSA Development Process
SMP Maturity Levels
The Government of New Brunswick Enterprise Architecture RoadmapTamim Rahman
This document can be downloaded as a PDF for a better viewing experience; click on "Save". This roadmap was shared in a Symposium held on September 25th. A summary of this event can be found on http://www.qrs3e.com/gnb_ocio_togaf/
Presentation at Open Day on Enterprise-Architecture and Systems-Thinking, London, 21 October 2104, for SCiO (Systems and Cybernetics in Organisations) http://scio.org.uk/
This used my development-work on the Enterprise Canvas framework as a worked-example of how we might create tools to bridge the gaps between enterprise-architecture and systems-thinking, in support of organisations' needs.
(This slidedeck also provides a useful overview and primer for Enterprise Canvas itself.)
Introduction to Enterprise Architecture and TOGAF 9.1iasaglobal
Santos Pardos nos dará una visión general a TOGAF. Durante 2 horas, Santos nos introducirá al mundo de The Open Group Architecture Framework (TOGAF), ese marco de trabajo de Arquitectura Empresarial que muchos escuchamos hablar. Nos contará el enfoque propuesto para el diseño, planificación, implementación y gobierno de una arquitectura empresarial de información. También repasará, a alto nivel, cuatro niveles o dimensiones: Arquitectura de Negocios Arquitectura de Aplicaciones Arquitectura Tecnológica Arquitectura de Dat
Introduction to Enterprise Architecture Leo Shuster
If you ever wanted to find out what Enterprise Architecture was, this is the presentation for you. It gives you a basic understanding of Enterprise Architecture, its goals, objectives, and benefits.
Logicalis outlines a methodology for simplifying data centre infrastructure and moving to a fully automated and orchestrated data centre environment. Our six step process provides an effective way to move to a private cloud.
The term Actionable Architecture moves the EA from a static project to a central platform for the capture and dissemination of IT and business process information.
In essence, EA becomes a strategic foundation for knowledgeable decision making and is based on traceable facts in a repository.
OMG 2014 Business Architecture Innovation Summit - Aligning design with Busin...Mike Clark
Aligning design with Business Architecture, enabling the creation of a 360 model of the business. The core focus of any business should be customers, and outcomes. These are key components of any business model. This presentation demonstrates how this is possible by combining design and business architecture. These combination of disciplines helps to create the elusive 360 model, and almost leads to a co-evolution of the customer, and the business.
Adaptive computing and pay-as-you-model for SAP.....
Customers should stop buying on CAPEX and signing long term contracts.... it is time to move to Consumption Based Computing...
AWS Summit Berlin 2013 - Realtech - How to Determine the Economic Value of SA...AWS Germany
How can my SAP landscape be optimized safely with distributed computing so that I can meet my business needs, reduce costs, and increase value? How can I formulate hard metrics that construct a SAP optimization strategy and roadmap custom fit to my organization?.
Speaker: Chris Kohlsdorf, Managing Director, Realtech Consulting GmbH
SAP ABAP Online Training Institute in Hyderabad - C-Pointcpointss
C-Point Software Solutions is a Leading Training Institute in Hyderabad. We Provide Training on SAP, SAS, Oracle E Business Suite, Informatica, OBIEE, SQL DBA, Hadoop, Cloud Computing, .Net, Testing Tools, Java, Web Designing, PHP.
A Sogeti study to which extent it\'s possible to convert function points to COSMIC function points and back. A framework on how to make the transition from FPA to COSMIC as the leading FSMM in the organzition. - Published at the SMEF2007 conference (Rome, May 2007)
eTOM awareness presentation. Covers an introduction to NGOSS, TOM to ETOM, exploded view of eTOM 9.0, success steps to transitioning and road map to process management.
A competent professional offering over 7+ years of experience in Business Intelligence & Data Warehousing working in roles such as Business Analyst, Data Analyst & Reporting Developer, ETL Architect, Data Architect. Extensively worked on a wide range of tools such as Tableau, Spotfire & SAP Business Objects. Skilled in Teradata database, Oracle Database, MS SQL Server, MS Access, PostgreSQL, Requirements Analysis, reporting, Extract, Transform, Load (ETL), Data Warehousing, End-to-end execution of BI Projects, System Integration, Value Delivery, Team Leadership, Onshore-Offshore working model.
Business Expertise: Power & Engineering(GE POWER), Banking and Financial Services(GE CAPITAL), Leasing domain .
Interests: Data Science.
Defining Enterprise Performance Management (EPM) in Digital Era.pdfAnil
Speed agility, disruption, and innovation have become new the normal in the contemporary world. Enterprise Performance Management (EPM) is no exception. We have seen a tremendous shift in how business leaders manage their respective organizations’ performance in the last five years. Technology is a huge enabler facilitating real-time access to critical information at the desired granularity.
Forrester Wave | BPM Platforms for digital business 2015Rick VARGAS
Pegasystems Leads The Pack
Forrester’s research uncovered a market in which
Pegasystems, Appian, and IBM continue to lead
the pack. Software AG, Oracle, Newgen Software,
OpenText, Bizagi, K2, and DST Systems offer
competitive options. Red Hat and TIBCO
Software lag behind.
The BPM Platforms Market Is Growing As EA
Pros Accelerate Digital Transformation
The BPM platforms market is growing because
more EA professionals see BPM as a way to
address emerging challenges for customer
experience and digital business. This market
growth is, in large part, because EA pros
increasingly trust BPM platform providers to act
as strategic partners, helping them transform
how they use technology to win, serve, and retain
customers in the digital age.
ERP Optimization: How to Save Cost And Gear Up For Business Innovation Simult...CAST
This slide presentation features Liz Herbert, Principal Analyst with Forrester Research Inc, on how to take control of your ERP system to enable growth and revenue generation by learning to:
-Find the balance between cost control and business innovation
-Manage the TCO of ERP systems by reducing complexity
-Identify performance and stability vulnerabilities by focusing on the quality of customizations
To watch the complete webinar, visit http://www.castsoftware.com/news-events/event/erp-customization-kills-innovation?gad=ss
Bill Wood - SAP Digital Business Transformation ResumeBill Wood
EXPERIENCED at reinventing business models using SAP software. Use of technology innovation to integrate digital business models with technology as a lever to transform revenue generation, innovate customer experiences, and manage costs. An experience-based approach that is research-informed and ever-learning with frequently referenced thought leadership (summary bibliography available) around:
• ERP III
• ERP critical success factors
• ERP project delivery
• Transforming the IT organization
• Building Centers of Excellence
Max Poliashenko - Enterprise Product Architectureiasaglobal
Enterprise Product Architecture(EPA) is a new kid on the block that hasn't been established as well nor even well understood by industry analysts, yet it may be crucial for software product companies. EPA combines methods and governance models of EA however directed at customer facing solution or software products which gives it a distinctly different set of concerns and techniques.
Michael Gonzalez - Do The Sum of The Parts Equal the Wholeiasaglobal
If we're going to say this is "Enterprise Architecture" then why not approach it from an "Enterprise" perspective? Meaning, is it possible to have enterprise business, information, and technical architecture disciplines, all reporting to various stakeholders, effectively partner to yield true enterprise transformation? This presentation explores some of the challenges and opportunities operating EA as a matrixed team to include best practices and lessons learned.
Michael Jay Freer - Information Obfuscationiasaglobal
In this session, Michael Jay Freer will explore defining a common data-masking language, defining standard masking business-rules, defining best practices for manipulating the data, and how to get started without attempting to "Boil-the-ocean."
Creating Enterprise Value from Business Architectureiasaglobal
This presentation will cover the Why (Value) and How (Execution) of a Business Architecture program. You will understand how you can lead your enterprise towards its vision by planning for key Business Capabilities that will get you there.
Scott Whitmire - Just What is Architecture Anywayiasaglobal
An understanding of the fundamentals of architecture: What it is, what it comprises, and how it comes about, are crucial to further developing our practice.
Sean Kenney - Solving Parallel Software Challenges with Patternsiasaglobal
Sean will talk about the various parallel patterns and specifically how they can be used to solve specific parallel design challenges. This session will focus on 6 patterns that attendees will need to understand in order to architect and develop software that leverages parallel programming.
Stephen Cohen - The Impact of Ethics on the Architectiasaglobal
This session will place the Architect as leader, decision maker, risk manager, and agent of change in a context of professionalism and responsibility. We will explore many of the choices and actions Architects take on that are, or should be, guided by more than simple fiscal value creation but clarity of purpose in support of multiple cultures and needs.
This presentation will explain the idea, pros and cons of the Evolution Game. It will also compare it against the usual strategies. Lastly, it will show all tactics that need to be applied in order to involve stakeholders and evaluate the actual architecture sanity, particularly how to measure "evolvability".
Nina Grantcharova - Approach to Separation of Concerns via Design Patternsiasaglobal
Separation of Concerns aims at managing complexity by establishing a well-organized system where each part adheres to a single and unique purpose while maximizing the system's ability to adapt to change and increasing developers' productivity. The goal of this presentation is to promote the understanding of the principle of Separation of Concerns and to provide a selected set of foundational patterns to aid software architects in the designing of maintainable and extensible systems.
Roger Sessions - The Snowman Architectureiasaglobal
It is time for a Radical Transformation of IT. IT projects must be smaller, cheaper, and better aligned with the needs of the business. Simplicity must be a key design feature of every IT project. Projects must be delivered in months, not years. And in this new vision of a transformed IT, it is not IT's responsibility to tell the business what it can do, it is the business's responsibility to tell IT what it must do. Enterprise Architecture can be at the forefront of this vision, but only if it is revamped so that its purpose is no longer delivering useless paperwork, but facilitating high value IT projects. This transformation starts with a Snowman.
So, you are an architect. What does this mean? How do you define yourself? Iasa has worked with more than 7,000 architects to create a common definition and understanding of IT Architecture as expressed by five pillars: Business Technology Strategy; Human Dynamics; Quality Attributes; IT Environment; and Design, and to create a common vocabulary to be shared amongst all IT Architects. Iasa has further defined IT Architecture as a profession backed by various levels of certification. This session discussed Iasa's Architectural Foundations material, offering a clear understanding of what IT Architecture is, and who IT Architects are. Watch, learn and validate what 30,000 architects worldwide are now sharing.
Phil Wheat and his innovative shopping cart technology that will revolutionize the retail industry. This automated shopping cart technology is the perfect solution for people with disabilities, severe allergies, or those who like to stay ahead of the technology game.
Building Risk Management into Enterprise Architectureiasaglobal
By Bill Estrem, MN Chapter Conference 11/15/2013 Get Lucky: Building Risk Management into Enterprise Architecture This presentation will examine how enterprise architects can apply risk management capabilities to the development and operation of an enterprise architecture. The approach incorporates the TOGAF 9 Risk Management framework along with other risk management methods. In particular, the approach will focus on the The Open Group Risk Management Taxonomy and Risk Assessment standard. Bill Estrem - President of Metaplexity Associates LLC
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Neuro-symbolic is not enough, we need neuro-*semantic*
Essentials of enterprise architecture tools
1. Essentials of Enterprise
Architecture Tools
IASA Global - India Chapter Webinar by
Vinu Jade
Information Systems Strategy Advisor
With Acknowledgement to Mr. Reed Taneja
MEGA – APAC
&
Gartner 2014 Assessment of Tools for EA
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
2. Agenda
1. Discuss what are EA Tools, what do they
feature and High Level Requisites
2. EA is all about Change and
Transformation
3. Business, IT and Their Strategy
4. Requisites of an EA suite
5. Challenges Tools focus
6. Recommandations and Strength and
Weakness of Tools
2
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
3. What are EA Tools?
Used effectively,EA tools enable organizations to meet the challenges
facing business by capturing, integrating, and analyzing information to
enable business decisions.
The EA tool market is fragmented and has shown little change in the
past year, with a few exceptions.
Enterprise architecture (EA) tools are software applications targeted
primarily at supporting the direct participants and stakeholders of the
EA discipline in their strategically driven planning through to execution.
Support for strategic decision making is provided through capturing
vital enterprise context, along with content development and analysis
capabilities across the business,information,technology and solution
architectures.
Quoted from Gartner
4. What does EA Tools Feature?
EA tools capture, store, structure and analyze information pertaining to
EA and present the information to enterprise stakeholders.
The tools should facilitate the implementation of a business strategy
focused on business outcomes and risk mitigation.
The information must be presented to a variety of stakeholders set on
transition-planning the future-state architecture across a number of
viewpoints,including business,information, technology and solutions.
This is done to enable business change that supports the direction and
strategy of the organization while confronting many types of business
disruptions.
At a minimum, EA tools should integrate with project and portfolio
management solutions to ensure the best investment mix of projects to
execute on business direction, vision and strategy.
Quoted from Gartner
5. High - level Requisites for an EA
Tool
EA tools must address the requirements of a variety of business
and IT stakeholders in the organization, and the tools must
contain:
A repository that supports, at a minimum, the business,
information, technology and solution viewpoints and their
relationships.
The repository must also support business direction, vision and
strategy, as well as business disruptions.
Modelling capabilities that support the minimum viewpoints of
business, information, solutions and technology.
Decision analysis capabilities, such as gap analysis, impact
analysis, scenario planning and system thinking.
Quoted from Gartner
6. Presentation capabilities that are visual or interactive to meet
the demands of a myriad of stakeholders.
Administration capabilities that enable security, user
management and other tasks.
Configurability capabilities that are extensive, simple and
straightforward to accomplish while supporting multiple
environments.
Support for frameworks and standards, often used while
providing the flexibility to customize the framework.
Usability, including intuitive, flexible and easy-to-learn user
interfaces (UIs).
High - level Requisites for an EA
Tool
Quoted from Gartner
7. Agenda
1. Discuss what are EA Tools, what do they
feature and High Level Requisites
2. EA is all about Change and
Transformation
3. Business, IT and Their Strategy
4. Requisites of an EA suite
5. Challenges Tools focus
6. Recommandations and Strength and
Weakness of Tools
7
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
8. Enterprise Architects in Transformation
brings Value and DRIVES, For any CHANGE! – Integrated
tool is a necessity
- 8
Vision
Goals
Strategy
Roadmap
Example: Best-In-Class Customer
Experience
To achieve Best-In-Class Consistent Customer Experience
As an Example Theme
Transformation Programs
• Meeting Capability for Business with Value
• Capability to Govern
One-IT Example: ( Can be driven out of any of the 4 pillars,
Strategy or Architecture in Business and Technology)
• New customer paradigm – self service, zero touch, real time
• New business model - collaborative business
• Convergence – communications and computing - Acquisitions and Merger
• Compliance – statutory obligation and governance
• Optimization – application rationalization and technology homogenization
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
9. Frozen in
the past
In the Abyss
Leading
Competitive
Operational &
IT spending
increases
Limited access
to information
Little flexibility
No IT agility
IT delivers little
business values
Uncontrollable
operational & IT
spending
IT as Huge Cost
Center
IT in the Fire-
Fighting Modes
Business & IT
Integration
IT Architecture
Framework in
place
IT Architecture
Organization
(ITAO) in place
IT delivers
Strategic
Business values
IT as Profit
Center
IT Spending under
control
IT Supports
business operation
Effective new
development
IT Architecture
blueprint in place
IT Governance in
place
Enterprise Architecture with Tools helps in
A Health Check for Transformation
10. Agenda
1. Discuss what are EA Tools, what do they
feature and High Level Requisites
2. EA is all about Change and
Transformation
3. Business, IT and Their Strategy
4. Requisites of an EA suite
5. Challenges Tools focus
6. Recommandations and Strength and
Weakness of Tools
10
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
11. Business and Its Strategy – Cutting Edge Paradigm
1. Architecting to meet Demand with Effective Supply
Enterprise Architecture
& Strategy Focus
12. Business and Its Strategy – Cutting Edge Paradigm
2. Architecting for Technology and Business Focus towards Value
Enterprise Architecture
& Strategy Focus
Enables Cutting Edge
13. 3. Alignment to business is critical aspect of “envision”
‘Business-IT Alignment’ has multiple perspectives
-
• There are 4 dimensional
perspectives for assessing
Business-IT Alignment
– Business Strategy as a driver
• Strategy Execution (1 – 2 – 4)
• IT Transformation (1 – 3 – 4)
– IT & Data Strategy as an
Enabler
• Competitive Potential (3 – 1 – 2)
• Service Level (3 – 4 – 2)
• Each of the above perspective
requires different role play of
management team
• All perspectives are important to
consider while defining IT Strategy
and managing it.
14. Agenda
1. Discuss what are EA Tools, what do they
feature and High Level Requisites
2. EA is all about Change and
Transformation
3. Business, IT and Their Strategy
4. Requisites of an EA suite
5. Challenges Tools focus
6. Recommandations and Strength and
Weakness of Tools
14
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
15. 1.Supply – Demand, 2. Business – IT, & 3. Strategic Execution
Lets Derive the Requisites of an EA Tool
BUSINESS CENTRIC CHALLENGES
Must Have – An Approach and Methodology for Business Strategy Modeling, helping in Agile
Business and Agile IT.
– Value thru Strategic Planning?
Improve the Supply & Demand Alignment (SAD) with improved Product Utilization, Leverage
Levels (PULL) in market and meet Agile Customer Experience (ACE)
– Qualitative Domain modeling?
IT & DATA CENTRIC CHALLENGES
Technology Strategy ( IT inclusive and NOT conclusive!) to enable the consumer meet the
product. - Logical Process Modeling?
GRC CENTRIC CHALLENGES
Operational Strategy for Support, Sustain and Succeed (ICE) with agile Technology enablement?, , with
Governance and Process Model (GAP)
Should We Adopt Enterprise Architecture Tools ?
Quoted from MEGA
16. ENTERPRISE REPOSITORY
BUSINESS AND OPERATIONS
IT AND DATA
GOVERNANCE, RISK AND COMPLIANCE
Solutions for Business Leaders to Analyse, Manage and Transform their
Operating Model, in order to deliver on the Organizational and Strategic
objectives of the company.
Solutions for IT Leaders to Analyse, Manage and Transform their IT
Assets, in order to support the Business Model, contribute to Business
Performance and navigate Digital Transformation.
Solutions for Leaders of Assurance functions – Risk, Control, Compliance and
Internal Audit - to consistently manage the risk exposure of the organization in
collaboration with the Business lines and the IT Function.
Hence – An Overview of EA Tool
Requisites
16Quoted from MEGA
17. BUSINESS STRATEGY & EXECUTION
ENTERPRISE RISK
MANAGEMENT
COMPLIANCE
MANAGEMENT
Control and Manage Risk
Design – Analyse – Assess - Improve - Transform
Govern
INTERNAL AUDIT
MANAGEMENT
Requisites of an EA suite
17
Business and
Operations
IT and
Data
Assurance Functions
CxOs
Organization
OPERATIONAL
GOVERNANCE
BUSINESS
ARCHITECTURE
ENTERPRISE
ARCHITECTURE
IT PORFTFOLIO
MANAGEMENT
Quoted from MEGA
18. One approach to key challenges
18
ERM Process … articulated with Business Lines
Compliance Management … balanced with performance
3 lines of defense … integrated and consistent
Internal Audit … risk driven and streamlined
Execution of the
Business Strategy
Development of
Business Capabilities
Operational Governance, Risk
& Compliance
Analysis and Improvement of
Business Processes
Alignment of the
Business-IT partnership
Transformation of
Operating Model
1
2
3
4
1
2
3
4
5
6
Governance,Risk&Compliance
BUSINESSIT&DATA
Alignment and Agility of the
IT Landscape
Management of the
Application Portfolio
Digital Transformation
Solution Blueprint
Information Portfolio
Management
Mitigation of the
IT Risk Exposure
1
2
3
4
5
6
Quoted from MEGA
19. Agenda
1. Discuss what are EA Tools, what do they
feature and High Level Requisites
2. EA is all about Change and
Transformation
3. Business, IT and Their Strategy
4. Requisites of an EA suite
5. Challenges Tools focus
6. Recommandations and Strength and
Weakness of Tools
19
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
21. BUSINESS AND OPERATIONS CHALLENGES
Execution of the
Business Strategy
Evolution of Business
Model capabilities
Operational Governance,
Risk and Compliance
Analysis and Improvement
of Business Processes
Alignment of the
Business-IT Partnership
Transformation of the
Operating Model
Business Centric Challenges
21
IT AND DATA
GOVERNANCE, RISK AND COMPLIANCE
1 2
3 4
5 6
Quoted from MEGA
22. Operational governance,
Risk and Compliance
Design and manage a robust strategic planning process
Align strategic intent, organizational objectives and KPIs
Identify the strategic contribution of organizational assets
Monitor the execution of strategy through programs and projects
Tools help CxOs to Design the business strategy and consistently Define its execution
through organizational objectives, transformation programs and improvement projects.
Tools help Business Leaders to Ensure the compliance of their business practices with
external/internal regulations and Manage the risk exposure of their operations in line
with the risk appetite of the company.
Manage the impact of regulations and policies on business operations
Assess the business risks and the risk of non-compliance
Implement preventive and corrective actions to mitigate risk exposure
Comply with external/internal requirements through controls
Multiple business lines
Sophisticated strategies
Complex organization
Execution of
Business Strategy
Highly regulated environment
Significant impact of risk
High impact of non compliance
Business Centric Challenges (1/3)
22
1
2
23. Tools help Business Architects to Analyze actual capabilities of the organization, Make
educated decision about changes needed to support new Business objectives and then
Roadmap the development of capabilities through projects, processes and IT applications
Understand the existing business capability landscape
Identify capabilities required to support new business plans
Alignment the Business & IT Roadmaps on the expected capabilities
Review investments vs capability roadmap
Fast changing business environment
Complex business models
Transformation too critical to fail
Merger & Acquisition
Process Standardization Initiative
Deployment of a major new IT System
Review operating model and understand existing implementation
Identify and analyze potential transformation scenario
Define potential target operating model and make decisions
Analyse impact and communicate to facilitate change
Tools help Business Leaders to Understand the impact of a change –internal or external –
on existing operating models, Analyse the different potential implementation scenarios and
Manage the organizational transformation toward the Target Operating Model
Business Centric Challenges (2/3)
23
Evolution of
Business Model Capabilities
Transformation of the
Operating Model
3
4
Quoted from MEGA
24. Provide transparency on how IT supports business operations
Increase business agility in safely analyzing impact of required IT changes
Analyse IT contribution to business to better drive the IT Investment process
Identify and assess the potential business benefits of untapped IT capabilities
Tools help Business Leaders to Identify the opportunities and fully Concretize the
benefits of IT as a competitiveness factor and a source of differentiation.
We help IT Leaders to Adapt Agilely IT Assets in order to Deliver business requirements,
while guaranteeing that IT investments sustainably Align with the Strategy.
Tools help Business Architects to Analyze how the company’s value chain delivers on
customer’s expectations, Review the performance of key processes, Explore the support
they get from IT and Assess impact on key business informations.
Analyse and drill-down processes, functions, IT and Data
Manage business performance through KPIs
Identify and simulate the improvement scenarios
Numerous business processes
Undocumented and unmanaged
Looking for process improvement
Complex and Heterogeneous IT Landscape
IT and Business strongly intricate
Major business impact of digital transformation
Alignment of the
Business - IT Partnership
Business Centric Challenges (3/3)
24
Analysis and Improvement
of Business Processes
6
5
Quoted from MEGA
25. IT AND DATA CENTRIC CHALLENGES
BUSINESS AND OPERATIONS
Alignment and Agility of
the IT Landscape
Management of the
Application Portfolio
Digital Transformation
Solution Blueprint
Information Portfolio
Management
IT Centric Challenges
25
GOVERNANCE, RISK AND COMPLIANCE
Mitigation of
IT Risk Exposure
1 2
3 4
5 6
Quoted from MEGA
26. Alignement and Agility of the
IT Landscape
Review scenario for “digitally modified business”
Identify business or IT capability expected or impacted
Analyse the impact on the existing organization and business model
Plan the development/adaptation of capabilities and the organizational transformation
Tools help CEOs or CIOs to Embrace digital transformation – Digitization, Mobility, Cloud,
Big Data, Social - by Analyzing organizational impact of digitally enabled change scenario
and by Providing insight to support the associated business and IT transformation.
Tools help CIOs and IT Leaders to develop control over the IT Assets and dependencies
–Business, Application, Data, Infra - to safely Analyze the impact of project changes, to
Enable IT rationalization and to Develop the business agility of the Information System.
Get a full insight into the Information System and the component IT Assets
Understand up- and downstream dependencies to analyze impact of change
Measure and guarantee alignment of IT Assets on Business Priorities
Support rationalization of IT capabilities and Technology standardization
Industry with strategic IT role
Risk of disruption by non traditional players
Complex customers’ interaction and operating model
Digital Transformation
Heterogeneous IT Assets
Various stakeholders – Vendors, Outsourcers, internal team
Multiplication of interfaces
IT Centric Challenges (1/3)
26
1
2
Quoted from MEGA
27. Mitigation of
IT Risk Exposure
Build and maintain a precise application inventory, with IT and Business stakeholders
Assess the portfolios vs numerous criteria such as cost, business, risk, technology
Identify improvements, rationalization opportunities and compare scenario
Develop the transparency of the IT investment Process based on reliable data
Tools help Head of Applications to manage a more and more complex Application Portfolio
– In House, Packaged Solutions, Shadow IT…-, to identify opportunities for freeing
investment capabilities and to make transparent IT investment decisions based on
indisputable data.
Tools help Head of IT Risks to manage and reduce the IT Risk Exposure of the
organization, by analyzing the business impacts of IT Risks and by implementing a sound
Risk Management Process for the IT Assets – from Identification to Mitigation.
Build the risk library, identify the IT Assets
Assess risks, consolidate risk exposure and analyze the impact on business
Implement and test preventive and corrective measures
Monitor and Report on IT Risk Exposure and Business IT Risk Exposure
Management of the
Application Portfolio
Criticality of IT to support operations
Multiplication of channels to access sensitive data
Opened and integrated information system
IT Centric Challenges (2/3)
27
3
4
Large number of applications
Investments limited due to growing maintenance cost
Delegated or decentralized ownership of applications
Quoted from MEGA
28. Manage business needs and keep track of corresponding IT requirements,
Streamline the design process by leveraging standards and industry best practices
Support IT Governance and enforce architecture standards throughout the IT Projects
Tools help IT Project Leader to turn business scenario into transparent traceable solution
requirements to ensure customer satisfaction. We help Solution Architect to blueprint
solutions relying on the existing Information System and complying with the Architecture
rules defined by IT Governance to protect the IT agility.
Solution Blueprint
IT Centric Challenges (3/3)
28
6
Complex solutions built over the time
Difficulties in tracking of business requirements impacts
Tumultuous Interactions User/IT Project team
Information Portfolio
Management
5
Understand context and nature of critical data and information sources in your organization
Get a clear view on data lineage, dependency of applications and business processes
Understand the end-to-end data flow and the potential risk to key data
Manage and consistently design information layers, from Business to conceptual to physical
Tools help Chief Data Officer to manage the portfolio of Information assets, to improve data
alignment through business dictionary and logical models, to control the lifecycle of key data
within the Business and IT processes and to identify potential risks.
Diversification of products, channels, customer segments…
Multiplication of sources of data
Master Data Management initiative
29. BUSINESS AND OPERATIONS
GRC Centric Challenges
29
IT AND DATA
GOVERNANCE, RISK AND COMPLIANCE CHALLENGES
ERM Process…
articulated with Business Lines
Compliance Management…
balanced with performance
3 lines of defense…
integrated and consistent
Internal Audit…
risk driven and streamlined
1 2
43
Quoted from MEGA
30. Tools help the Board to Implement and Guarantee a sound collaboration between the
Assurance Functions through a common platform that centralizes key Risk & Control Data,
supports consistent practices and consolidates reporting.
Silo effect among Risk, Compliance and Audit
Difficulties to build a consistent Risk reporting for the board
Duplication of information, inconsistency of practices
3 lines of defense …
integrated and consistent
GRC Challenges (1/2)
30
Facilitates risk mapping, assessment, and control
Support collaborative risk identification & assessment with Business Lines
Analyse business impact analysis of risk on the organization
Automate the consolidation and communication of exposure to risk
Tools help the Risk Management Department to Assess the organization’s exposure to
risk, Ensure that risks are controlled appropriately by all departments and sustainably
Include business lines as active stakeholders of the Enterprise Risk Management Process.
Multiple business lines
Sophisticated strategies
Complex organization
ERM Process …
articulated with Business Lines
Support collaborative workflow between Risk, Audit and Compliance
Centralize risk & control data in a common secured repository
Implement consistent practices to guarantee consistency of assessment
Ensure the relevance of reporting based on a single framework
31. Multiplication of regulation and policies
Frequent changes of business practices and regulations
Increasing cost of controls, decreasing business agility
Compliance Management…
balanced with Business Performance
GRC Challenges (2/2)
31
Build risk driven audit plan and optimize allocation of resources
Automate low-added value activities to increase audit capabilities
Monitor execution to optimize effectiveness
Follow-up on recommendation to guarantee improvement of business practices
Tools help the Internal Audit to Improve the quality of the Audit process by enabling to
Plan and Execute Risk Driven Audits, and to Increase the execution capabilities of the
department through automation of activities and monitoring.
Highly regulated environment
Multiplication and diversity of business practices
Limited Internal Audit resources
Internal Audit …
risk driven and streamlined
Tools help the Compliance Department to Manage the regulatory and policy
requirements of the company, Analyse their impact on the organization, Ensure a sound
communication of standard practices and Test their implementation.
Manage and maintain libraries of regulation, requirements and policies
Analyse the impact on the Business, Operations & IT
Collaboratively design and deploy practices balancing control and performance
Assess and Improve the compliance to standard practices
3
4
Quoted from MEGA
32. Agenda
1. Discuss what are EA Tools, what do they
feature and High Level Requisites
2. EA is all about Change and
Transformation
3. Business, IT and Their Strategy
4. Requisites of an EA suite
5. Challenges Tools focus
6. Recommandations and Strength and
Weakness of Tools
32
Users CMPCP
COP
CPs CP
One
Siebel
BTW
B2Bs
IVRs
BT.com
One
View Neo
DMP
CMPOR
Portal
OR B2B
OR
Siebel
COP
OR
Neo
SM(NT)P
OR
Neo
SM(NT)P
Neo
BTW as supplier to OR
SM PACS
B&PP
BTW
Geneva for OR
B&PP
Billing for RoBT
Geneva
RoBT
Openreach
BTWS
Siebel
NSI&DP
OR
BMS
BTWS/S
Dialogue Services
e.g. Appointing and
Address Matching (see
Matrix Capabilities slide
for Dialogue Services)
EIP RoBT MIS RoBT NAD
EIP OR MIS OR NAD
OR
IVRs
NSI&DP
Number Mgt
N.B
Example systems only
OR COP links to BTR SB
Gateway
GTC(I)
OR
GTC(S)
PEW
Mediation
LIMS(CDD
CDP)
NuNCAS V21
Piper
NCAD
TCP
DMT
NCAD
TCP
RAP
Process-Centric
Service-Oriented
Capability-Driven
33. Use tools for Assessment & Transformation
Easily deploy a best practice
portfolio management process
Take advantage of out-of-the
box reports and dashboard
Business alignement
Transformation Roadmap
Cost AnalysisTechnology standardization
End-to-end out-of-the-box process workflow
34. Gartner Recommends!
Business-outcome-driven EA is a practical approach to supporting EA
that starts and ends with a focus on delivering signature-ready
recommendations to business and IT leaders for adjusting policies
and projects to achieve target business outcomes, based on the
business direction that capitalizes on relevant business disruptions
(see "EA Practitioners Must Focus on Outcome-Oriented Deliverables," "Define
the Business Outcome Statement to Guide Enterprise Architecture Efforts" and
"Stage Planning a Business-Outcome-Driven Enterprise Architecture").
By putting business direction (strategy and operations),disruptions
(opportunities and risks) and outcomes first in developing EA
signature-ready guidance and actions, chief enterprise architects will
become empowered to drive enterprise change, deliver high-impact
value and lead the business forward in a competitive environment
(see "Enterprise Architecture Leaders Focus on Business Impact").
Quoted from MEGA