Research project oriented at improving the process of translation of Business Requirements into Enterprise Architecture at the Schiphol Airport, Amsterdam.
Business Intelligence Dashboard Design Best PracticesMark Ginnebaugh
Microsoft BI expert Dan Bulos spoke on Dashboard Design Best Practices to the Bay Area Microsoft Business Intelligence User Group.
This presentation shows techniques for displaying data in a dashboard for maximum impact. Dan also discusses various tools available in the Microsoft BI stack – Reporting Services, Excel, PerformancePoint and the new entry, Power View.
This is a presentation I gave at the October 2007 Enterprise Architectures Conference. The presentation covers approache sto developing multi-year roadmaps for implementing business strategy.
IBM Cognos - Hälsokontroll på ekonomiavdelningen med mål att bli värdeskapareIBM Sverige
Som en en spinoff från IBM's CFO survey 2010, ger vi dig möjligheten att staka ut vägen hur du skall bli bättre än dina konkurrenter. Denna presentation hölls på IBM Cognos Performance 2010 av Jonas Berg, Sr Managing Consultant, Business Analytics & Optimization, IBM
Business Intelligence Dashboard Design Best PracticesMark Ginnebaugh
Microsoft BI expert Dan Bulos spoke on Dashboard Design Best Practices to the Bay Area Microsoft Business Intelligence User Group.
This presentation shows techniques for displaying data in a dashboard for maximum impact. Dan also discusses various tools available in the Microsoft BI stack – Reporting Services, Excel, PerformancePoint and the new entry, Power View.
This is a presentation I gave at the October 2007 Enterprise Architectures Conference. The presentation covers approache sto developing multi-year roadmaps for implementing business strategy.
IBM Cognos - Hälsokontroll på ekonomiavdelningen med mål att bli värdeskapareIBM Sverige
Som en en spinoff från IBM's CFO survey 2010, ger vi dig möjligheten att staka ut vägen hur du skall bli bättre än dina konkurrenter. Denna presentation hölls på IBM Cognos Performance 2010 av Jonas Berg, Sr Managing Consultant, Business Analytics & Optimization, IBM
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Alan McSweeney
Performance-Based Services Contracting (PBSC) is concerned with the structured of the results and measurable outcomes to be achieved rather than the manner by which the work is to be performed.
Performance-Based Services Contracting approach is about defining what the required results of a service will rather than how the contractor will perform the tasks.
Business Improvement initiatives are getting a lot of press these days: “..our projects saved over $10M in the first 12 months of deployment using BPM” . It seems logical for an organization to jump onto the process improvement bandwagon. Much is promised of business improvement efforts, and there are many capable consultants and companies willing to support a company’s BPM deployment that can last months to years. But how does an organization know that the business improvement efforts will really result in a quantifiable benefit to the business? Process improvement initiatives are not inexpensive to start or sustain over many years, and most executives require the clear identification of benefits to justify the expenditure of training resources and driving project work before approving a long-term initiative.
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Alan McSweeney
Performance-Based Services Contracting (PBSC) is concerned with the structured of the results and measurable outcomes to be achieved rather than the manner by which the work is to be performed.
Performance-Based Services Contracting approach is about defining what the required results of a service will rather than how the contractor will perform the tasks.
Business Improvement initiatives are getting a lot of press these days: “..our projects saved over $10M in the first 12 months of deployment using BPM” . It seems logical for an organization to jump onto the process improvement bandwagon. Much is promised of business improvement efforts, and there are many capable consultants and companies willing to support a company’s BPM deployment that can last months to years. But how does an organization know that the business improvement efforts will really result in a quantifiable benefit to the business? Process improvement initiatives are not inexpensive to start or sustain over many years, and most executives require the clear identification of benefits to justify the expenditure of training resources and driving project work before approving a long-term initiative.
Spiders, Are they scare you? Or do you scare them?
Actually It doesn't matter because Some spiders scare you and you scared some spider. The only difference is The venomous and power of it. Here we are going to share top 5 most venomous spiders in the word that often scared us if not kill!
Yeah, These spiders can easily kill human and domestic animals by injection venom to animal body.
At SITA we do have a range of surveys and insight papers
Together with ACI, we do surveys with Senior IT executives at airport and airlines.
For the airport survey, questionnaires were sent in Q2 2015 to senior IT executives working in the top 100 airports across the world.
Some of the people in the audience might have even been involved in those surveys…
The Case For Change: Rethinking Library Services, Staffing, and Spacesbrightspot
Keynote session from Rethink it: Libraries for a New Age that makes the case for change in library services, spaces, and organizations. Drawing on stories of transformation from beyond the library world, provides insights on shifts in purpose, offerings, and user and staff experiences. Then uses library case studies from brightspot's work to explain tactics for achieving these big ideas, covering topics such as user research, visioning, partnerships, prototyping, and assessment. Finally, provides tools and tips to start working in new ways to transform your library.
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
Gartner TOP 10 Strategic Technology Trends_2017
http://denreymer.com
Artificial Intelligence and Advanced Machine Learning
Intelligent Apps
Intelligent Things
Virtual Reality and Augmented Reality
Digital Twins
Blockchains and Distributed Ledgers
Conversational Systems
Digital Technology Platforms
Mesh App and Service Architecture
Adaptive Security Architecture
During last few years, role of Enterprise Architecture has expanded from technical to strategic in an Organization. This slide deck presents: Using Enterprise Architecture in your Organization.
Executive Overview Using Soa To Improve Operational Efficiencysean.mcclowry
Overview on how services oriented architectures can be applied to improve operational efficiency. Introduced in the context of the MIKE2.0 Methodology.
This document explains the Balanced Scorecard business framework and how to use it as a strategic management system. It includes instructional slides explaining the methodology, in addition to examples and slide templates. Topics include the Four Processes, Four Perspectives, Personal Scorecard, and Strategic Learning.
More details and full download here:
http://pptlab.com/ppt/HBR-Using-the-Balanced-Scorecard-as-a-Strategic-Management-System-19
Enterprise Architecture .vs. Collection of Architectures in EnterpriseYan Zhao
Enterprise Architecture (EA) is becoming popular in most private enterprises these days due to the practical needs in this era of IT, after its noticeable fading in public sectors. At this stage, the lessons learned from public sectors could be very helpful to the EA adoption in both public and private sectors in moving forward.
We noticed that there is still no unified answer regarding to what is EA and what should be in it. It is not rare to see that so called “EA” is to use an EA tool and/or an EA repository to collect all type of “architecture” artifacts inside enterprise. These “architecture” artifacts are developed in different timeframes, cover different level of content details, and are created from different perspectives for different purpose. While a real EA should consist of “architecture” artifacts in concert by planning ahead with a designated purpose for each view. The level of details is good enough to convey intent and to serve the purpose, no more and no less.
This presentation will discuss the differences between enterprise architecture and a collection of architectures in enterprise. It’ll help to clarify the focus in each phase and stage of EA development (e.g. in TOGAF) to ensure successful EA adoptions in solutions, initiatives, programs, and projects.
153
مبادرة
#تواصل_تطوير
المحاضرة ال 153 من المبادرة
المهندس / محمد زكريا
أخصائي البنية المؤسسية والاستراتيجية الرقمي
بعنوان
"مقدمة عن البنية المؤسسية"
وذلك يوم الإثنين 21مارس 2022
الثامنة مساء توقيت القاهرة
التاسعة مساء توقيت مكة المكرمة
و الحضور عبر تطبيق زووم من خلال الرابط
https://us02web.zoom.us/meeting/register/tZIqcu-spjoiH902NOccdtAoNJnGQ35joBnv
علما ان هناك بث مباشر للمحاضرة على القنوات الخاصة بجمعية المهندسين المصريين
ونأمل أن نوفق في تقديم ما ينفع المهندس ومهمة الهندسة في عالمنا العربي
والله الموفق
للتواصل مع إدارة المبادرة عبر قناة التليجرام
https://t.me/EEAKSA
ومتابعة المبادرة والبث المباشر عبر نوافذنا المختلفة
رابط اللينكدان والمكتبة الالكترونية
https://www.linkedin.com/company/eeaksa-egyptian-engineers-association/
رابط قناة التويتر
https://twitter.com/eeaksa
رابط قناة الفيسبوك
https://www.facebook.com/EEAKSA
رابط قناة اليوتيوب
https://www.youtube.com/user/EEAchannal
رابط التسجيل العام للمحاضرات
https://forms.gle/vVmw7L187tiATRPw9
ملحوظة : توجد شهادات حضور مجانية لمن يسجل فى رابط التقيم اخر المحاضرة.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Petra Wouter van Bartosz
Gárdai der Loop Wojenka
Special thanks to our supervisors:
Patrick van der Linden
IT Architect at Schiphol Group
Prof. Tom van Engers
Lecturer of Information Science at the University of Amsterdam
Drs. Toon Abcouwer
Lecturer of Information Science at the University of Amsterdam
2
3. Introduction to our approach
Problem statement
Research question
Scope
Direction of the study
Analyzed methodologies
The proposed process
Conclusions
Q&A
3
4. Problem statement
Schiphol Airport wants to introduce Enterprise Architecture within
their baggage handling system. They needed a general guide on
how to translate business requirements into applications.
As the task and limited clearance to access detailed information
about the Airports luggage system, the direction we’ve taken is
abstract, and the result will probably be applicable to many other
luggage handling scenarios.
4
5. We have decided that the question we will be answering during this
project is as follows:
„Literature review research on generating requirements for Enterprise
Architecture in luggage handling scenarios.”
5
6. Initial research scope was broader, but needed to be downsized of
scheduling purposes
Identification of the main business modeling standards and languages
Take into consideration what Schiphol BH already uses
Problems with acquiring sufficient knowledge on DYA
6
7. 1. Introduction to business aspects
2. Analysis of available languages / business modeling standards
3. Establish EA definitions used in scientific literature
4. Analysis of available EA frameworks
5. Case study analysis
6. Proposed processes
7. Final remarks
7
8. • “the fundamental conception of a system [the enterprise] in its
environment embodied in its elements, their relationships to each other
and to its environment, and the principles guiding its design and
evolution (ISO, 2007).”
enterprise architecture is a formal description of a system, or a detailed plan of the
system at component level to guide its implementation.
enterprise architecture is the structure of components, their inter-relationships, and
the principles and guidelines governing their design and evolution over time
(The Open Group, 2011)
8
9. • Framework types:
Generic EAF
Specific EAF
Classic EAF
Federated EAF
• Comparing Frameworks:
Difficult, like apples and pears
Interviews
Based on goals, input and output
9
10. • Framework types:
Generic EAF
Specific EAF
Classic EAF
Federated EAF
• Comparing Frameworks: • Final remark:
Difficult, like apples and Organizations don’t use one
pears standard. They take what
Interviews they need from different
Based on goals, input and frameworks and build their
output own
10
11. • Zachman
The strength of the Zachman framework is that it provides a way to
structure and model an enterprise or systems architecture
• TOGAF
Provide a framework for design, evaluation and building of
architectures for enterprises
• DYA
Working with Enterprise Architecture
11
12. Formulated explicit business Build requirements based on Choose the viewpoints and
strategy Adjust to your chosen
the Goals and illustrate any analyse resulting
Enterprise Architecture
constraints and principles metamodels for Business-IT
Framework
that limit them. Alignment
Compile a set of Goals which Completed Framework of
Illustrate additional drivers Verify with Stakeholders
are driving the strategy Enterprise Architecture
and assessments behind the
motivation
12
13. • Previously written Strategy documents
• Previously undertaken analysis
Porters 5 forces
SWOT
Others
• Managment activities
Programme Management
Project Management
Compile a set of Goals which are
driving the strategy
13
14. Usually long-term.
Goal is an end-state that a stakeholder needs to achieve.
Both i* and KAOS can be used, but ArchiMate 2.0
Business Motivation Modelling works just fine.
Formulated explicit business Build requirements based on the Goals and illustrate any
strategy constraints and principles that limit them .
14
15. • Requirements are a list of things needed to be achieved before the
Enterprise Architecture/Organization can reach the previously
derived Goals.
Here we also tackle two different aspects of Requirements Engineering:
Restrictions, which is what doesn’t allow us to pursue the
requirements.
Principles, which are normative properties which have to be taken
into consideration.
Compile a set of Goals which are Illustrate additional drivers and assessments
driving the strategy behind the motivation
15
16. In order to boost the understanding of the context in which the
Enterprise Architecture will be functioning, two additional elements
will be described:
Drivers, are something that influences the EA/Organization.
Assessments, are outcomes of analyses of the Drivers.
Build requirements based on the Goals and illustrate any Choose the viewpoints and analyse resulting
constraints and principles that limit them . metamodels for Business-IT Alignment
16
17. Goal
Stakeholder
realization
viewpoint
viewpoint
Goal
Principles
contribution
viewpoint
viewpoint
Requirements
Motivation
realization
viewpoint;
viewpoint
Illustrate additional drivers and assessments
Verify with Stakeholders
behind the motivation
17
18. To fully understand if the metamodels satisfy the needs of the
Stakeholders during this step we describe who and what are the
relations between them and the elements of our motivation
framework.
Choose the viewpoints and analyse resulting Adjust to your chosen Enterprise
metamodels for Business-IT Alignment Architecture Framework
18
19. • Based on case study analysis we concluded that ArchiMate 2 was an
appropriate modeling tool for generating EAF.
• The general frames of TOGAF and DYA were used to build the proposed
Enterprise Architecture framework
Completed Framework of
Verify with Stakeholders
Enterprise Architecture
19
20. (The Open Group, 2012)
(Smeets 2009)
Adjust to your chosen Enterprise
Architecture Framework
20
22. 2013
Master of Science Information Science
Business Information Systems
Integrated Cases
22
23. The Open Group, 2012. ArchiMate 2.0 Framework. [Online]
Available at: http://pubs.opengroup.org/architecture/archimate2-doc/
[Accessed 17 1 2013].
Smeets, M., 2009. Introducing enterprise architecture at TNT
post, Master thesis, Delft University of Technology, Delft
The Open Group. (2011). TOGAF Version 9.1 - TOGAF Series. Van Haren
Publishing.
23