SlideShare a Scribd company logo
kresimir.barbarosa@saliunca.com
+386 51 209 194
DO	NOT	LET	IT	CONTROL	YOU
TREATransparent Enterprise Architecture
Information technology solutions
are not merely black boxes frozen
in space and time but belong to an
ever-expansive and increasingly
interconnected environment, with
systems working in unison for
delivery of business services
wherever and whenever they are
needed. Their scope and
complexity grows in time and this
occurs on several levels: system,
software, hardware, and network;
each one of them undergo
changes that influence the entire
environment. Efficiently managing
and leveraging such an
environment at all times becomes
a great challenge, one that takes
up much of IT personnel
timesheet.
• system
• software
• hardware
• network
Manegement frameworki
Complexity occurs on several levels
Introduction
DO	NOT	LET	IT	CONTROL	YOU
• Which technologies from different vendors
are in use by our solutions?
• How many applications are in use and how
do they interface with each other and
users?
• Which systems are hosted where? Are they
physical or virtual?
• Are we taking advantage of our resources
optimally? Are there any bottlenecks?
• Is there unnecessary duplication of
functions?
• Who is administering particular systems
and how?
Management platformi
The absence of a complete picture
arises many questions:
Occupied by numerous tasks, IT staff
is unable to fully serve the business
user with fresh, innovative approaches
that drive the company’s further
development. This puts considerable
pressure on IT both internal and
external, which results in inefficient
use of resources and delays in
achieving business goals. Superfluous
tasks like manual management of
systems grow increasingly harder for
they are prone to human error,
perhaps even dependent on key
individuals involved and their obscure
knowledge of the environment. The
absence of a complete picture of the
situation across the environment
hampers overall agility as numerous
questions arise.
The problem
DO	NOT	LET	IT	CONTROL	YOU
• Are our systems up-to-date and
protected against known threats?
• Are our systems’ current
deployments documented and still
supported by the vendor?
• Is our licensing current, the capacity
compliant and aligned with business
needs?
• Where in their lifecycles are our
systems at this time, are support and
spare parts still available?
Management platformi
Non-technical benefits:
There are several levels of integration among
systems that have long ceased being
isolated siloes and as such depend on each
other in delivery of business services. In case
any of them become compromised, so do
the solutions built on top of them.
Furthermore, every solution has a lifecycle of
its own that necessitates keeping proper
documentation so planning, maintenance
and management can all be tackled at an
appropriate time. Architectural model of the
environment is not intended to replace
systems’ documentation that contains key
data on a particular system, but to tie them
all together on a larger scale, and describe
their place within the environment. Besides
technical benefits it also provides much
insight into software licensing, deployed
components and their compliance,
communication security and the ability to
discover opportunities for infrastructure
optimisation.
The ecosystem
DO	NOT	LET	IT	CONTROL	YOU
• Do we have reliable backups of our
data?
• Are our systems safe and secure, are
there any potential weak points?
• Where are potential single points of
failure and how do they affect key
systems availability?
Management platformi
Data protection issues:
Mission-critical systems’ availability
is always limited by their weakest
link, which in case of deep
integrations can be any one in a
host of components. Review,
identification and remediation of
potential issues ensures appropriate
actions can be taken before a
possible crisis may occur. Knowing
answers to data protection issues
such as those outlined on the right
can be a crucial difference between
having a resilient or a vulnerable
environment in time of need.
Business continuity
DO	NOT	LET	IT	CONTROL	YOU
By utilizing a single all-encompassing
architectural model of the
environment, the company is able to
regain control over the entirety of
included IT assets wherever they are
and however they happen to be
delivered, whereas the possible level
of detail inclusion is virtually unlimited
and open to growth in time. A unified
model of the entire environment
provides a visual, segmented situation
on four different levels.
• Technology (infrastructure and
systems)
• Application (components and
interfaces)
• Business (processes and roles)
• Relational (relationships among
artifacts)
Management platformi
4 levels of unified model of the
entire environment:
The solution
DO	NOT	LET	IT	CONTROL	YOU
Having awareness of the current
situation throughout the
environment establishes a
baseline starting point from which
the company is able to align IT
assets with business requirements
in a strategic manner. On this basis
the whole organization becomes
nimbler and capable of focusing
on further development instead of
crisis management, which
ultimately leads down the path of
gaining a real competitive edge
over others.
1.MODEL
2.OPTIMIZE
3.GROW
Management platform
The roadmap to this solution
lies in the following three
steps below:
i
DO	NOT	LET	IT	CONTROL	YOU
Modeling the environment is the first
step which involves information
gathering on the entire infrastructure
inventory starting with hardware,
networking and zones, software
systems and their components,
applications and their interfaces, and
various user types. All of these represent
inputs for appropriate Archimate®
standard artifacts that form relationships
tying them all together, accompanied by
important metadata such as software
maintenance levels, system
administrators, network addresses,
dates, makes and models etc. This
process involves assets in both on-
premise and cloud infrastructures.
Complete architectural
model representing the
entirety of the organization's
IT assets, allowing for a
thorough understanding of
the environment and
providing answers to the
questions outlined above.
Management platformi
End result of this step:
STEP 1: MODEL
DO	NOT	LET	IT	CONTROL	YOU
The second step is to leverage the model in order
to discover relevant interdependencies between
particular artifacts, which can be displayed
visually up to eight layers deep. All integration
points between systems can thus be evaluated
for bottlenecks, security issues, possible role
duplication and whether mission-critical systems
are in fact highly available on all required levels
throughout their stacks. The model also provides
insight into actual deployment of systems aiding
in evaluation of their licensing, lifecycle and
requirements compliance. It has become
increasingly difficult for larger environments to
keep track of all their assets, and efficiently scale
them alongside changing business needs,
however using the architectural model it becomes
possible to do so from a single point, regardless if
the assets in question are on-premise systems,
SaaS or any other subscription models.
Keep track of all
environment’s assets
and efficiently scale
them alongside
changing business
needs - however using
the architectural model
it becomes possible to
do so from a single
point.
Management platformi
End result of this step:
STEP 2: OPTIMIZE
DO	NOT	LET	IT	CONTROL	YOU
With current systems hardened and
optimized, the organization can leverage the
architectural model in subsequent
implementations, modernizations and
migrations in the future. Once the model has
been established, inputting regular updates
becomes easy and transparent. An additional
benefit alongside the completely mapping of
environment is the fact that the model itself
supports further inclusion of business
processes, associated business artifacts,
actors’ motivations, interactions, and a host
of other object types, thereby offering an
additional level of insight into relationships
and interdependencies on an even higher
level that ultimately allows for the
optimization of business processes
themselves.
Scalability and
transparency of
architectural model in
subsequent
implementations,
modernisations and
migrations.
Management platformi
End result of this step:
STEP 3: GROW
DO	NOT	LET	IT	CONTROL	YOU
i
EXAMPLE
DO	NOT	LET	IT	CONTROL	YOU
Picture 1: A sample of the
complete model view which
includes (from bottom up):
networks, physical devices,
database and configuration
repositories, system
software components,
nodes, applications,
application interfaces, users,
and their relationships.
DO	NOT	LET	IT	CONTROL	YOU
Picture 2: A sample of various pieces of metadata belonging to an artifact, in this case
a UPS device; demonstration values include: make and model, date of
implementation, network address, serial number, and full name of the system
administrator
DO	NOT	LET	IT	CONTROL	YOU
Picture 3: A sample of visual representation of dependencies based on a randomly selected
artifact, in this case the view is shown four levels deep; such views provide visual discovery of
interdependence between integrated systems, infrastructure and users.
DO	NOT	LET	IT	CONTROL	YOU
Picture 4: A sample of an export of the model with its complete set of data accessible using a web
browser; such exports are to be generated each time a change is made.
DO	NOT	LET	IT	CONTROL	YOU

More Related Content

What's hot

Building an Information System
Building an Information SystemBuilding an Information System
Building an Information System
Jo Balucanag - Bitonio
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9Ian Sommerville
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Info-Tech Research Group
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
guestc1bca2
 
Iannicello "Planning: Engaging with Management and IT"
Iannicello "Planning: Engaging with Management and IT"Iannicello "Planning: Engaging with Management and IT"
Iannicello "Planning: Engaging with Management and IT"
National Information Standards Organization (NISO)
 
Management Information System - Building Systems
Management Information System - Building SystemsManagement Information System - Building Systems
Management Information System - Building Systems
Ayush Man Tamrakar
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User Computing
James Charter
 
End User Computing (EUC)
End User Computing (EUC)End User Computing (EUC)
End User Computing (EUC)
Jashisha Gupta
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
sommerville-videos
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
Luis Felipe Tabares Pérez
 
Software architecture Unit 1 notes
Software architecture Unit 1 notesSoftware architecture Unit 1 notes
Software architecture Unit 1 notesSudarshan Dhondaley
 
Improving BPM Time To Value
Improving BPM Time To ValueImproving BPM Time To Value
Improving BPM Time To Value
Sandy Kemsley
 
Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization  Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization
Ivano Malavolta
 
System Engineering Unit-1
System Engineering Unit-1System Engineering Unit-1
System Engineering Unit-1
Dr. Shailendra Singh Thakur
 
Ch 6
Ch 6Ch 6
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
JoeFaghani
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
cscpconf
 

What's hot (20)

Building an Information System
Building an Information SystemBuilding an Information System
Building an Information System
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
Iannicello "Planning: Engaging with Management and IT"
Iannicello "Planning: Engaging with Management and IT"Iannicello "Planning: Engaging with Management and IT"
Iannicello "Planning: Engaging with Management and IT"
 
Management Information System - Building Systems
Management Information System - Building SystemsManagement Information System - Building Systems
Management Information System - Building Systems
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User Computing
 
End User Computing (EUC)
End User Computing (EUC)End User Computing (EUC)
End User Computing (EUC)
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
context-sdm-brochure
context-sdm-brochurecontext-sdm-brochure
context-sdm-brochure
 
03 basic concepts
03 basic concepts03 basic concepts
03 basic concepts
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
 
Software architecture Unit 1 notes
Software architecture Unit 1 notesSoftware architecture Unit 1 notes
Software architecture Unit 1 notes
 
Improving BPM Time To Value
Improving BPM Time To ValueImproving BPM Time To Value
Improving BPM Time To Value
 
Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization  Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization
 
System Engineering Unit-1
System Engineering Unit-1System Engineering Unit-1
System Engineering Unit-1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
 

Similar to TREA - transparent enterprise architecture

Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native ComputingSaju Thomas
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems Design
Armen Arzumanyan
 
Sr_Dev_Ops_Engineer
Sr_Dev_Ops_EngineerSr_Dev_Ops_Engineer
Sr_Dev_Ops_EngineerErik McCarty
 
Virtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White PaperVirtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White Paper
John McDonald
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design Introduction
Usman Khan
 
Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471
vconovalov
 
Governance in the age of cloud
Governance in the age of cloudGovernance in the age of cloud
Governance in the age of cloud
Brenda Barrioz, CPDS
 
The Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System DeploymentThe Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System Deployment
Glen Alleman
 
DevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdfDevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdf
smithlindsay766
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from Microsoft
Kesavan Munuswamy
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
Tripwire
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written reportLuis Perez
 
Using Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems DevelopmentUsing Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems Development
IJEID :: International Journal of Excellence Innovation and Development
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
Luxembourg Institute of Science and Technology
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
IRJET Journal
 
INTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptxINTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptx
StephenStanleyAndres1
 

Similar to TREA - transparent enterprise architecture (20)

Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native Computing
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems Design
 
chapters
chapterschapters
chapters
 
Sr_Dev_Ops_Engineer
Sr_Dev_Ops_EngineerSr_Dev_Ops_Engineer
Sr_Dev_Ops_Engineer
 
Virtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White PaperVirtual Instruments - Infrastructure Performance Management White Paper
Virtual Instruments - Infrastructure Performance Management White Paper
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design Introduction
 
Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471
 
Governance in the age of cloud
Governance in the age of cloudGovernance in the age of cloud
Governance in the age of cloud
 
The Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System DeploymentThe Role of the Architect in ERP and PDM System Deployment
The Role of the Architect in ERP and PDM System Deployment
 
DevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdfDevOps Observability & Monitoring_ Ultimate Guide.pdf
DevOps Observability & Monitoring_ Ultimate Guide.pdf
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from Microsoft
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written report
 
Using Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems DevelopmentUsing Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems Development
 
Systema analysis
Systema analysisSystema analysis
Systema analysis
 
AtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White PapaerAtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White Papaer
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
 
81-T48
81-T4881-T48
81-T48
 
INTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptxINTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptx
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

TREA - transparent enterprise architecture

  • 1. kresimir.barbarosa@saliunca.com +386 51 209 194 DO NOT LET IT CONTROL YOU TREATransparent Enterprise Architecture
  • 2. Information technology solutions are not merely black boxes frozen in space and time but belong to an ever-expansive and increasingly interconnected environment, with systems working in unison for delivery of business services wherever and whenever they are needed. Their scope and complexity grows in time and this occurs on several levels: system, software, hardware, and network; each one of them undergo changes that influence the entire environment. Efficiently managing and leveraging such an environment at all times becomes a great challenge, one that takes up much of IT personnel timesheet. • system • software • hardware • network Manegement frameworki Complexity occurs on several levels Introduction DO NOT LET IT CONTROL YOU
  • 3. • Which technologies from different vendors are in use by our solutions? • How many applications are in use and how do they interface with each other and users? • Which systems are hosted where? Are they physical or virtual? • Are we taking advantage of our resources optimally? Are there any bottlenecks? • Is there unnecessary duplication of functions? • Who is administering particular systems and how? Management platformi The absence of a complete picture arises many questions: Occupied by numerous tasks, IT staff is unable to fully serve the business user with fresh, innovative approaches that drive the company’s further development. This puts considerable pressure on IT both internal and external, which results in inefficient use of resources and delays in achieving business goals. Superfluous tasks like manual management of systems grow increasingly harder for they are prone to human error, perhaps even dependent on key individuals involved and their obscure knowledge of the environment. The absence of a complete picture of the situation across the environment hampers overall agility as numerous questions arise. The problem DO NOT LET IT CONTROL YOU
  • 4. • Are our systems up-to-date and protected against known threats? • Are our systems’ current deployments documented and still supported by the vendor? • Is our licensing current, the capacity compliant and aligned with business needs? • Where in their lifecycles are our systems at this time, are support and spare parts still available? Management platformi Non-technical benefits: There are several levels of integration among systems that have long ceased being isolated siloes and as such depend on each other in delivery of business services. In case any of them become compromised, so do the solutions built on top of them. Furthermore, every solution has a lifecycle of its own that necessitates keeping proper documentation so planning, maintenance and management can all be tackled at an appropriate time. Architectural model of the environment is not intended to replace systems’ documentation that contains key data on a particular system, but to tie them all together on a larger scale, and describe their place within the environment. Besides technical benefits it also provides much insight into software licensing, deployed components and their compliance, communication security and the ability to discover opportunities for infrastructure optimisation. The ecosystem DO NOT LET IT CONTROL YOU
  • 5. • Do we have reliable backups of our data? • Are our systems safe and secure, are there any potential weak points? • Where are potential single points of failure and how do they affect key systems availability? Management platformi Data protection issues: Mission-critical systems’ availability is always limited by their weakest link, which in case of deep integrations can be any one in a host of components. Review, identification and remediation of potential issues ensures appropriate actions can be taken before a possible crisis may occur. Knowing answers to data protection issues such as those outlined on the right can be a crucial difference between having a resilient or a vulnerable environment in time of need. Business continuity DO NOT LET IT CONTROL YOU
  • 6. By utilizing a single all-encompassing architectural model of the environment, the company is able to regain control over the entirety of included IT assets wherever they are and however they happen to be delivered, whereas the possible level of detail inclusion is virtually unlimited and open to growth in time. A unified model of the entire environment provides a visual, segmented situation on four different levels. • Technology (infrastructure and systems) • Application (components and interfaces) • Business (processes and roles) • Relational (relationships among artifacts) Management platformi 4 levels of unified model of the entire environment: The solution DO NOT LET IT CONTROL YOU
  • 7. Having awareness of the current situation throughout the environment establishes a baseline starting point from which the company is able to align IT assets with business requirements in a strategic manner. On this basis the whole organization becomes nimbler and capable of focusing on further development instead of crisis management, which ultimately leads down the path of gaining a real competitive edge over others. 1.MODEL 2.OPTIMIZE 3.GROW Management platform The roadmap to this solution lies in the following three steps below: i DO NOT LET IT CONTROL YOU
  • 8. Modeling the environment is the first step which involves information gathering on the entire infrastructure inventory starting with hardware, networking and zones, software systems and their components, applications and their interfaces, and various user types. All of these represent inputs for appropriate Archimate® standard artifacts that form relationships tying them all together, accompanied by important metadata such as software maintenance levels, system administrators, network addresses, dates, makes and models etc. This process involves assets in both on- premise and cloud infrastructures. Complete architectural model representing the entirety of the organization's IT assets, allowing for a thorough understanding of the environment and providing answers to the questions outlined above. Management platformi End result of this step: STEP 1: MODEL DO NOT LET IT CONTROL YOU
  • 9. The second step is to leverage the model in order to discover relevant interdependencies between particular artifacts, which can be displayed visually up to eight layers deep. All integration points between systems can thus be evaluated for bottlenecks, security issues, possible role duplication and whether mission-critical systems are in fact highly available on all required levels throughout their stacks. The model also provides insight into actual deployment of systems aiding in evaluation of their licensing, lifecycle and requirements compliance. It has become increasingly difficult for larger environments to keep track of all their assets, and efficiently scale them alongside changing business needs, however using the architectural model it becomes possible to do so from a single point, regardless if the assets in question are on-premise systems, SaaS or any other subscription models. Keep track of all environment’s assets and efficiently scale them alongside changing business needs - however using the architectural model it becomes possible to do so from a single point. Management platformi End result of this step: STEP 2: OPTIMIZE DO NOT LET IT CONTROL YOU
  • 10. With current systems hardened and optimized, the organization can leverage the architectural model in subsequent implementations, modernizations and migrations in the future. Once the model has been established, inputting regular updates becomes easy and transparent. An additional benefit alongside the completely mapping of environment is the fact that the model itself supports further inclusion of business processes, associated business artifacts, actors’ motivations, interactions, and a host of other object types, thereby offering an additional level of insight into relationships and interdependencies on an even higher level that ultimately allows for the optimization of business processes themselves. Scalability and transparency of architectural model in subsequent implementations, modernisations and migrations. Management platformi End result of this step: STEP 3: GROW DO NOT LET IT CONTROL YOU
  • 12. Picture 1: A sample of the complete model view which includes (from bottom up): networks, physical devices, database and configuration repositories, system software components, nodes, applications, application interfaces, users, and their relationships. DO NOT LET IT CONTROL YOU
  • 13. Picture 2: A sample of various pieces of metadata belonging to an artifact, in this case a UPS device; demonstration values include: make and model, date of implementation, network address, serial number, and full name of the system administrator DO NOT LET IT CONTROL YOU
  • 14. Picture 3: A sample of visual representation of dependencies based on a randomly selected artifact, in this case the view is shown four levels deep; such views provide visual discovery of interdependence between integrated systems, infrastructure and users. DO NOT LET IT CONTROL YOU
  • 15. Picture 4: A sample of an export of the model with its complete set of data accessible using a web browser; such exports are to be generated each time a change is made. DO NOT LET IT CONTROL YOU