SlideShare a Scribd company logo
Summarised - 2010
   Applying Iteration to the ADM
   Applying the ADM at different Enterprise
    Levels
   ADM Cycle Approaches
Architecture Context iterations allow initial mobilization of architecture activity
by establishing the architecture approach, principles, scope, and vision.




            Architecture Definition iterations allow the creation of
            architecture content by cycling through Business, Information
            Systems, and Technology Architecture phases. These iterations
            also allow viability and feasibility tests to be carried out by looking
            at opportunities and migration planning.




                    Architecture Governance iterations support governance
                    of change activity progressing towards a defined Target
                    Architecture.




                    Transition Planning iterations support the creation of for
                    mal change roadmaps for a defined architecture
   Two process styles can be adopted within
    the ADM for the definition of architectures:
    ◦ Baseline First: In this style, an assessment of the baseline (i.e., current
      state) landscape is used to identify problem areas and improvement
      opportunities. This process is suitable when a target solution is not clearly
      understood and agreed upon.
    ◦ Target First: In this style, the target solution is elaborated in detail and
      then mapped back to the baseline, in order to identify change activity.
      This process is suitable when a target state is agreed at a high level and
      where the enterprise wishes to avoid proliferating current business
      practice into the target model.
The enterprise must be
partitioned into different
areas, each of which can
be supported by
architectures (Subject
Matter, Time Period and
Level of Detail)
Key Benefits
1. It is lightweight, as multiple architectures can
   be developed against a single Request for
   Work, project plan, etc.
2. It allows for very close integration of
   architectures at different levels in the
   organization.
3. It works well when all architectures are being
   developed by a single team.




Key Limitations
1. It does not explicitly set out governance and
   change management relationships between
   the different architectures.
2. It requires all architectures to be completed in
   sequence and potentially released at the
   same time. This may delay the release of
   strategic architectures or prevent specific
   Capability Architectures from being
   developed.
3. Similar architectural activities are repeated
   within a number of phases within the ADM. It
   may become difficult to distinguish the
   differences between different phases.
Key Benefits
1. It is comprehensive. All ADM activities are
   carried out at all levels.
2. It establishes explicit governance
   relationships between architectures.
3. It allows for federated development of
   architectures at different levels in the
   organization.




Key Limitations
1. It requires the establishment of an
   enterprise-wide governance hierarchy to be
   effective.
2. It does not work well when many
   architectures are being developed by the
   same team of architects.
   TOGAF Version 9, The Open Group
    Architecture Framework (TOGAF), 2009
If you have one last breath
use it to say...

More Related Content

What's hot

TOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open GroupTOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
Michael Sukachev
 
Togaf 9.1 basic concepts
Togaf 9.1 basic concepts Togaf 9.1 basic concepts
Togaf 9.1 basic concepts
Mohamed Zakarya Abdelgawad
 
TOGAF ADM cycle
TOGAF ADM cycleTOGAF ADM cycle
Togaf 9 an introduction
Togaf 9   an introductionTogaf 9   an introduction
Togaf 9 an introduction
Daan Bakboord
 
Togaf 9.2 Introduction
Togaf 9.2 IntroductionTogaf 9.2 Introduction
Togaf 9.2 Introduction
Mohamed Zakarya Abdelgawad
 
TOGAF 9 Methodology Ver1 0
TOGAF 9  Methodology Ver1 0TOGAF 9  Methodology Ver1 0
TOGAF 9 Methodology Ver1 0
Maganathin Veeraragaloo
 
Togaf notes
Togaf notesTogaf notes
Togaf notes
Mohammed Omar
 
TOGAF 9 Architectural Artifacts
TOGAF 9  Architectural ArtifactsTOGAF 9  Architectural Artifacts
TOGAF 9 Architectural Artifacts
Maganathin Veeraragaloo
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core concepts
Paul Sullivan
 
Overview of togaf
Overview of togafOverview of togaf
Overview of togaf
Kirk Keller
 
TOGAF 9.2 - the update
TOGAF 9.2 - the updateTOGAF 9.2 - the update
TOGAF 9.2 - the update
Danny Greefhorst
 
Togaf – an overview of enterprise architecture
Togaf – an overview of enterprise architectureTogaf – an overview of enterprise architecture
Togaf – an overview of enterprise architecture
Khawar Naseem
 
Enterprise system architecture togaf
Enterprise system architecture togafEnterprise system architecture togaf
Enterprise system architecture togaf
ines beltaief
 
Togaf 9 template architecture roadmap
Togaf 9 template   architecture roadmapTogaf 9 template   architecture roadmap
Togaf 9 template architecture roadmap
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Nathaniel Palmer
 
CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008
SOA Process
 
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Chandrashekhar More
 
TOGAF 9.2 - Transforming Business
TOGAF 9.2  -  Transforming BusinessTOGAF 9.2  -  Transforming Business
TOGAF 9.2 - Transforming Business
Real IRM
 
TOGAF Classroom Series - M1 intro-ea-togaf
TOGAF Classroom Series - M1 intro-ea-togafTOGAF Classroom Series - M1 intro-ea-togaf
TOGAF Classroom Series - M1 intro-ea-togaf
Cuneyt Kaya
 

What's hot (20)

TOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open GroupTOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
 
Togaf 9.1 basic concepts
Togaf 9.1 basic concepts Togaf 9.1 basic concepts
Togaf 9.1 basic concepts
 
TOGAF ADM cycle
TOGAF ADM cycleTOGAF ADM cycle
TOGAF ADM cycle
 
Togaf 9 an introduction
Togaf 9   an introductionTogaf 9   an introduction
Togaf 9 an introduction
 
Togaf 9.2 Introduction
Togaf 9.2 IntroductionTogaf 9.2 Introduction
Togaf 9.2 Introduction
 
TOGAF 9 Methodology Ver1 0
TOGAF 9  Methodology Ver1 0TOGAF 9  Methodology Ver1 0
TOGAF 9 Methodology Ver1 0
 
Togaf notes
Togaf notesTogaf notes
Togaf notes
 
TOGAF 9 Architectural Artifacts
TOGAF 9  Architectural ArtifactsTOGAF 9  Architectural Artifacts
TOGAF 9 Architectural Artifacts
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core concepts
 
Overview of togaf
Overview of togafOverview of togaf
Overview of togaf
 
TOGAF 9.2 - the update
TOGAF 9.2 - the updateTOGAF 9.2 - the update
TOGAF 9.2 - the update
 
TOGAF
TOGAFTOGAF
TOGAF
 
Togaf – an overview of enterprise architecture
Togaf – an overview of enterprise architectureTogaf – an overview of enterprise architecture
Togaf – an overview of enterprise architecture
 
Enterprise system architecture togaf
Enterprise system architecture togafEnterprise system architecture togaf
Enterprise system architecture togaf
 
Togaf 9 template architecture roadmap
Togaf 9 template   architecture roadmapTogaf 9 template   architecture roadmap
Togaf 9 template architecture roadmap
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)
 
CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008
 
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
 
TOGAF 9.2 - Transforming Business
TOGAF 9.2  -  Transforming BusinessTOGAF 9.2  -  Transforming Business
TOGAF 9.2 - Transforming Business
 
TOGAF Classroom Series - M1 intro-ea-togaf
TOGAF Classroom Series - M1 intro-ea-togafTOGAF Classroom Series - M1 intro-ea-togaf
TOGAF Classroom Series - M1 intro-ea-togaf
 

Viewers also liked

Togaf deliverables from TogafTraining.com
Togaf deliverables from TogafTraining.comTogaf deliverables from TogafTraining.com
Togaf deliverables from TogafTraining.com
Joost Bleijenberg
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1
Maganathin Veeraragaloo
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
Maganathin Veeraragaloo
 
Togaf 9 Capability Based Planning Ver1 0
Togaf 9   Capability Based Planning Ver1 0Togaf 9   Capability Based Planning Ver1 0
Togaf 9 Capability Based Planning Ver1 0
Maganathin Veeraragaloo
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
SABSAcourses
 
A Summary of TOGAF's Architecture Capability Framework
A Summary of TOGAF's Architecture Capability FrameworkA Summary of TOGAF's Architecture Capability Framework
A Summary of TOGAF's Architecture Capability Framework
Paul Sullivan
 
Archimate Meta Model
Archimate   Meta ModelArchimate   Meta Model
Archimate Meta Model
Maganathin Veeraragaloo
 
Ea Value And Benefits Ver1 0
Ea Value And Benefits Ver1 0Ea Value And Benefits Ver1 0
Ea Value And Benefits Ver1 0
Maganathin Veeraragaloo
 
Ea As Strategy Ver1 1
Ea As Strategy Ver1 1Ea As Strategy Ver1 1
Ea As Strategy Ver1 1
Maganathin Veeraragaloo
 
SABSA overview
SABSA overviewSABSA overview
SABSA overview
SABSAcourses
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Allen Baranov
 
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Akshay Anand
 
Six Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandSix Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay Anand
Akshay Anand
 

Viewers also liked (20)

Togaf deliverables from TogafTraining.com
Togaf deliverables from TogafTraining.comTogaf deliverables from TogafTraining.com
Togaf deliverables from TogafTraining.com
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
 
Criteria For EA Tool Selection
Criteria For EA Tool SelectionCriteria For EA Tool Selection
Criteria For EA Tool Selection
 
Togaf 9 Capability Based Planning Ver1 0
Togaf 9   Capability Based Planning Ver1 0Togaf 9   Capability Based Planning Ver1 0
Togaf 9 Capability Based Planning Ver1 0
 
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0
 
SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
A Summary of TOGAF's Architecture Capability Framework
A Summary of TOGAF's Architecture Capability FrameworkA Summary of TOGAF's Architecture Capability Framework
A Summary of TOGAF's Architecture Capability Framework
 
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0
 
Archimate Meta Model
Archimate   Meta ModelArchimate   Meta Model
Archimate Meta Model
 
Ea Value And Benefits Ver1 0
Ea Value And Benefits Ver1 0Ea Value And Benefits Ver1 0
Ea Value And Benefits Ver1 0
 
Ea As Strategy Ver1 1
Ea As Strategy Ver1 1Ea As Strategy Ver1 1
Ea As Strategy Ver1 1
 
SABSA overview
SABSA overviewSABSA overview
SABSA overview
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
 
Six Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandSix Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay Anand
 

Similar to TOGAF 9 Guidelinesand Techniques Ver1 0

White paper tailoring togaf for SAFe delivery v1.0
White paper   tailoring togaf for SAFe delivery v1.0White paper   tailoring togaf for SAFe delivery v1.0
White paper tailoring togaf for SAFe delivery v1.0
Dinesh Panwar
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
ijwscjournal
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
ijwscjournal
 
Unit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycleUnit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycle
Dhivyaa C.R
 
Enterprise Architecture for BPR
Enterprise Architecture for BPREnterprise Architecture for BPR
Enterprise Architecture for BPRRichard Freggi
 
The Role of the Enterprise Architect in Business Process Reengineering
The Role of the Enterprise Architect in Business Process ReengineeringThe Role of the Enterprise Architect in Business Process Reengineering
The Role of the Enterprise Architect in Business Process Reengineering
Richard Freggi
 
Tesco Architecture Excellence Award Application
Tesco Architecture Excellence Award ApplicationTesco Architecture Excellence Award Application
Tesco Architecture Excellence Award Application
Sukumar Daniel
 
Enterprise Architecture Approach Togaf 9
Enterprise Architecture Approach   Togaf 9Enterprise Architecture Approach   Togaf 9
Enterprise Architecture Approach Togaf 9Prashant Patade
 
Executive Overview Using Soa To Improve Operational Efficiency
Executive Overview Using Soa To Improve Operational EfficiencyExecutive Overview Using Soa To Improve Operational Efficiency
Executive Overview Using Soa To Improve Operational Efficiency
sean.mcclowry
 
Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!
Sam Mandebvu
 
Discussion Post 1A software process model is a streamlined port.docx
Discussion Post 1A software process model is a streamlined port.docxDiscussion Post 1A software process model is a streamlined port.docx
Discussion Post 1A software process model is a streamlined port.docx
madlynplamondon
 
Dynamic System Development
Dynamic System DevelopmentDynamic System Development
Dynamic System Development
Zeeshan Tariq
 
Stepping-stones of enterprise-architecture: Process and practice in the real...
Stepping-stones of enterprise-architecture: Process and practice in the real...Stepping-stones of enterprise-architecture: Process and practice in the real...
Stepping-stones of enterprise-architecture: Process and practice in the real...
Tetradian Consulting
 
A Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project ManagementA Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project Management
April Smith
 
Presenting a method_for_benchmarking
Presenting a method_for_benchmarkingPresenting a method_for_benchmarking
Presenting a method_for_benchmarkingbambangpadhi
 
Enterprise Architecture & Solution Architecture- Traverse the Gap
Enterprise Architecture & Solution Architecture- Traverse the GapEnterprise Architecture & Solution Architecture- Traverse the Gap
Enterprise Architecture & Solution Architecture- Traverse the Gap
Smartinfologiks
 
Pm chapter 4
Pm chapter 4Pm chapter 4
Pm chapter 4
Golam Bitonsir
 
Service oriented configuration management of ‎software ‎architecture
Service oriented configuration management of ‎software ‎architectureService oriented configuration management of ‎software ‎architecture
Service oriented configuration management of ‎software ‎architecture
IJNSA Journal
 
SERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURE
SERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURESERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURE
SERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURE
IJNSA Journal
 

Similar to TOGAF 9 Guidelinesand Techniques Ver1 0 (20)

White paper tailoring togaf for SAFe delivery v1.0
White paper   tailoring togaf for SAFe delivery v1.0White paper   tailoring togaf for SAFe delivery v1.0
White paper tailoring togaf for SAFe delivery v1.0
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
 
Unit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycleUnit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycle
 
Enterprise Architecture for BPR
Enterprise Architecture for BPREnterprise Architecture for BPR
Enterprise Architecture for BPR
 
The Role of the Enterprise Architect in Business Process Reengineering
The Role of the Enterprise Architect in Business Process ReengineeringThe Role of the Enterprise Architect in Business Process Reengineering
The Role of the Enterprise Architect in Business Process Reengineering
 
Tesco Architecture Excellence Award Application
Tesco Architecture Excellence Award ApplicationTesco Architecture Excellence Award Application
Tesco Architecture Excellence Award Application
 
Enterprise Architecture Approach Togaf 9
Enterprise Architecture Approach   Togaf 9Enterprise Architecture Approach   Togaf 9
Enterprise Architecture Approach Togaf 9
 
Executive Overview Using Soa To Improve Operational Efficiency
Executive Overview Using Soa To Improve Operational EfficiencyExecutive Overview Using Soa To Improve Operational Efficiency
Executive Overview Using Soa To Improve Operational Efficiency
 
Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!Learn Togaf 9.1 in 100 slides!
Learn Togaf 9.1 in 100 slides!
 
Agile It 20091020
Agile It 20091020Agile It 20091020
Agile It 20091020
 
Discussion Post 1A software process model is a streamlined port.docx
Discussion Post 1A software process model is a streamlined port.docxDiscussion Post 1A software process model is a streamlined port.docx
Discussion Post 1A software process model is a streamlined port.docx
 
Dynamic System Development
Dynamic System DevelopmentDynamic System Development
Dynamic System Development
 
Stepping-stones of enterprise-architecture: Process and practice in the real...
Stepping-stones of enterprise-architecture: Process and practice in the real...Stepping-stones of enterprise-architecture: Process and practice in the real...
Stepping-stones of enterprise-architecture: Process and practice in the real...
 
A Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project ManagementA Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project Management
 
Presenting a method_for_benchmarking
Presenting a method_for_benchmarkingPresenting a method_for_benchmarking
Presenting a method_for_benchmarking
 
Enterprise Architecture & Solution Architecture- Traverse the Gap
Enterprise Architecture & Solution Architecture- Traverse the GapEnterprise Architecture & Solution Architecture- Traverse the Gap
Enterprise Architecture & Solution Architecture- Traverse the Gap
 
Pm chapter 4
Pm chapter 4Pm chapter 4
Pm chapter 4
 
Service oriented configuration management of ‎software ‎architecture
Service oriented configuration management of ‎software ‎architectureService oriented configuration management of ‎software ‎architecture
Service oriented configuration management of ‎software ‎architecture
 
SERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURE
SERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURESERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURE
SERVICE ORIENTED CONFIGURATION MANAGEMENT OF SOFTWARE ARCHITECTURE
 

More from Maganathin Veeraragaloo

MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
Maganathin Veeraragaloo
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
Maganathin Veeraragaloo
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
Maganathin Veeraragaloo
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
 
BTABOK / ITABOK
BTABOK / ITABOKBTABOK / ITABOK
BTABOK / ITABOK
Maganathin Veeraragaloo
 
Observability
ObservabilityObservability
Foresight 4 Cybersecurity
Foresight 4 CybersecurityForesight 4 Cybersecurity
Foresight 4 Cybersecurity
Maganathin Veeraragaloo
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
Maganathin Veeraragaloo
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
ISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust FrameworkISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust Framework
Maganathin Veeraragaloo
 
ITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORKITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Open Digital Framework from TMFORUM
Open Digital Framework from TMFORUMOpen Digital Framework from TMFORUM
Open Digital Framework from TMFORUM
Maganathin Veeraragaloo
 
Enterprise security architecture approach
Enterprise security architecture approachEnterprise security architecture approach
Enterprise security architecture approach
Maganathin Veeraragaloo
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
Maganathin Veeraragaloo
 
XaaS Overview
XaaS OverviewXaaS Overview
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
Maganathin Veeraragaloo
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
Maganathin Veeraragaloo
 

More from Maganathin Veeraragaloo (20)

MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
BTABOK / ITABOK
BTABOK / ITABOKBTABOK / ITABOK
BTABOK / ITABOK
 
Observability
ObservabilityObservability
Observability
 
Foresight 4 Cybersecurity
Foresight 4 CybersecurityForesight 4 Cybersecurity
Foresight 4 Cybersecurity
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
ISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust FrameworkISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust Framework
 
ITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORKITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORK
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
 
Open Digital Framework from TMFORUM
Open Digital Framework from TMFORUMOpen Digital Framework from TMFORUM
Open Digital Framework from TMFORUM
 
Enterprise security architecture approach
Enterprise security architecture approachEnterprise security architecture approach
Enterprise security architecture approach
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
XaaS Overview
XaaS OverviewXaaS Overview
XaaS Overview
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 

TOGAF 9 Guidelinesand Techniques Ver1 0

  • 2. Applying Iteration to the ADM  Applying the ADM at different Enterprise Levels  ADM Cycle Approaches
  • 3.
  • 4. Architecture Context iterations allow initial mobilization of architecture activity by establishing the architecture approach, principles, scope, and vision. Architecture Definition iterations allow the creation of architecture content by cycling through Business, Information Systems, and Technology Architecture phases. These iterations also allow viability and feasibility tests to be carried out by looking at opportunities and migration planning. Architecture Governance iterations support governance of change activity progressing towards a defined Target Architecture. Transition Planning iterations support the creation of for mal change roadmaps for a defined architecture
  • 5. Two process styles can be adopted within the ADM for the definition of architectures: ◦ Baseline First: In this style, an assessment of the baseline (i.e., current state) landscape is used to identify problem areas and improvement opportunities. This process is suitable when a target solution is not clearly understood and agreed upon. ◦ Target First: In this style, the target solution is elaborated in detail and then mapped back to the baseline, in order to identify change activity. This process is suitable when a target state is agreed at a high level and where the enterprise wishes to avoid proliferating current business practice into the target model.
  • 6.
  • 7.
  • 8.
  • 9. The enterprise must be partitioned into different areas, each of which can be supported by architectures (Subject Matter, Time Period and Level of Detail)
  • 10.
  • 11.
  • 12. Key Benefits 1. It is lightweight, as multiple architectures can be developed against a single Request for Work, project plan, etc. 2. It allows for very close integration of architectures at different levels in the organization. 3. It works well when all architectures are being developed by a single team. Key Limitations 1. It does not explicitly set out governance and change management relationships between the different architectures. 2. It requires all architectures to be completed in sequence and potentially released at the same time. This may delay the release of strategic architectures or prevent specific Capability Architectures from being developed. 3. Similar architectural activities are repeated within a number of phases within the ADM. It may become difficult to distinguish the differences between different phases.
  • 13. Key Benefits 1. It is comprehensive. All ADM activities are carried out at all levels. 2. It establishes explicit governance relationships between architectures. 3. It allows for federated development of architectures at different levels in the organization. Key Limitations 1. It requires the establishment of an enterprise-wide governance hierarchy to be effective. 2. It does not work well when many architectures are being developed by the same team of architects.
  • 14. TOGAF Version 9, The Open Group Architecture Framework (TOGAF), 2009
  • 15. If you have one last breath use it to say...