IT Architecture is failing the business by:
• Not delivering on business strategy and business objectives
• Not helping the business respond to external and internal pressures
• Not providing the consulting and advisory services to enable the business derive value from new technologies
• Not driving IT innovation
• Not making itself relevant or useful to the business
IT Architecture failing the IT organisation by:
• Not assisting with engagement with the business to architect solutions needed by the business
• Not working as an integrated function across all architectural areas
• Not defining IT architectures that enable a portfolio of solutions to be delivered and operated quickly
• Not innovating the IT portfolio and architecture to take advantage of and integrate new technologies
Individual architecture disciplines all too frequently operate as disintegrated and siloed functions.
The consequences are that:
• At least 40% of technology spending is diverted from IT
• Over 30% of CIOs routinely not consulted on IT solution acquisition and expenditure
IT architecture needs to:
• Enable the business respond to and realise changes in response to external and internal pressures
• Identify business opportunities in technology trends and occasions for changes and greater efficiencies
• IT Architecture needs to be able to contribute to the development of business strategy and to be trusted to be able to make a contribution
• Identify how the business can use technologies and how the business should be shaped to take advantage of technologies
• Provide advice on the potential of new technologies and how to react to technology changes
• Offer real business consulting and the addition of business value
Digital strategy is a statement about the organisation’s digital positioning, competitors and customer and collaborator needs and behaviour to achieve a direction for innovation, communication, transaction and promotion.
This describes facets of exploring the options for digital to ensure that the resulting strategy is realistic, achievable and will deliver a return.
Enterprise Architecture needs to be involved in the development of digital architecture. Digital architecture needs to be at the core of the organisation’s wider Enterprise Architecture.
Technology generally accelerates existing business momentum rather than being the originator of momentum. Digital is not a panacea. Digital interactions with third parties gives rise to expectations
Digital will make weaknesses in business processes and underlying technology very evident very quickly. Iterate through digital initiatives, starting small and focussed, learning from experience.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
IT Function critical capabilities are key areas where the IT function needs to maintain significant levels of competence, skill and experience and practise in order to operate and deliver a service. There are several different IT capability frameworks. The objective of these notes is to assess the suitability and applicability of these frameworks. These models can be used to identify what is important for your IT function based on your current and desired/necessary activity profile.
Capabilities vary across organisation – not all capabilities have the same importance for all organisations. These frameworks do not readily accommodate variability in the relative importance of capabilities.
The assessment approach taken is to identify a generalised set of capabilities needed across the span of IT function operations, from strategy to operations and delivery. This generic model is then be used to assess individual frameworks to determine their scope and coverage and to identify gaps.
The generic IT function capability model proposed here consists of five groups or domains of major capabilities that can be organised across the span of the IT function:
1. Information Technology Strategy, Management and Governance
2. Technology and Platforms Standards Development and Management
3. Technology and Solution Consulting and Delivery
4. Operational Run The Business/Business as Usual/Service Provision
5. Change The Business/Development and Introduction of New Services
In the context of trends and initiatives such as outsourcing, transition to cloud services and greater platform-based offerings, should the IT function develop and enhance its meta-capabilities – the management of the delivery of capabilities? Is capability identification and delivery management the most important capability? Outsourced service delivery in all its forms is not a fire-and-forget activity. You can outsource the provision of any service except the management of the supply of that service.
The following IT capability models have been evaluated:
• IT4IT Reference Architecture https://www.opengroup.org/it4it contains 32 functional components
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL V4 https://www.axelos.com/best-practice-solutions/itil has 34 management practices
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
• APQC Process Classification Framework - https://www.apqc.org/process-performance-management/process-frameworks version 7.2.1 has 44 major IT management processes
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
The following model has not been evaluated
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
It is well known that an effective PMO is key to successful and efficient program and project execution. In other words, doing things “right”. Enterprise Architecture is the discipline that plans and monitors enterprise transformation and aligns the business strategy with information technology capabilities. In other words, doing the “right things” to support the business.
Why is it organizations despite having both of these disciplines still struggle with effective enterprise transformation? What can we done to use these disciplines more effectively to effect better business outcomes? What are the roles of each discipline and how do they work together to create business value?
In this presentation, Riaz will address these questions and will provide real life examples that can help build a strong relationship between the PMO and Enterprise Architecture.
Learning Objectives:
• How to build a strong relationship between the PMO and Enterprise Architecture (EA) to deliver positive outcomes for your organization
• Identify the different roles and functions of the PMO and EA as well as their similarities
How to Articulate the Value of Enterprise Architecturecccamericas
Ever struggled with the question, What is the Value of Enterprise Architecture? In this facilitated conversation, Michael Fulton will share his perspective on Enterprise Architecture and the value it provides to the CIO, to IT, and to the business.
Come ready to engage, because in the conversation we will discuss:
•The EA 7-year itch
•Several External Perspectives on EA Value
•The CC&C perspective on a simplified approach to EA Value
•Ensuring your perspective on EA Value is relevant for your stakeholders
At the end of this conversation, you should walk away with:
•A new perspective on the value of EA
•Tips and tricks on how to articulate and quantify EA Value for your key stakeholders.
Digital strategy is a statement about the organisation’s digital positioning, competitors and customer and collaborator needs and behaviour to achieve a direction for innovation, communication, transaction and promotion.
This describes facets of exploring the options for digital to ensure that the resulting strategy is realistic, achievable and will deliver a return.
Enterprise Architecture needs to be involved in the development of digital architecture. Digital architecture needs to be at the core of the organisation’s wider Enterprise Architecture.
Technology generally accelerates existing business momentum rather than being the originator of momentum. Digital is not a panacea. Digital interactions with third parties gives rise to expectations
Digital will make weaknesses in business processes and underlying technology very evident very quickly. Iterate through digital initiatives, starting small and focussed, learning from experience.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
IT Function critical capabilities are key areas where the IT function needs to maintain significant levels of competence, skill and experience and practise in order to operate and deliver a service. There are several different IT capability frameworks. The objective of these notes is to assess the suitability and applicability of these frameworks. These models can be used to identify what is important for your IT function based on your current and desired/necessary activity profile.
Capabilities vary across organisation – not all capabilities have the same importance for all organisations. These frameworks do not readily accommodate variability in the relative importance of capabilities.
The assessment approach taken is to identify a generalised set of capabilities needed across the span of IT function operations, from strategy to operations and delivery. This generic model is then be used to assess individual frameworks to determine their scope and coverage and to identify gaps.
The generic IT function capability model proposed here consists of five groups or domains of major capabilities that can be organised across the span of the IT function:
1. Information Technology Strategy, Management and Governance
2. Technology and Platforms Standards Development and Management
3. Technology and Solution Consulting and Delivery
4. Operational Run The Business/Business as Usual/Service Provision
5. Change The Business/Development and Introduction of New Services
In the context of trends and initiatives such as outsourcing, transition to cloud services and greater platform-based offerings, should the IT function develop and enhance its meta-capabilities – the management of the delivery of capabilities? Is capability identification and delivery management the most important capability? Outsourced service delivery in all its forms is not a fire-and-forget activity. You can outsource the provision of any service except the management of the supply of that service.
The following IT capability models have been evaluated:
• IT4IT Reference Architecture https://www.opengroup.org/it4it contains 32 functional components
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL V4 https://www.axelos.com/best-practice-solutions/itil has 34 management practices
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
• APQC Process Classification Framework - https://www.apqc.org/process-performance-management/process-frameworks version 7.2.1 has 44 major IT management processes
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
The following model has not been evaluated
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
It is well known that an effective PMO is key to successful and efficient program and project execution. In other words, doing things “right”. Enterprise Architecture is the discipline that plans and monitors enterprise transformation and aligns the business strategy with information technology capabilities. In other words, doing the “right things” to support the business.
Why is it organizations despite having both of these disciplines still struggle with effective enterprise transformation? What can we done to use these disciplines more effectively to effect better business outcomes? What are the roles of each discipline and how do they work together to create business value?
In this presentation, Riaz will address these questions and will provide real life examples that can help build a strong relationship between the PMO and Enterprise Architecture.
Learning Objectives:
• How to build a strong relationship between the PMO and Enterprise Architecture (EA) to deliver positive outcomes for your organization
• Identify the different roles and functions of the PMO and EA as well as their similarities
How to Articulate the Value of Enterprise Architecturecccamericas
Ever struggled with the question, What is the Value of Enterprise Architecture? In this facilitated conversation, Michael Fulton will share his perspective on Enterprise Architecture and the value it provides to the CIO, to IT, and to the business.
Come ready to engage, because in the conversation we will discuss:
•The EA 7-year itch
•Several External Perspectives on EA Value
•The CC&C perspective on a simplified approach to EA Value
•Ensuring your perspective on EA Value is relevant for your stakeholders
At the end of this conversation, you should walk away with:
•A new perspective on the value of EA
•Tips and tricks on how to articulate and quantify EA Value for your key stakeholders.
Shadow IT And The Failure Of IT ArchitectureAlan McSweeney
The continued existence and growth of shadow IT gives IT architecture the opportunity show leadership. IT architecture can be the gateway for business IT solution requirements, from initial solution concept through to solution realisation.
Shadow IT is a set of reactions by business functions to an actual or perceived inability or unwillingness of the IT function to respond to business needs for IT solutions. There are many aspects of shadow IT:
• Shadow Projects
• Shadow Data
• Shadow Sourcing
• Shadow Development
• Shadow Solutions
• Shadow Support Arrangements
Shadow IT takes many forms and types
1. CUST – customised solution developed by a third-party
2. DEV – personal devices used to access business systems or authenticate access to hosted solutions used for business
3. DIY – end-user computing application developed by the business
4. HOME – organisation data sent to home devices to be worked on
5. MSG – public messaging and data exchange platforms
6. OPEN – open-source software used as a stand-alone solution or incorporated into other solutions
7. OUT – outsourced service solution
8. PROD – software product acquired by the business and implemented on organisation infrastructure
9. PUB – accessing organisation applications and data using public devices or networks
10. STOR – public data storage and exchange platforms
11. SVC – hosted software solution
Uncontrolled shadow IT represents a real risk to organisations. The experience from previous shadow IT examples is that they have resulted in real financial losses. IT architecture can and should take the lead in implementing structures and processes to mitigate risks while taking maximising the benefits of shadow IT.
This presentation describes systematic, repeatable and co-ordinated approach to agile solution architecture and design. It is intended to describe a set of practical steps and activities embedded within a framework to allow an agile method to be adopted and used for solution design and delivery. This approach ensures consistency in the assessment of solution design options and in subsequent solution design and solution delivery activities. This process leads to the rapid design and delivery of realistic and achievable solutions that meet real solution consumer needs. The approach provides for effective solution decision-making. It generates options and results quickly and consistently. Implementing a framework such as this provides for the creation of a knowledgebase of previous solution design and delivery exercises that leads to an accumulated body of knowledge within the organisation.
Align IT Strategy with Business StrategyMauly Chandra
Business Strategy & IT must go hand in hand. Aligning IT strategy with Business strategy enables leveraging IT for achieving strategic objectives like increase productivity, improve profitability, more"
https://www.forceintellect.com/2020/09/08/importance-aligning-it-strategy-business-strategy/
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
Technical debt is an overworked term without an effective and common agreed understanding of what exactly it is, what causes it, what are its consequences, how to assess it and what to do about it.
Technical debt is the sum of additional direct and indirect implementation and operational costs incurred and risks and vulnerabilities created because of sub-optimal solution design and delivery decisions.
Technical debt is the sum of all the consequences of all the circumventions, budget reduction, time pressure, lack of knowledge, manual workarounds, short-cuts, avoidance, poor design and delivery quality and decisions to remove elements from solution scope and failure to provide foundational and backbone solution infrastructure.
Technical debt leads to a negative feedback cycle with short solution lifespan, earlier solution replacement and short-term tactical remedial actions.
All the disciplines within IT architecture have a role to play in promoting an understanding of and in the identification of how to resolve technical debt. IT architecture can provide the leadership in both remediating existing technical debt and preventing future debt.
Failing to take a complete view of the technical debt within the organisation means problems and risks remained unrecognised and unaddressed. The real scope of the problem is substantially underestimated. Technical debt is always much more than poorly written software.
Technical debt can introduce security risks and vulnerabilities into the organisation’s solution landscape. Failure to address technical debt leaves exploitable security risks and vulnerabilities in place.
Shadow IT or ghost IT is a largely unrecognised source of technical debt including security risks and vulnerabilities. Shadow IT is the consequence of a set of reactions by business functions to an actual or perceived inability or unwillingness of the IT function to respond to business needs for IT solutions. Shadow IT is frequently needed to make up for gaps in core business solutions, supplementing incomplete solutions and providing omitted functionality.
Enterprise Architecture, SOA, and their relationships
Apply SOA to Enterprise Architecture – Service Oriented Enterprise Architecture
Service Oriented Enterprise
Service Oriented Applications and Systems
Service Oriented Infrastructure
Bringing Architecture Thinking to the People - An introduction into the PEOPL...Craig Martin
The successful implementation of an architecture plan or blueprint is often challenged not in the efficacy of the design elements of the architecture, but in its implementation by people in business operations. Transformation programs will often struggle as a consequence of the failure to consider the issues impacting and the role of people in supporting the target operating state of the architecture once implemented, it is therefore imperative that when architects innovate, model and design to solve business problems, that they equally consider the people dimension. Capability based planning is incomplete unless we address the optimum mix of people, process and tools to drive out the target outcome of that capability. This presentation will look at a case study from within the Australian market in which Business Capability Based Planning was applied to assess people capabilities and organisation preparedness to support a target business model. It will also discuss some of the more effective people levers that can be applied to deliver more impactful and long lasting architectural change.
Introduction To Business Architecture – Part 1Alan McSweeney
This is the first of a proposed four part introduction to Business Architecture. It is intended to focus on activities associated with Business Architecture work and engagements.
Business change without a target business architecture and a plan is likely to result in a lack of success and even failure. An effective approach to business architecture and business architecture competency is required to address effectively the pressures on businesses to change. Business architecture connects business strategy to effective implementation and operation:
• Translates business strategic aims to implementations
• Defines the consequences and impacts of strategy
• Isolates focussed business outcomes
• Identifies the changes and deliverables that achieve business success
Enterprise Architecture without Solution Architecture and Business Architecture will not deliver on its potential. Business Architecture is an essential part of the continuum from theory to practice.
Introduction to Business Architecture - Part 2Alan McSweeney
The first part is available at: https://www.slideshare.net/alanmcsweeney/introduction-to-business-architecture-part-1.
This material describes conducting a specific business architecture engagement. The engagement process is generic and needs to be adapted to each specific application and use. The engagement is a formal process for gathering information and creating a new business function model based on an analysis of that information.
The objective is to create a realistic and achievable target business architecture to achieve the desired business change.
Business architecture is a structured approach to analysing the operation of an existing business function or entire organisation with a view to improving its operations or developing a new business function, with a strong focus on processes and technology. Business architecture is not about business requirements – it is about business solutions and organisation changes to deliver business objectives.
Incorporating A DesignOps Approach Into Solution ArchitectureAlan McSweeney
Solution architecture and design is concerned with designing new (IT) solutions to resolve problems or address opportunities . In order to solve a problem, you need sufficient information to understand the problem. If you do not understand the scope of the required solution you cannot understand the risks associated with the implementation approach.
Getting the solution wrong can be very expensive. The DesignOps approach is a unified end-to-end view of solution delivery from initial concept to steady state operations. It is a design-to-operations approach identifying all the solution design elements needed to ensure the delivery of a complete solution.
Solution architecture and design teams are becoming larger so more co-ordination, standardisation and management is required. The increasing focus on digital transformation increases the need for improved design as business applications are exposed outside the organisation. Solution complexity is increasing. The aim of the DesignOps approach is to improve solution design outcomes.
Creating A Business Focussed Information Technology StrategyAlan McSweeney
This presentation describes a structured approach to creating a business-focussed information technology strategy.
An effective business-oriented IT strategy is an opportunity to resolve the disconnection and to ensure the IT function is able to and does respond to business needs and is trusted by the business to provide IT solutions.
The IT strategy will consist of static structural elements relating to the organisation of the IT function:
• Capabilities – skills and abilities the IT function should possess and be able to use effectively and efficiently
• IT Function Structure – the organisation and arrangement of the sub-functions and their responsibilities and relationships
• Operating Model – how the IT function work and delivers value and the processes it implements and operates
• Staffing And Roles – the numbers of people, their roles, responsibilities, expected skills, experience and abilities, workload, reporting structures and expected ways of operating
It will also include dynamic elements relating to initiatives, both enabling initiatives within the IT function and specific business initiatives required to achieve the business strategy.
Solution architects must be aware of the need for solution security and of the need to have enterprise-level controls that solutions can adopt.
The sets of components that comprise the extended solution landscape, including those components that provide common or shared functionality, are located in different zones, each with different security characteristics.
The functional and operational design of any solution and therefore its security will include many of these components, including those inherited by the solution or common components used by the solution.
The complete solution security view should refer explicitly to the components and their controls.
While each individual solution should be able to inherit the security controls provided by these components, the solution design should include explicit reference to them for completeness and to avoid unvalidated assumptions.
There is a common and generalised set of components, many of which are shared, within the wider solution topology that should be considered when assessing overall solution architecture and solution security.
Individual solutions must be able to inherit security controls, facilities and standards from common enterprise-level controls, standards, toolsets and frameworks.
Individual solutions must not be forced to implement individual infrastructural security facilities and controls. This is wasteful of solution implementation resources, results in multiple non-standard approaches to security and represents a security risk to the organisation.
The extended solution landscape potentially consists of a large number of interacting components and entities located in different zones, each with different security profiles, requirements and concerns. Different security concerns and therefore controls apply to each of these components.
Solution security is not covered by a single control. It involves multiple overlapping sets of controls providing layers of security.
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
This reviews the Open Group’s IT4IT Reference Architecture (https://www.opengroup.org/it4it) with respect to other operational frameworks to determine its suitability and applicability to the IT operating function.
IT4IT is intended to be a reference architecture for the management of the IT function. It aims to take a value chain approach to create a model of the functions that IT performs and the services it provides to assist organisations in the identification of the activities that contribute to business competitiveness. It is intended to be an integrated framework for the management of IT that emphasises IT service lifecycles.
This paper reviews what is meant by a value-chain, with special reference to the Supply Chain Operations Reference (SCOR) model (https://www.apics.org/apics-for-business/frameworks/scor). the most widely used and most comprehensive such model.
The SCOR model is part of wider set of operations reference models that describe a view of the critical elements in a value chain:
• Product Life Cycle Operations Reference model (PLCOR) - Manages the activities for product innovation and product and portfolio management
• Customer Chain Operations Reference model (CCOR) - Manages the customer interaction processes
• Design Chain Operations Reference model (DCOR) - Manages the product and service development processes
• Managing for Supply Chain Performance (M4SC) - Translates business strategies into supply chain execution plans and policies
It also compares the IT4IT Reference Architecture and its 32 functional components to other frameworks that purport to identify the critical capabilities of the IT function:
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL IT Service Management https://www.axelos.com/best-practice-solutions/itil
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
Slides from a presentation given by Paul Turner to meetings of IIBA UK on 16 July and 12 August 2014.
Much has been written about technical and solution architectures, without due attention being given to how these work together with the Business Architecture.
It is easy to believe that those who are involved in business analysis, requirements definition and systems modelling do not need to consider the Business Architecture at all. This could not be further from the truth. This talk explains the rationale behind Business Architecture, what its main components are and why Business Analysts should ensure that they understand it and the influence it is likely to have on their work.
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT WorldAlan McSweeney
Business has a consistently poor experience of the internal IT function. It is now all too easy for the business to bypass the central IT function. There is a business shift to cloud service providers offering infrastructure-less solutions with no perceived IT involvement. Outsourcing and the divestment of IT functions in response to business wishes to remove the overhead. The business need to respond to the interrelated developments of digital, mobile and social computing and perceived inability of the central IT function to respond.
If the IT function cannot react to the requirements of the business due to business pressures, the business will go elsewhere. Shadow IT - the acquisition of IT solutions outside the control of the IT function - is an unpleasant and common reality. 50% of IT expenditure is routinely spent outside the control of the IT function. Shadow IT is a symptom of a post-IT world.
The central IT function loses relevance and control. Businesses reduce their reliance on the core IT function.
IT architecture should act as a glue joining the business strategy to the IT strategy. IT architecture needs to operate as an internal business consulting And advisory function. An effective business oriented IT architecture function can get the correct balance between too little and too much, too slowly and too quickly. The IT Architecture team needs to operate as a team rather than a set of siloed internally focussed IT roles, involving business as well as technologists.
Shadow IT And The Failure Of IT ArchitectureAlan McSweeney
The continued existence and growth of shadow IT gives IT architecture the opportunity show leadership. IT architecture can be the gateway for business IT solution requirements, from initial solution concept through to solution realisation.
Shadow IT is a set of reactions by business functions to an actual or perceived inability or unwillingness of the IT function to respond to business needs for IT solutions. There are many aspects of shadow IT:
• Shadow Projects
• Shadow Data
• Shadow Sourcing
• Shadow Development
• Shadow Solutions
• Shadow Support Arrangements
Shadow IT takes many forms and types
1. CUST – customised solution developed by a third-party
2. DEV – personal devices used to access business systems or authenticate access to hosted solutions used for business
3. DIY – end-user computing application developed by the business
4. HOME – organisation data sent to home devices to be worked on
5. MSG – public messaging and data exchange platforms
6. OPEN – open-source software used as a stand-alone solution or incorporated into other solutions
7. OUT – outsourced service solution
8. PROD – software product acquired by the business and implemented on organisation infrastructure
9. PUB – accessing organisation applications and data using public devices or networks
10. STOR – public data storage and exchange platforms
11. SVC – hosted software solution
Uncontrolled shadow IT represents a real risk to organisations. The experience from previous shadow IT examples is that they have resulted in real financial losses. IT architecture can and should take the lead in implementing structures and processes to mitigate risks while taking maximising the benefits of shadow IT.
This presentation describes systematic, repeatable and co-ordinated approach to agile solution architecture and design. It is intended to describe a set of practical steps and activities embedded within a framework to allow an agile method to be adopted and used for solution design and delivery. This approach ensures consistency in the assessment of solution design options and in subsequent solution design and solution delivery activities. This process leads to the rapid design and delivery of realistic and achievable solutions that meet real solution consumer needs. The approach provides for effective solution decision-making. It generates options and results quickly and consistently. Implementing a framework such as this provides for the creation of a knowledgebase of previous solution design and delivery exercises that leads to an accumulated body of knowledge within the organisation.
Align IT Strategy with Business StrategyMauly Chandra
Business Strategy & IT must go hand in hand. Aligning IT strategy with Business strategy enables leveraging IT for achieving strategic objectives like increase productivity, improve profitability, more"
https://www.forceintellect.com/2020/09/08/importance-aligning-it-strategy-business-strategy/
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
Technical debt is an overworked term without an effective and common agreed understanding of what exactly it is, what causes it, what are its consequences, how to assess it and what to do about it.
Technical debt is the sum of additional direct and indirect implementation and operational costs incurred and risks and vulnerabilities created because of sub-optimal solution design and delivery decisions.
Technical debt is the sum of all the consequences of all the circumventions, budget reduction, time pressure, lack of knowledge, manual workarounds, short-cuts, avoidance, poor design and delivery quality and decisions to remove elements from solution scope and failure to provide foundational and backbone solution infrastructure.
Technical debt leads to a negative feedback cycle with short solution lifespan, earlier solution replacement and short-term tactical remedial actions.
All the disciplines within IT architecture have a role to play in promoting an understanding of and in the identification of how to resolve technical debt. IT architecture can provide the leadership in both remediating existing technical debt and preventing future debt.
Failing to take a complete view of the technical debt within the organisation means problems and risks remained unrecognised and unaddressed. The real scope of the problem is substantially underestimated. Technical debt is always much more than poorly written software.
Technical debt can introduce security risks and vulnerabilities into the organisation’s solution landscape. Failure to address technical debt leaves exploitable security risks and vulnerabilities in place.
Shadow IT or ghost IT is a largely unrecognised source of technical debt including security risks and vulnerabilities. Shadow IT is the consequence of a set of reactions by business functions to an actual or perceived inability or unwillingness of the IT function to respond to business needs for IT solutions. Shadow IT is frequently needed to make up for gaps in core business solutions, supplementing incomplete solutions and providing omitted functionality.
Enterprise Architecture, SOA, and their relationships
Apply SOA to Enterprise Architecture – Service Oriented Enterprise Architecture
Service Oriented Enterprise
Service Oriented Applications and Systems
Service Oriented Infrastructure
Bringing Architecture Thinking to the People - An introduction into the PEOPL...Craig Martin
The successful implementation of an architecture plan or blueprint is often challenged not in the efficacy of the design elements of the architecture, but in its implementation by people in business operations. Transformation programs will often struggle as a consequence of the failure to consider the issues impacting and the role of people in supporting the target operating state of the architecture once implemented, it is therefore imperative that when architects innovate, model and design to solve business problems, that they equally consider the people dimension. Capability based planning is incomplete unless we address the optimum mix of people, process and tools to drive out the target outcome of that capability. This presentation will look at a case study from within the Australian market in which Business Capability Based Planning was applied to assess people capabilities and organisation preparedness to support a target business model. It will also discuss some of the more effective people levers that can be applied to deliver more impactful and long lasting architectural change.
Introduction To Business Architecture – Part 1Alan McSweeney
This is the first of a proposed four part introduction to Business Architecture. It is intended to focus on activities associated with Business Architecture work and engagements.
Business change without a target business architecture and a plan is likely to result in a lack of success and even failure. An effective approach to business architecture and business architecture competency is required to address effectively the pressures on businesses to change. Business architecture connects business strategy to effective implementation and operation:
• Translates business strategic aims to implementations
• Defines the consequences and impacts of strategy
• Isolates focussed business outcomes
• Identifies the changes and deliverables that achieve business success
Enterprise Architecture without Solution Architecture and Business Architecture will not deliver on its potential. Business Architecture is an essential part of the continuum from theory to practice.
Introduction to Business Architecture - Part 2Alan McSweeney
The first part is available at: https://www.slideshare.net/alanmcsweeney/introduction-to-business-architecture-part-1.
This material describes conducting a specific business architecture engagement. The engagement process is generic and needs to be adapted to each specific application and use. The engagement is a formal process for gathering information and creating a new business function model based on an analysis of that information.
The objective is to create a realistic and achievable target business architecture to achieve the desired business change.
Business architecture is a structured approach to analysing the operation of an existing business function or entire organisation with a view to improving its operations or developing a new business function, with a strong focus on processes and technology. Business architecture is not about business requirements – it is about business solutions and organisation changes to deliver business objectives.
Incorporating A DesignOps Approach Into Solution ArchitectureAlan McSweeney
Solution architecture and design is concerned with designing new (IT) solutions to resolve problems or address opportunities . In order to solve a problem, you need sufficient information to understand the problem. If you do not understand the scope of the required solution you cannot understand the risks associated with the implementation approach.
Getting the solution wrong can be very expensive. The DesignOps approach is a unified end-to-end view of solution delivery from initial concept to steady state operations. It is a design-to-operations approach identifying all the solution design elements needed to ensure the delivery of a complete solution.
Solution architecture and design teams are becoming larger so more co-ordination, standardisation and management is required. The increasing focus on digital transformation increases the need for improved design as business applications are exposed outside the organisation. Solution complexity is increasing. The aim of the DesignOps approach is to improve solution design outcomes.
Creating A Business Focussed Information Technology StrategyAlan McSweeney
This presentation describes a structured approach to creating a business-focussed information technology strategy.
An effective business-oriented IT strategy is an opportunity to resolve the disconnection and to ensure the IT function is able to and does respond to business needs and is trusted by the business to provide IT solutions.
The IT strategy will consist of static structural elements relating to the organisation of the IT function:
• Capabilities – skills and abilities the IT function should possess and be able to use effectively and efficiently
• IT Function Structure – the organisation and arrangement of the sub-functions and their responsibilities and relationships
• Operating Model – how the IT function work and delivers value and the processes it implements and operates
• Staffing And Roles – the numbers of people, their roles, responsibilities, expected skills, experience and abilities, workload, reporting structures and expected ways of operating
It will also include dynamic elements relating to initiatives, both enabling initiatives within the IT function and specific business initiatives required to achieve the business strategy.
Solution architects must be aware of the need for solution security and of the need to have enterprise-level controls that solutions can adopt.
The sets of components that comprise the extended solution landscape, including those components that provide common or shared functionality, are located in different zones, each with different security characteristics.
The functional and operational design of any solution and therefore its security will include many of these components, including those inherited by the solution or common components used by the solution.
The complete solution security view should refer explicitly to the components and their controls.
While each individual solution should be able to inherit the security controls provided by these components, the solution design should include explicit reference to them for completeness and to avoid unvalidated assumptions.
There is a common and generalised set of components, many of which are shared, within the wider solution topology that should be considered when assessing overall solution architecture and solution security.
Individual solutions must be able to inherit security controls, facilities and standards from common enterprise-level controls, standards, toolsets and frameworks.
Individual solutions must not be forced to implement individual infrastructural security facilities and controls. This is wasteful of solution implementation resources, results in multiple non-standard approaches to security and represents a security risk to the organisation.
The extended solution landscape potentially consists of a large number of interacting components and entities located in different zones, each with different security profiles, requirements and concerns. Different security concerns and therefore controls apply to each of these components.
Solution security is not covered by a single control. It involves multiple overlapping sets of controls providing layers of security.
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
This reviews the Open Group’s IT4IT Reference Architecture (https://www.opengroup.org/it4it) with respect to other operational frameworks to determine its suitability and applicability to the IT operating function.
IT4IT is intended to be a reference architecture for the management of the IT function. It aims to take a value chain approach to create a model of the functions that IT performs and the services it provides to assist organisations in the identification of the activities that contribute to business competitiveness. It is intended to be an integrated framework for the management of IT that emphasises IT service lifecycles.
This paper reviews what is meant by a value-chain, with special reference to the Supply Chain Operations Reference (SCOR) model (https://www.apics.org/apics-for-business/frameworks/scor). the most widely used and most comprehensive such model.
The SCOR model is part of wider set of operations reference models that describe a view of the critical elements in a value chain:
• Product Life Cycle Operations Reference model (PLCOR) - Manages the activities for product innovation and product and portfolio management
• Customer Chain Operations Reference model (CCOR) - Manages the customer interaction processes
• Design Chain Operations Reference model (DCOR) - Manages the product and service development processes
• Managing for Supply Chain Performance (M4SC) - Translates business strategies into supply chain execution plans and policies
It also compares the IT4IT Reference Architecture and its 32 functional components to other frameworks that purport to identify the critical capabilities of the IT function:
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL IT Service Management https://www.axelos.com/best-practice-solutions/itil
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
Slides from a presentation given by Paul Turner to meetings of IIBA UK on 16 July and 12 August 2014.
Much has been written about technical and solution architectures, without due attention being given to how these work together with the Business Architecture.
It is easy to believe that those who are involved in business analysis, requirements definition and systems modelling do not need to consider the Business Architecture at all. This could not be further from the truth. This talk explains the rationale behind Business Architecture, what its main components are and why Business Analysts should ensure that they understand it and the influence it is likely to have on their work.
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT WorldAlan McSweeney
Business has a consistently poor experience of the internal IT function. It is now all too easy for the business to bypass the central IT function. There is a business shift to cloud service providers offering infrastructure-less solutions with no perceived IT involvement. Outsourcing and the divestment of IT functions in response to business wishes to remove the overhead. The business need to respond to the interrelated developments of digital, mobile and social computing and perceived inability of the central IT function to respond.
If the IT function cannot react to the requirements of the business due to business pressures, the business will go elsewhere. Shadow IT - the acquisition of IT solutions outside the control of the IT function - is an unpleasant and common reality. 50% of IT expenditure is routinely spent outside the control of the IT function. Shadow IT is a symptom of a post-IT world.
The central IT function loses relevance and control. Businesses reduce their reliance on the core IT function.
IT architecture should act as a glue joining the business strategy to the IT strategy. IT architecture needs to operate as an internal business consulting And advisory function. An effective business oriented IT architecture function can get the correct balance between too little and too much, too slowly and too quickly. The IT Architecture team needs to operate as a team rather than a set of siloed internally focussed IT roles, involving business as well as technologists.
Enterprise Architecture Evolution at Verizon - May 2010Nanda Taliyakula
Contribution to the Enterprise Architecture Community.
Coproduced the webinar presented at Information Management Forum (IMF) circa May 2010 .
Content created along with Srini Kalapala and Hans Raj Nahata.
John Crane, former CIO of National Australia Bank, spoke at The Marketing Practice's Sales & Marketing Forum about how suppliers could more effectively reach decision-makers in his position.
The slides give an overview of what suppliers need to know about the role of a CIO in a retail bank, how they work as part of an exec team, how they interact with the rest of the business, and how their department may be structured.
There are also some prompts for suppliers looking for closer sales and marketing relationships with CIOs (including the question of whether the CIO is the right target in the first place...).
Lucy Nelson provides an overview of her experience, of adopting Enterprise Architect at UCLan.
Presented at the second JISC Emerging Practices workshop (2012/07/03).
http://emergingpractices.jiscinvolve.org/wp/doing-ea-workshop-2/
One of the most daunting challenges organizations face in making decisions on what technology is needed to fully enable the business to achieve its strategy and objectives. The key is ALIGNMENT.
The role of the IT department in businessPaul Leenards
The role the IT organization can play depends on how the Business views their dependency on IT and if they trust that the IT manager can take care of it.
Ever struggled with the question of, What is the Value of Enterprise Architecture? In this webinar, Michael Fulton, experienced architect and President, CC&C Americas will share his perspective on EA and the value it provides to the CIO, to IT and to the business.
We will cover the benefits associated with:
• new Business Capabilities
• Cost Savings
• Risk Reduction
Key Take-aways:
• What are the elements of value delivered by IT?
• How does EA & IT Architecture deliver value to the organization?
• Why should you consider implementing an Enterprise Architecture program at your company?
Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)Software Guru
Cuitláhuac Osorio forma parte del consorcio Cutter donde nos habla de cómo hacer que las TI importen y que funcionen.
Además, nos comparte 5 consejos de los expertos.
Business process analysis and design – importance of having a common language...Alan McSweeney
Provide an introduction to process design/specification and the potential benefits of using a visual process design approach such as BPMN to enable business and IT users understand how process should operate
Similar to We Need To Talk About IT Architecture (20)
The data architecture of solutions is frequently not given the attention it deserves or needs. Frequently, too little attention is paid to designing and specifying the data architecture within individual solutions and their constituent components. This is due to the behaviours of both solution architects ad data architects.
Solution architecture tends to concern itself with functional, technology and software components of the solution
Data architecture tends not to get involved with the data aspects of technology solutions, leaving a data architecture gap. Combined with the gap where data architecture tends not to get involved with the data aspects of technology solutions, there is also frequently a solution architecture data gap. Solution architecture also frequently omits the detail of data aspects of solutions leading to a solution data architecture gap. These gaps result in a data blind spot for the organisation.
Data architecture tends to concern itself with post-individual solutions. Data architecture needs to shift left into the domain of solutions and their data and more actively engage with the data dimensions of individual solutions. Data architecture can provide the lead in sealing these data gaps through a shift-left of its scope and activities as well providing standards and common data tooling for solution data architecture
The objective of data design for solutions is the same as that for overall solution design:
• To capture sufficient information to enable the solution design to be implemented
• To unambiguously define the data requirements of the solution and to confirm and agree those requirements with the target solution consumers
• To ensure that the implemented solution meets the requirements of the solution consumers and that no deviations have taken place during the solution implementation journey
Solution data architecture avoids problems with solution operation and use:
• Poor and inconsistent data quality
• Poor performance, throughput, response times and scalability
• Poorly designed data structures can lead to long data update times leading to long response times, affecting solution usability, loss of productivity and transaction abandonment
• Poor reporting and analysis
• Poor data integration
• Poor solution serviceability and maintainability
• Manual workarounds for data integration, data extract for reporting and analysis
Data-design-related solution problems frequently become evident and manifest themselves only after the solution goes live. The benefits of solution data architecture are not always evident initially.
Solution Architecture and Solution Estimation.pdfAlan McSweeney
Solution architects and the solution architecture function are ideally placed to create solution delivery estimates
Solution architects have the knowledge and understanding of the solution constituent component and structure that is needed to create solution estimate:
• Knowledge of solution options
• Knowledge of solution component structure to define a solution breakdown structure
• Knowledge of available components and the options for reuse
• Knowledge of specific solution delivery constraints and standards that both control and restrain solution options
Accurate solution delivery estimates are need to understand the likely cost/resources/time/options needed to implement a new solution within the context of a range of solutions and solution options. These estimates are a key input to investment management and making effective decisions on the portfolio of solutions to implement. They enable informed decision-making as part of IT investment management.
An estimate is not a single value. It is a range of values depending on a number of conditional factors such level of knowledge, certainty, complexity and risk. The range will narrow as the level of knowledge and uncertainty decreases
There is no easy or magic way to create solution estimates. You have to engage with the complexity of the solution and its components. The more effort that is expended the more accurate the results of the estimation process will be. But there is always a need to create estimates (reasonably) quickly so a balance is needed between effort and quality of results.
The notes describe a structured solution estimation process and an associated template. They also describe the wider context of solution estimates in terms of IT investment and value management and control.
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Alan McSweeney
This analysis seeks to validate published COVID-19 mortality statistics using mortality data derived from general mortality statistics, mortality estimated from population size and mortality rates and death notice data
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Alan McSweeney
This analysis looks at the changes in the numbers of priests and nuns in Ireland for the years 1926 to 2016. It combines data from a range of sources to show the decline in the numbers of priests and nuns and their increasing age profile.
This analysis consists of the following sections:
• Summary - this highlights some of the salient points in the analysis.
• Overview of Analysis - this describes the approach taken in this analysis.
• Context – this provides background information on the number of Catholics in Ireland as a context to this analysis.
• Analysis of Census Data 1926 – 2016 - this analyses occupation age profile data for priests and nuns. It also includes sample projections on the numbers of priests and nuns.
• Analysis of Catholic Religious Mortality 2014-2021 - this analyses death notice data from RIP.ie to shows the numbers of priests and nuns that have died in the years 2014 to 2021. It also looks at deaths of Irish priests and nuns outside Ireland and at the numbers of countries where Irish priests and nuns have worked.
• Analysis of Data on Catholic Clergy From Other Sources - this analyses data on priests and nuns from other sources.
• Notes on Data Sources and Data Processing - this lists the data sources used in this analysis.
Solution Architecture And Solution SecurityAlan McSweeney
This describes an approach to embedding security within the technology solution landscape. It describes a security model that encompasses the range of individual solution components up to the entire solution landscape. The solution security model allows the security status of a solution and its constituent delivery and operational components to be tracked wherever those components are located. This provides an integrated approach to solution security across all solution components and across the entire organisation topology of solutions. It allows the solution architect to validate the security of an individual solution. It enables the security status of the entire solution landscape to be assessed and recorded. Solution security is a wicked problem because there is no certainly about when the problem has been resolved and a state of security has been achieved. The security state of a solution can just be expressed along a subjective spectrum of better or worse rather than a binary true or false. Solution security can have negative consequences: prevents types of access, limits availability in different ways, restricts functionality provided, makes solution harder to use, lengthens solution delivery times, increases costs along the entire solution lifecycle, leads to loss of usability, utility and rate of use.
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
This paper describes how technologies such as data pseudonymisation and differential privacy technology enables access to sensitive data and unlocks data opportunities and value while ensuring compliance with data privacy legislation and regulations.
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
Your data has value to your organisation and to relevant data sharing partners. It has been expensively obtained. It represents a valuable asset on which a return must be generated. To achieve the value inherent in the data you need to be able to make it appropriately available to others, both within and outside the organisation.
Organisations are frequently data rich and information poor, lacking the skills, experience and resources to convert raw data into value.
These notes outline technology approaches to achieving compliance with data privacy regulations and legislation while providing access to data.
There are different routes to making data accessible and shareable within and outside the organisation without compromising compliance with data protection legislation and regulations and removing the risk associated with allowing access to personal data:
• Differential Privacy – source data is summarised and individual personal references are removed. The one-to-one correspondence between original and transformed data has been removed
• Anonymisation – identifying data is destroyed and cannot be recovered so individual cannot be identified. There is still a one-to-one correspondence between original and transformed data
• Pseudonymisation – identifying data is encrypted and recovery data/token is stored securely elsewhere. There is still a one-to-one correspondence between original and transformed data
These technologies and approaches are not mutually exclusive – each is appropriate to differing data sharing and data access use cases
The data privacy regulatory and legislative landscape is complex and getting even more complex so an approach to data access and sharing that embeds compliance as a matter of course is required.
Appropriate technology appropriately implemented and operated is a means of managing and reducing risks of re-identification by making the time, skills, resources and money necessary to achieve this unrealistic.
Technology is part of a risk management approach to data privacy. There is wider operational data sharing and data privacy framework that includes technology aspects, among other key areas. Using these technologies will embed such compliance by design into your data sharing and access facilities. This will allow you to realise value from your data successfully.
Solution Architecture And (Robotic) Process Automation SolutionsAlan McSweeney
Automation is a technology trend IT architects should be aware of and know how to respond to business requests as well as recommend automation technologies and solutions where appropriate. Automation is a bigger topic than just RPA (Robotic Process Automation).
Automation solutions, like all other technology solutions, should be subject to an architecture and design process. There are many approaches to and options for the automation of business activities. Too often automation solutions are tactical applications layered over existing business systems
The objective of all IT solutions is to automate manual business processes and their activities to a certain extent. The requirement for RPA-type applications arises in part because of automation failures within existing applications or the need to automate the interactions with or integrations between separate, possibly legacy, applications.
One of the roles of IT architecture is to always seek to take the wider architectural view and to ensure that solutions are designed and delivered within a strategic framework to avoid, as much as is practical and realistic, short-term tactical solutions and approaches that lead to an accumulation of design, operations and support debt. Tactical solutions will always play a part in the organisation’s solution landscape.
The objective of these notes is to put automation into its wider and larger IT architecture context while accepting the need for tactical approaches in some instances.
These notes cover the following topics:
• Solution And Process Automation – The Wider Technology And Approach Landscape
• Business Processes, Business Solutions And Automation
• Organisation Process Model
• Strategic And Tactical Automation
• Deciding On The Scope Of Automation
• Digital Strategy, Digital Transformation And Automation
• Specifying The Automation Solution
• Business Process Model and Notation (BPMN)
• Sample Business Process – Order To Cash
• RPA (Robotic Process Automation)
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
These notes discuss the related topics of Data Profiling, Data Catalogs and Metadata Harmonisation. It describes a detailed structure for data profiling activities. It identifies various open source and commercial tools and data profiling algorithms. Data profiling is a necessary pre-requisite activity in order to construct a data catalog. A data catalog makes an organisation’s data more discoverable. The data collected during data profiling forms the metadata contained in the data catalog. This assists with ensuring data quality. It is also a necessary activity for Master Data Management initiatives. These notes describe a metadata structure and provide details on metadata standards and sources.
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Alan McSweeney
This document compares published COVID-19 mortality statistics for Ireland with publicly available mortality data extracted from informal public data sources. This mortality data is taken from published death notices on the web site www.rip.ie. This is used a substitute for poor quality and long-delayed officially published mortality statistics.
Death notice information on the web site www.rip.ie is available immediately and contains information at a greater level of detail than published statistics. There is a substantial lag in officially published mortality data and the level of detail is very low. However, the extraction of death notice data and its conversion into a usable and accurate format requires a great deal of processing.
The objective of this analysis is to assess the accuracy of published COVID-19 mortality statistics by comparing trends in mortality over the years 2014 to 2020 with both numbers of deaths recorded from 2020 to 2021 and the COVID-19 statistics. It compares number of deaths for the seven 13-month intervals:
1. Mar 2014 - Mar 2015
2. Mar 2015 - Mar 2016
3. Mar 2016 - Mar 2017
4. Mar 2017 - Mar 2018
5. Mar 2018 - Mar 2019
6. Mar 2019 - Mar 2020
7. Mar 2020 - Mar 2021
It focuses on the seventh interval which is when COVID-19 deaths have occurred. It combines an analysis of mortality trends with details on COVID-19 deaths. This is a fairly simplistic analysis that looks to cross-check COVID-19 death statistics using data from other sources.
The subject of what constitutes a death from COVID-19 is controversial. This analysis is not concerned with addressing this controversy. It is concerned with comparing mortality data from a number of sources to identify potential discrepancies. It may be the case that while the total apparent excess number of deaths over an interval is less than the published number of COVID-19 deaths, the consequence of COVID-19 is to accelerate deaths that might have occurred later in the measurement interval.
Accurate data is needed to make informed decisions. Clearly there are issues with Irish COVID-19 mortality data. Accurate data is also needed to ensure public confidence in decision-making. Where this published data is inaccurate, this can lead of a loss of this confidence that can exploited.
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Alan McSweeney
This analysis looks at the potential impact that large numbers of electric vehicles could have on electricity demand, electricity generation capacity and on the electricity transmission and distribution grid in Ireland. It combines data from a number of sources – electricity usage patterns, vehicle usage patterns, electric vehicle current and possible future market share – to assess the potential impact of electric vehicles.
It then analyses a possible approach to electric vehicle charging where the domestic charging unit has some degree of decentralised intelligence and decision-making capability in deciding when to start vehicle charging to minimise electricity usage impact and optimise electricity generation usage.
The potential problem to be addressed is that if large numbers of electric cars are plugged-in and charging starts immediately when the drivers of those cars arrive home, the impact on demand for electricity will be substantial.
Operational Risk Management Data Validation ArchitectureAlan McSweeney
This describes a structured approach to validating data used to construct and use an operational risk model. It details an integrated approach to operational risk data involving three components:
1. Using the Open Group FAIR (Factor Analysis of Information Risk) risk taxonomy to create a risk data model that reflects the required data needed to assess operational risk
2. Using the DMBOK model to define a risk data capability framework to assess the quality and accuracy of risk data
3. Applying standard fault analysis approaches - Fault Tree Analysis (FTA) and Failure Mode and Effect Analysis (FMEA) - to the risk data capability framework to understand the possible causes of risk data failures within the risk model definition, operation and use
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Alan McSweeney
These notes describe a generalised data integration architecture framework and set of capabilities.
With many organisations, data integration tends to have evolved over time with many solution-specific tactical approaches implemented. The consequence of this is that there is frequently a mixed, inconsistent data integration topography. Data integrations are often poorly understood, undocumented and difficult to support, maintain and enhance.
Data interoperability and solution interoperability are closely related – you cannot have effective solution interoperability without data interoperability.
Data integration has multiple meanings and multiple ways of being used such as:
- Integration in terms of handling data transfers, exchanges, requests for information using a variety of information movement technologies
- Integration in terms of migrating data from a source to a target system and/or loading data into a target system
- Integration in terms of aggregating data from multiple sources and creating one source, with possibly date and time dimensions added to the integrated data, for reporting and analytics
- Integration in terms of synchronising two data sources or regularly extracting data from one data sources to update a target
- Integration in terms of service orientation and API management to provide access to raw data or the results of processing
There are two aspects to data integration:
1. Operational Integration – allow data to move from one operational system and its data store to another
2. Analytic Integration – move data from operational systems and their data stores into a common structure for analysis
Ireland 2019 and 2020 Compared - Individual ChartsAlan McSweeney
This analysis compares some data areas - Economy, Crime, Aviation, Energy, Transport, Health, Mortality. Housing and Construction - for Ireland for the years 2019 and 2020, illustrating the changes that have occurred between the two years. It shows some of the impacts of COVID-19 and of actions taken in response to it, such as the various lockdowns and other restrictions.
The first lockdown clearly had major changes on many aspects of Irish society. The third lockdown which began at the end of the period analysed will have as great an impact as the first lockdown.
The consequences of the events and actions that have causes these impacts could be felt for some time into the future.
Analysis of Irish Mortality Using Public Data Sources 2014-2020Alan McSweeney
This describes the use of published death notices on the web site www.rip.ie as a substitute to officially published mortality statistics. This analysis uses data from RIP.ie for the years 2014 to 2020.
Death notice information is available immediately and contains information at a greater level of detail than published statistics. There is a substantial lag in officially published mortality data.
This analysis compares some data areas - Economy, Crime, Aviation, Energy, Transport, Health, Mortality. Housing and Construction - for Ireland for the years 2019 and 2020, illustrating the changes that have occurred between the two years. It shows some of the impacts of COVID-19 and of actions taken in response to it, such as the various lockdowns and other restrictions.
The first lockdown clearly had major changes on many aspects of Irish society. The third lockdown which began at the end of the period analysed will have as great an impact as the first lockdown.
The consequences of the events and actions that have causes these impacts could be felt for some time into the future.
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Alan McSweeney
This analysis seeks to determine if there are excess deaths that occurred in Ireland in the interval Jan – Jun 2020 that can be attributed to COVID-19. Excess deaths means deaths in excess of the number of expected deaths plus the number of deaths directly attributed to COVID-19. On the other hand a deficiency of deaths would occur when the number of expected deaths plus the number of deaths directly attributed to COVID-19 is less than the actual deaths.
This analysis uses number of deaths taken from the web site RIP.ie to generate an estimate of the number of deaths in Jan – Jun 2020 in the absence of any other official source. The last data extract from the RIP.ie web site was taken on 3 Jul 2020.
The analysis uses historical data from RIP.ie from 2018 and 2019 to assess its accuracy as a data source.
The analysis then uses the following three estimation approaches to assess the excess or deficiency of deaths:
1. The pattern of deaths in 2020 can be compared to previous comparable year or years. The additional COVID-19 deaths can be added to the comparable year and the difference between the expected, actual from RIP.ie and actual COVID-19 deaths can be analysed to generate an estimate of any excess or deficiency.
2. The age-specific mortality rates described on page 16 can be applied to estimates of population numbers to generates an estimate of expected deaths. This can be compared to the actual RIP.ie and actual COVID-19 deaths to generate an estimate of any excess or deficiency.
3. The range of death rates per 1,000 of population as described in Figure 10 on page 16 can be applied to estimates of population numbers to generates an estimate of expected deaths. This can be compared to the actual RIP.ie and actual COVID-19 deaths to generate an estimate of any excess or deficiency.
Solution Architecture and Solution AcquisitionAlan McSweeney
This describes a systematised and structured approach to solution acquisition or procurement that involves solution architecture from the start. This allows the true scope of both the required and subsequently acquired solution are therefore fully understood. By using such an approach, poor solution acquisition outcomes are avoided.
Solution architecture provides the structured approach to capturing all the cost contributors and knowing the true solution scope.
There is more packaged/product/service-based solution acquisition activity. There is an increasing trend of solutions hosted outside the organisation. Meanwhile solution acquisition outcomes are poor and getting worse.
Poor solution acquisition has long-term consequences and costs.
The to-be-acquired solution needs to operate in and co-exist with an existing solution topography and the solution acquisition process needs to be aware of and take account of this wider solution topography. Cloud-based or externally hosted and provided solutions do not eliminate the need for the solution to exist within the organisation solution topography.
Strategic misrepresentation in solution acquisition is the deliberate distortion or falsification of information relating to solution acquisition costs, complexity, required functionality, solution availability, resource availability, time to implement in order to get solution acquisition approval. Strategic misrepresentation is very real and its consequences can be very damaging.
Solution architecture has the skills and experience to define the real scope of the solution being acquired. An effective structured solution acquisition process, well-implemented and consistently applied, means dependable and repeatable solution acquisition and successful outcomes.
Describing the Organisation Data LandscapeAlan McSweeney
Outlines an Approach to Describing the Organisation Data Landscape to Assist with Data Transformation Analysis and Planning
The Data Landscape is a representation of the organisation’s data entities and their relationships, interfaces and data flows. Data entities are data asset components that perform data-related functions, from data storage to data transfer and data processing within the Data Landscape.
The objective of developing a Data Landscape model is to define an approach for formally and exactly defining the operation and use of data at a high-level within the organisation and to plan for future changes. It allows the enterprise data fabric to be defined and modelled.
Creating a data landscape view is important as data underpins the operation of information technology solutions and business processes. Data breathes life into solutions as its flows through the organisation. The optimum and most cost-effective design of the data landscape is therefore important. Similarly, solutions that are developed or acquired and deployed on the data landscape
The nature of the organisation data landscape is changing as organisations are undergoing a data transformation.
Solution Architecture Centre Of ExcellenceAlan McSweeney
This is an extract from the book An Introduction to Solution Architecture (https://www.amazon.com/dp/1797567616) that discusses the topic of a Solution Architecture Centre Of Excellence.
The solution architecture function should aspire to be a Solution Architecture Centre Of Excellence (SACOE). This is concerned with developing a mature function that is highly-skilled at solution architecture and design and provides solution and consulting leadership to the organisation.
Developing an SACOE requires vision and resources of both the solution architecture function and information technology management.
The solution architecture function has the capability to develop both the business insight and solution and technology expertise to act as the business/technology authority and be the bridge between the business and technology domains of the organisation.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
We Need To Talk About IT Architecture
1. We Need To Talk About IT
Architecture
Alan McSweeney
http://ie.linkedin.com/in/alanmcsweeney
2. IT Architecture Is Failing
• It is failing the business
− It is not delivering on business strategy and business objectives
− It is not helping the business respond to external and internal pressures
− It is not providing the consulting and advisory services to enable the
business derive value from new technologies
− It is not driving IT innovation
− It is not making itself relevant or useful to the business
• It is failing the IT organisation
− It is not assisting with engagement with the business to architect
solutions needed by the business
− It does not work as an integrated function across all architectural areas
− It is not defining IT architectures that enable a portfolio of solutions to
be delivered and operated quickly
− It is not innovating the IT portfolio and architecture to take advantage
of and integrate new technologies
27 November 2017 2
4. What Are the Symptoms And Consequences Of IT
Architecture Failures
• Shadow IT – business diverting IT expenditures outside the
IT function
• The business bypasses what they view and experience as
an unresponsive central IT organisation and goes directly
to external service providers
− Business shift to cloud service providers offering infrastructure-
less solutions with no perceived IT involvement
− Business need to respond to the interrelated developments of
digital, mobile and social computing and perceived inability of the
central IT function to respond
− Outsourcing and the divestment of IT functions in response to
business wishes to remove the overhead
27 November 2017 4
5. Technical Consequences Of Failing IT Architecture
• Inability to rapidly respond to challenges driven by business changes
• Lack of commonality and consistency due to the absence of standards
• Lack of focus on enterprise requirements
• Lack of common direction and savings due to synergies
• Incomplete visibility of the current and future target enterprise architecture vision
• Inability to predict impacts of future changes
• Increased gaps and architecture conflicts
• Dilution and dissipation of critical information and knowledge of the deployed
solutions
• Rigidity, redundancy and lack of scalability and flexibility in the deployed solutions
• Lack of integration, compatibility and interoperability between applications
• Complex, fragile and costly interfaces between applications
• Fragmented and ad hoc solution delivery driven by a tactical and reactive
approach
27 November 2017 5
6. IT Architecture Failing Relationships
27 November 2017 6
IT Function Business
IT Responds
and Delivers
Slowly
Business Want
Rapid Response to
Need and Changes
IT Does Not
Understand or Invest
in and Develop IT
Architecture
IT Architecture Does
Not Provide Technology
Leadership
Business Does Not View IT
Architecture As Provider of
Technology Consulting Services
IT Architecture Is
Inwardly and
Backwardly Focussed
Rather Than Being
Business LeadIT Architecture
7. Consequences Of Failing Relationships
27 November 2017 7
IT Function
Business
IT Responds
and Delivers
Slowly
Business Want
Rapid Response to
Need and Changes
IT Does Not
Understand
or Invest in
and Develop
IT
Architecture
IT Architecture
Does Not Provide
Technology
Leadership
Business Does Not View
IT Architecture As
Provider of Technology
Consulting Services
IT Architecture Is
Inwardly and
Backwardly Focussed
Rather Than Being
Business Lead
IT Architecture
External
Service
Provider
External
Service
Provider
External
Service
ProviderExternal
Service
Provider
Outsourcing
and
Divestment of
IT Functions
External
Service
Provider
Business
Shift to
Cloud
Service
Providers
8. Shadow IT Expenditure
• CEB Global - estimate in 2013 that 40% of IT expenditure does not go through the
central IT function
• Everest Group - estimate in 2017 that 50% of IT expenditure does not go through
the central IT function
• Logicalis - 2015 survey of over 400 global CIOs
− 90% of CIOs worldwide are sometimes bypassed the business
− 31% of CIOs are routinely side-lined when the business makes IT purchasing decisions
• The problem of the business bypassing the central IT function is getting worse
• Shadow IT is an unpleasant reality
• Shadow IT is a symptom of a post-IT world
− The central IT function loses relevance and control
− Businesses reduce their reliance on the core IT function
• The extent of the problem may be masked by IT outsourcing which may be
notionally counted as a central IT spend
• The failure of IT architecture to engage with business requirements owns part of
the blame
November 27, 2017 8
9. IT Architecture’s Multiple Failings
27 November 2017 9
All to frequently
inwardly focussed,
staffed by IT
personnel,
focussed on IT
rather than on the
business
Demonstrates
aspects of
groupthink and
focalism
Too remote from
business concerns
and not business
oriented and
focussed
Concerned with
documenting
current IT
technology state,
standards and
processes in detail
rather than looking
to the future
Too dogmatic,
rigid and inflexible
Focused on
compliance,
control and
government and
adherence to rules
Obsessed with
architecture
frameworks,
reference models
and patterns
Overly controlling Reactive
Work not linked to
performance
metrics
Speaks the
language of
technology rather
than business
Communicates to
the business
badly, if at all
Not concerned
with delivery
Does not measure
its delivery in
terms of business
benefits realised
Slows down
rather than
accelerates
delivery through
disproportionate
governance
10. IT Architecture Operational Reality
• Individual architecture disciplines all too frequently operate as
disintegrated and siloed functions
− Limited and poor communications
− No overall management
− Inconsistent approaches
− Deficient or absent cooperation
− Often adversarial relationships between disciplines, characterised by
infighting
− Overall lack of efficiency and effectiveness
− Contributes to poor perception of IT by business
• Individual architecture practices throw work over the wall at
one another
• Enterprise architecture function perceives itself as superior to
other architectural areas
27 November 2017 10
11. IT Architecture Operational Reality
E
N
T
A
R
C
H
B
U
S
A
R
C
H
S
E
C
A
R
C
H
D
A
T
A
R
C
H
S
O
L
A
R
C
H
T
E
C
H
A
R
C
H
I
N
F
A
R
C
H
S
E
R
V
A
R
C
H
A
P
P
L
A
R
C
H
12. The Business Experience Of IT
• The business experience of IT systems are:
− Slow and costly to deliver and all to frequently late and not what
the business needs
− Unmanageably complex and costly to maintain
− Hindering the organisation's ability to respond to business and
economic changing environment
− Not integrated
• Mission-critical information is consistently out-of-date
and/or actually incorrect and/or only partially available
• A culture of distrust persists between the business and
technology functions of the organisation
November 27, 2017 12
13. Converting The IT Architecture Silos To Delivery
Channel
• The individual silos need to be converted to an integrated
delivery channel
27 November 2017 13
14. November 27, 2017 14
IT Too Often Fails to Support Business Change
Effectively
• Technology integration is costly, risky and complicated
• Information is everywhere but getting access to the right
information at the right time is very difficult
• The business wants IT to be fast, dynamic and flexible
• The business gets IT that is sluggish and rigid
• Modifying system behaviour takes too long and changes
are difficult to communicate and implement effectively
• Much of IT system and operations expenditure is bloated
and fixed where operations run with excess redundant
capacity
• IT seen as a cost centre and not a source of business value
15. IT Architecture Landscape – Some Questions
• Is the complexity of IT architecture and its multiple separate
views contributing to the problems between business and IT?
• Are the separate IT architecture functions too inwardly
focussed rather than being business focussed?
• Is the hierarchy within IT architecture roles with enterprise
architecture perceived as the highest ranking function part of
the problem?
• Is there a need for an overarching IT architecture function – not
enterprise architecture - that co-ordinates the activities of
specific IT architecture roles?
• Is there a need for non-technology involvement in IT
architecture to provide a business dimension to ensure linkage
between architecture and business exploitation of technology?
27 November 2017 15
16. Enterprise Architecture Failings
• Enterprise architecture leads the IT architecture failures
• Views itself as the most senior and important architecture
function
• Imposes disproportionate and unnecessary governance
and overhead
• Remote and disconnected from the business
• Too many non-value adding activities
• All too often viewed by both business and IT as a function
to be bypassed and ignored
27 November 2017 16
17. Enterprise Architecture Frameworks
• Lots of (too many) enterprise architecture frameworks
• Rarely fully implemented
• Frequently partially developed with development now
stopped
• All narrowly focussed – does not cover full spectrum of IT
architecture
27 November 2017 17
18. Enterprise Architecture Frameworks
27 November 2017 18
Name Details
ArchiMate https://www.archimatetool.com/
http://www.opengroup.org/subjectareas/enterprise/archimate
Australian Defence Architecture Framework http://www.defence.gov.au/publications/docs/Defence%20Capab
ility%20Development%20Handbook%20(DCDH)%202014%20-
%20internet%20copy.pdf
Australian Government Architecture Reference Models https://www.finance.gov.au/archive/policy-guides-
procurement/australian-government-architecture-aga/
Big Data Architecture Framework https://bigdatawg.nist.gov/_uploadfiles/M0055_v1_7606723276.
pdf
Business Process Framework (eTOM)/ Frameworx https://www.tmforum.org/business-process-framework/
https://www.tmforum.org/collaboration/frameworx-project/
CBDI Service Architecture & Engineering (CBDI-SAE) for
SOA
http://everware-cbdi.com/products/framework-products/cbdi-
sae-metamodel
CEA Framework: A Service Oriented Enterprise
Architecture Framework (SOEAF)
http://www.jatit.org/volumes/Vol40No2/8Vol40No2.pdf
Common Approach to Federal Enterprise Architecture https://obamawhitehouse.archives.gov/sites/default/files/omb/a
ssets/egov_docs/common_approach_to_federal_ea.pdf
CORA Model for IT Application Reference Architecture http://www.coramodel.com/
Data Management Book of Knowledge https://www.dama.org/content/body-knowledge
Department of National Defence/Canadian Armed
Forces Architecture Framework
http://www.forces.gc.ca/en/about-policies-standards/dndaf.page
Dragon1 https://www.dragon1.com/enterprise-architecture-tool
19. Enterprise Architecture Frameworks
27 November 2017 19
Name Details
Dynamic Architecture https://www.sogeti.nl/expertises/dya
EAM Pattern Catalog http://eam-initiative.org/pages/1dgrgdhvpv2y2/Enterprise-
Architecture-Management-Pattern-Catalog
Enterprise Architecture Body of Knowledge http://eabok.org/
ESS Enterprise Architecture Reference Framework https://ec.europa.eu/eurostat/cros/content/ess-enterprise-
architecture-reference-framework_en
Essential Architecture Framework https://www.enterprise-architecture.org/
European Space Agency Architecture Framework https://essr.esa.int/project/esa-architecture-framework
Extreme Architecture Framework http://extremearchitecture.org/
Gartner’s Enterprise Architecture Framework https://www.gartner.com/doc/486650/gartners-enterprise-
architecture-process-framework
ISO Reference Model for Open Distributed Processing http://www.rm-odp.net/
Leading Enterprise Architecture Development (LEAD)ing
Practice
http://www.leadingpractice.com/
MEGAF http://megaf.di.univaq.it/
Method for an Integrated Knowledge Environment http://mike2.openmethodology.org/
National Association of State Chief Information Officers https://www.nascio.org/EA
https://www.nascio.org/portals/0/EAToolKit/NASCIO-AEADTool-
Kitv3.pdf
National Enterprise Architecture Framework http://www.nea.gov.bh/
20. Enterprise Architecture Frameworks
27 November 2017 20
Name Details
NATO Architecture Framework http://www.nhqc3s.nato.int/ARCHITECTURE/_docs/NAF_v3/ANN
EX1.pdf
NIST Enterprise Architecture Model https://bigdatawg.nist.gov/_uploadfiles/M0197_v1_3201181507.
pdf
OIO Enterprise Architecture Method http://arkitekturguiden.digitaliser.dk/introduction-national-
enterprise-architecture-denmark
Pragmatic Enterprise Architecture Framework http://www.pragmaticea.com/
Queensland Government Enterprise Architecture https://www.qgcio.qld.gov.au/products/qgea-documents/547-
business/2786-queensland-government-enterprise-architecture
Rozanski and Woods https://www.viewpoints-and-perspectives.info/
The EPCglobal Architecture Framework https://www.gs1.org/epcrfid-epcis-id-keys/epc-rfid-architecture-
framework/1-7
The Open Group Architecture Framework http://www.opengroup.org/subjectareas/enterprise/togaf
UK Ministry of Defence Architecture Framework https://www.gov.uk/guidance/mod-architecture-framework
US Department of Defense Architecture Framework http://dodcio.defense.gov/Library/DoD-Architecture-Framework/
US Federal Enterprise Architecture Framework https://www.feacinstitute.org/
US OMB Enterprise Architecture Assessment
Framework
https://obamawhitehouse.archives.gov/omb/E-Gov/eaaf
21. The Ideal Sequence From Business Strategy To IT
Solution Portfolio Operation And Usage
27 November 2017 21
Business
Objectives
Business
Operational
Model
Solution
Portfolio
Realisation
And
Delivery
Solution
Usage,
Management ,
Support
And
Operations
Business
Strategy
Business
IT
Strategy
Solution
Portfolio
Design And
Specification
• The should be a direct link from business strategy to
business IT strategy to IT solution delivery
• The IT architecture functions play a key role in ensuring
this alignment and continuity from concept to
actualisation
22. Pressures On Business Means Pressures On IT
27 November 2017 22
IT Strategy
and
Delivery
Business
Strategy and
Requirements
Business
Pressures
If the IT function
cannot react to
the
requirements of
the business, the
business will go
elsewhere
Business shift to
cloud service
providers offering
infrastructure-less
solutions with no
perceived IT
involvement
Outsourcing and the
divestment of IT
functions in
response to business
wishes to remove
the overhead
Business need to
respond to the
interrelated
developments of
digital, mobile and
social computing
and perceived
inability of the
central IT function to
respond
23. The Frequent Actual Sequence From Business Strategy To
IT Solution Portfolio Operation And Usage
27 November 2017 23
Business
Objectives
Business
Operational
Model
Solution
Portfolio
Realisation
And
Delivery
Solution
Usage,
Management ,
Support
And
Operations
Business
Strategy
Business
IT
Strategy
Solution
Portfolio
Design And
Specification
External
Suppliers and
Service
Providers
Business
shadow IT
expenditure
External
Suppliers and
Service
Providers
External
Suppliers and
Service
Providers
Business-perceived barriers
to solution delivery by
internal IT organisation
Shadow IT solutions
passed to support
function
At least 40% of
technology spending is
diverted from IT
Over 30% of CIOs
routinely not consulted
on IT solution acquisition
and expenditure
24. Consequences Of Fragmented IT Landscape
• High variability and lack of standardisation across business
units, driven by changes in business strategy, governance,
organisation and process
• Inconsistent data definitions, multiple databases, releases and
configurations which result in duplication of licenses, duplicate
and inconsistent information, complexity in testing
• Multiple vendors, multiple instances and versions which add
complexity in procurement, development and release
management, resulting in higher costs and longer time to
market
• Multiple operating environments, multiple hardware vendors
and types, leading to higher maintenance and personnel costs,
greater instability and time-to-fix
27 November 2017 24
25. Consequences Of Failing IT Architecture
• Shadow IT expenditure by business outside the control and
knowledge of the IT function
• Fragmented solution landscape
• Outsourcing and the divestment of IT functions in
response to business wishes to remove the difficulties of
dealing with IT function
• Shrinking and deskilled IT function
27 November 2017 25
26. Consequences Of Failing IT Architecture – Spiral Of
Failure
27 November 2017 26
Business Acquires IT
Solutions Outside IT
Organisation
IT Organisation
Loses Skills and
Resources
Unmanaged
Complexity in IT
Landscape
Business
Continues To
Acquires IT
Solutions
Outside IT
Organisation
IT Organisation Is
Not Trusted to
Deliver Solutions
Complexity in
Integrating
Multiple Solutions
and Their Data
Business Receives
Unsatisfactory
Service from IT
27. So What Is IT Architecture?
• IT Architecture is concerned with:
− The translation of business strategy and
business objectives into the design and
operation of required IT systems
− Planning, designing and assisting with
the delivery of portfolio of IT systems
and solutions to meet the needs of the
organisation
− The design and implementation of IT
infrastructural framework to enable IT
solutions be acquired, implemented and
operated quickly
− The design systems and processes to
ensure the security of information and
systems
− The design and implementation of data
frameworks to allow the comprehensive
management of data across systems
27 November 2017 27
28. Integrated IT Architecture Function And Disciplines
27 November 2017 28
IT Architecture
Business Secondment to Architecture Function
Enterprise
Architecture
Application
Architecture
Business
Architecture
Solution
Architecture
Informationand
DataArchitecture
Security
Architecture
Technical
Architecture
Infrastructure
Architecture
Service
Architecture
29. IT Architecture Disciplines
• Enterprise Architecture – defines, develops, extends and manages the implementation and
operation of the overall IT delivery and operation framework including standards and solution
development and acquisition
• Application Architecture – defines application architectures including development, sourcing,
deployment and integration
• Business Architecture – defines and manages the implementation of IT solutions and related
organisation changes needed to implement business strategy and objectives
• Solution Architecture – designing and overseeing the implementation of a portfolio of IT solutions
that translate business needs into operable and usable systems that comply with standards
• Service Architecture – designing and overseeing the implementation of service processes and
supporting technologies and systems to ensure the successful operations of IT solutions including
outsourced supplier management framework
• Security Architecture – designing data and system security processes and systems to ensure the
security of information and systems across the entire IT landscape
• Information and Data Architecture – design, define and implement framework to manage
information across the entire IT landscape and through its lifecycle
• Technical Architecture – translating solution designs into technical delivery, acting as a bridge
between solution architecture and the delivery function and designing new delivery approaches
• Infrastructure Architecture – designing application, communication and data infrastructures to
operate the portfolio of IT solutions
27 November 2017 29
30. IT Architecture Disciplines
• Logical set of functional
areas and sets of skills
required within the IT
function
• Can be combined within
several roles
27 November 2017 30
31. IT Architecture Discipline Interactions
27 November 2017 31
Security
Architecture
Enterprise
Architecture
Information
And Data
Architecture
Service
Architecture
Business
Architecture
Technical
Architecture
Solution
Architecture
Infrastructure
Architecture
Application
Architecture
32. IT Architecture Discipline Interactions
• Individual IT architecture disciplines all interact with one
another
• IT architecture disciplines need to work together as an
integrated overall business-oriented and delivery-focussed
team
• Multiple interactions that need to be facilitated and
managed centrally
27 November 2017 32
33. Build A Vision For IT Architecture
• To get the greatest benefit from IT architecture, build a
vision for the IT architecture function
• Establishing a running an integrated IT architecture
function is not a project with a beginning, middle and end
• It is a continuous engagement
27 November 2017 33
34. Base IT Architecture Vision On Core Principles
27 November 2017 34
IT
Architecture
Principles
Focus On Generating
Business Value Quickly
It Is All About The User
Experience
Always Look for
Innovation
Speed of Delivery Is
Important
Appropriate and
Necessary Detail and
Complexity OnlySimplify, Simplify,
Simplify
Leadership, Proactivity
and Co-operation
Data Breathes Life Into
Systems
Embed Security As
Standard
Live With Mixed
Technical Environment
35. Base IT Architecture Vision On Core Principles
• Define a set of principles that underpin and govern the
operation of the integrated IT architecture function
− Focus On Generating Business Value Quickly
− It Is All About The User Experience
− Always Look for Innovation
− Speed of Delivery Is Important
− Appropriate and Necessary Detail and Complexity Only
− Simplify, Simplify, Simplify
− Leadership, Proactivity and Co-operation
− Data Breathes Life Into Systems
− Embed Security As Standard
− Live With Mixed Technical Environment
27 November 2017 35
36. November 27, 2017 36
Why Invest in IT Architecture
Reduced IT Costs
Increased
Business
Value
Enable faster and easier
collaboration through
application and data
integration
Enable faster response
to business changes and
new demands at lower
cost
IT projects will have a
greater success –
delivered on time, on
budget and to user
requirements – reducing
cost through avoidance
of rework
Solutions will be
delivered at lower
implementation and
operational costs
Increased Success in
Solution Delivery
Reduced IT Costs
Increase Use
of IT
Enable
Greater
Business
Agility and
Flexibility
37. IT Architecture Needs To Be A Lens Focussing
Business Objectives Onto Solution Landscape
27 November 2017 37
IT
Architecture
Business
Objectives
and
Requirements
Service
Operations
and
Provision
Technology
Landscape
Solution
Delivery
Supplier
EcosystemIT Architecture Needs to
Mediate Between the Business
and Suppliers/
Technologies/Delivery Acting as
a Lens Focussing Business
Needs on Appropriate Solutions
38. Benefits Of Integrated IT Architecture Function
• Align IT and business for planning and execution purposes
• Optimise resources - technology, people and processes
• Increase business interoperability
• Reduce complexity in IT infrastructure
• Improve business agility to support dynamic change
• Drive re-usability of architecture models and best practices
• Streamline informed decision making
• Standardise IT for cost effective delivery of services
• Eliminate duplication and redundancy and reduce cost of ownership and
return on investment
• Reduce risks for future investment
• Faster, simpler and cheaper procurement
• Manage information/data and knowledge as a corporate asset
• Manage change based on a clear understanding of its impact
27 November 2017 38
39. Technology Influences And Impacts On Business And
IT
• An effective
business-oriented
IT architecture
function can get
the correct balance
between too little
and too much, too
slowly and too
quickly
27 November 2017 39
40. IT Architecture As Internal Business Consulting And
Advisory Function
• What IT Architecture Can Do
• Identify trends in advance that offer
opportunities or represent challenges
• Assist with the design and development of
new business models
• Acquire the skills and experience to be a
credible business advisor
• Be able to translate innovation and creativity
into practical, realistic, implemented and
operated business solutions
• What IT Architecture Must Do To
Achieve Its Potential
• Take an appropriate and sufficient approach
to architecture
• Take a realistic approach to innovation
− Radical innovation
− Incremental innovation
− Innovation By reapplication
• Focus on simplicity and speed rather than
completeness and perfection
• Understand appropriate complexity
• Be able to react to changes quickly
27 November 2017 40
41. IT Architecture Core Principles And Business
Engagement Model
• A business engagement model is needed to breathe life
into and operationalise the IT Architecture Core Principles
November 27, 2017 41
IT
Architecture
Consulting
Business
Engagement
Team
Skills,
Capabilities
and Experience
Overall IT
Architecture
Function
Management Consulting and
Engagement
Process
Tools and
Methodologies
42. IT Architecture Business Engagement Model
• Achieve potential for IT architecture, for the IT organisation
and for the business
− Overall IT Architecture Function Management – integrating IT
architecture practices and skills into a whole, being able to represent
the benefits of these skills and experiences to the IT organisation and
wider business and being able to manage the delivery of services that
contribute to success
− Business Engagement Team - an IT architecture team that can work
together in a consulting environment
− Skills, Capabilities and Experience – appropriate sets of skills and
experiences across all technology and service areas to deliver the
services
− Consulting and Engagement Process – an engagement process that
delivers quality results and outputs quickly, speaking the language of
business
− Tools and Methodologies – select, develop and use appropriate
toolsets and frameworks to underpin the consistent and reliable
delivery of consulting services and to convert the language of business
into the language of IT
27 November 2017 42
43. IT Architecture Team
• Needs to operate
as a team rather
than a set of siloed
internally focussed
IT roles
• Involve business as
well as
technologists
November 27, 2017 43
44. Co-Ordinated And Business Focussed IT Architecture
Function
• Eliminate the divisions between the separate IT
architecture roles
• Get the business involved in the IT architecture function
• Manage and co-ordinate all IT architecture centrally
• Measure delivery and benefits achieved
• Be outward facing and future-oriented
27 November 2017 44
45. The Importance Of Early Engagement In IT
Architecture
• Early engagement in the solution delivery process occurs
before any solution delivery project is initiated
• The objective is to is understand the scope, requirements,
objectives, approach, options and to get a high-level
understanding of the likely resources, timescale and cost
required before starting the project
• Allow the feasibility of the solution options to be assessed
• Converts a request from the business to an explored and
refined high-level solution proposal that facilities informed
decision-making
• Early engagement is the IT function providing true consulting
services and value to the business
− Being a partner to the business
27 November 2017 45
46. An Effective Early Engagement Process Requires …
• A consistent, organised and controlled approach to
performing such engagements
• A standard method for performing analysis, collecting
information, engaging with the business, making
assessment and solution option identification
• A process for managing early engagements from resources
required to engagement with the business to prioritisation
to quality management, assurance and control
• A standard and consistent approach for representing the
results of the engagement
27 November 2017 46
47. Business And IT Architecture Alignment
27 November 2017 47
New
Business
Models
Competition
Service Focus and
Customer
Expectations
Increased
Pace of
Change
Increased
Regulation
Business and
Technology
Changes
Business
and
Technology
Changes
Increased
Pace of
Change
Assist With The
Design of New
Business Models
Identify Technology
Trends That Offer
Opportunities or
Represent Challenges
Identify
Opportunities
for Efficiencies
Translate
Innovation
into Business
Solutions
Business
Objectives
Business
Operational
Model
Solution
Realisation
And
Delivery
Usage,
Management ,
Support
And
Operations
Business
Strategy
Business
IT
Strategy
Solution
Design And
Specification
48. Business And IT Architecture Alignment
• IT architecture needs to:
− Enable the business respond to and realise changes in response to
external and internal pressures
− Identify business opportunities in technology trends and occasions for
changes and greater efficiencies
• IT Architecture needs to be able to contribute to the
development of business strategy and to be trusted to be able
to make a contribution
• Identify how the business can use technologies and how the
business should be shaped to take advantage of technologies
• Provide advice on the potential of new technologies and how
to react to technology changes
• Offer real business consulting and the addition of business
value
27 November 2017 48
49. Many Overlapping IT Architecture Disciplines
Involved In The Journey
27 November 2017 49
• There are lots of IT architecture areas that combine to enable the journey
to be completed
• All too often these operate as separate functions with no single view
• All too often there is conflict between the disciplines
Business Architecture
Information and Data Architecture
Infrastructure Architecture
Solution Architecture
Enterprise Architecture
Technical Architecture
Security Architecture
Business
Objectives
Business
Operational
Model
Solution
Realisation
And
Delivery
Usage,
Management ,
Support
And
Operations
Business
Strategy
Business
IT
Strategy
Solution
Design And
Specification
Service ArchitectureApplication Architecture
50. Many Overlapping IT Architecture Disciplines
Involved In The Journey
• Separate architecture functions involved in the spectrum
of activities involved in the translation of business strategy
and objectives into an integrated portfolio of IT solutions
• Complex and fragmented IT architecture and its multiple
separate views and handoffs contribute to the problems
between business and IT
• Separate IT architecture functions too inwardly focussed
rather than being business focussed
27 November 2017 50
51. IT Architecture
• IT architecture function needs to encompass all disciplines
• Disciplines need to work together
27 November 2017 51
Business Architecture
Information and Data Architecture
Infrastructure Architecture
Solution Architecture
Enterprise Architecture
Technical Architecture
Security Architecture
Service ArchitectureApplication Architecture
52. Integrated IT Architecture Function
• IT architecture needs to operate as an integrated function
across all its disciplines
• Need for an overarching IT architecture function – not
enterprise architecture - that co-ordinates the activities of
specific IT architecture disciplines across the IT landscape
• Need for non-technology involvement in IT architecture to
provide a business dimension to ensure linkage between
architecture and business exploitation of technology
27 November 2017 52
53. Business And IT Architecture Alignment
Should flow seamlessly
in both directions –
from business to IT and
from IT to business
27 November 2017 53
Business
Objectives
Business
Operational
Model
Solution
Realisation
And
Delivery
Usage,
Management ,
Support
And
Operations
Business
Strategy
Business
IT
Strategy
Solution
Design And
Specification
Business Pressures
Leading to IT Architecture
Demands
IT Architecture Actively
Identifying Technology Trends
And Opportunities
54. IT Architecture – Two-Way Contribution To The
Business
November 27, 2017 54
HowWhat
How What
Translate the What of
business requirements into
the How of technology
and process
Translate the What of new
technologies into the How
of the application to the
business
55. Technology Is Both A Cause Of Change And An
Enabler of Change
November 27, 2017 55
Customers Demand Products and Services Are
Delivered Using New Technology
Competitors Avail of New Technologies to Improve Efficiencies, Reduce
Cost or Offer New Products and Services
New Technologies Offer Opportunities to Improve
Efficiencies, Reduce Cost or Offer New Products and Services
ITArchitecture
ITArchitecture
56. IT Architecture Needs To Be Part Of The Overall IT
Organisation
• IT architectures function and the overall IT organisation exists
to deliver across the range of IT activities
− Doing – Run The Business
• Business as usual activities (BAU) related to administering and operating
production IT systems and providing service to users
− Managing The Doing – Run The Business
• Managing the BAU function and its service delivery
− Doing – Change the Business
• Implementing projects and delivering new services and systems
− Managing The Doing – Change The Business
• Managing the projects and associated changes
• IT architecture does not exist on its own
• IT architecture must work co-operatively with other functions
within the IT organisation
• IT architecture must deliver
27 November 2017 56
57. IT Organisation Context Of IT Architecture Function
27 November 2017 57
Testing, Validation,
Quality Assurance
Business and
Process Analysis and
Design
Sourcing and
Supplier
Management,
Acquisition,
Procurement
Solution
Development and
Delivery
User Experience
Design
Infrastructure,
Networks and
Communication
Demand and Supply
Management,
Capacity Forecasting
and Planning
Organisation Design
and Planning,
People Asset
Management
Security, Continuity
and Disaster
Recovery
Relationship
Management and
Business
Engagement
Programme,
Portfolio, Project
Management
Service Provisioning,
Service Delivery and
Service
Management
Accounting,
Funding, Financing,
Budgeting and
Planning
IT Strategy,
Leadership and
Governance
58. IT Organisation Context Of IT Architecture Function
• The IT Architecture function must work co-operatively with
the other functions of the overall IT organisation
27 November 2017 58
59. Business Context Of IT Organisation
• The IT organisation also exists in a business context
27 November 2017 59
Business
Objectives
Business
Operational
Model
Solution
Portfolio
Realisation
And
Delivery
Solution
Usage,
Management ,
Support
And
Operations
Business
Strategy
Business
IT
Strategy
Solution
Portfolio
Design And
Specification