Avancier Reference Model

Size: px
Start display at page:

Download "Avancier Reference Model"

Transcription

1 Reference Model Architecture Context/Precursors (ESA 2) It is illegal to copy, share or show this document (or other document published at without the written permission of the copyright holder Copyright Limited Architecture context/precursors Initiate Establish 1 Architecture capability and architects Establish 2 Architecture the context precursors Intermediate level Scope 3 Architecture the endeavour frameworks Get vision approved Govern 11 Architecture in Operations 11 Architecture Governance 11 Architecture Change Management 11 Architecture Implementation Intermediate level Architect 4 Business & 5 Data architecture 6 Software & 7 Apps architecture 8 Design for NFRs 9 Infrastructure architecture Practitioner Plan 10 Migration Planning Migration path Business case Delivery Plans Copyright Limited 2013 Copyright Limited

2 2. Architecture precursors 2. Architecture precursors Stakeholders and concerns Structured requirements & constraints Explicit requirements Implicit requirements Target solution hierarchy Scope of architecture work Business case (before architecture) Stakeholders Owners Customers Suppliers Managers Designers Builders Operators Copyright Limited 2013 Stakeholders Stakeholder Stakeholder catalogue Stakeholder management [an actor or role] an individual, team, organization, or class thereof, having one or more concerns about or interests in a system, and/or power over the architecting of it. [an artefact] that contains a list of stakeholders. It might record concerns, interest level, power level, and/or a plan for communicating with that stakeholder [a technique] for ensuring concerns of stakeholders are understood and addressed, with a view to ensuring that stakeholders support changes that are envisaged. A stakeholder s position in a power/interest grid helps to prioritise attention to their concerns and determine a suitable communication plan. Stakeholders Owners Customers Suppliers Managers Designers Builders Operators Copyright Limited 2013 Copyright Limited

3 Enterprise and solution architecture stakeholders include: Architect stakeholder Stakeholders Owners & Customers Managers & Designers Builders & Operators Enterprise and solution architecture stakeholders include: Owners: business and IT board members, customers. Managers: programme/project/change managers. Buyers: procurement/acquisition organisation. Suppliers: service and product providers. Designers, Builders, Testers: other project team members: Users: representatives and domain experts. Operators and Maintainers: IT Services Management. Business sponsors and stakeholders IS sponsors and stakeholders IT sponsors and stakeholders Copyright Limited 2013 Concerns Concern Stakeholders Owners & Customers Managers & Designers Builders & Operators An interest in a system relevant to one or more of its stakeholders. Any topic of interest pertaining to the system. A subject matter that is used to determine coverage of the architecture description, with no target or measure attached. (E.g. system behaviour, development cost, availability, disaster recovery, safety, all requirements, all standards, a particular standard, modularity.) Business sponsors and stakeholders IS sponsors and stakeholders IT sponsors and stakeholders Copyright Limited 2013 Copyright Limited

4 Stakeholders Sponsor Request for architecture work [a stakeholder] who is willing to apportion money or other resources to some work. [a document] a request from a sponsor for an architect to architect one or more systems. The first architecture deliverable to be recorded in an architecting process. Stakeholders Owners Customers Suppliers Managers Designers Builders Operators Copyright Limited 2013 The solution architect is the chief technical risk mitigator Owners: business and IT board members, customers. Explain problems and solutions Sell solutions, manage expectations Managers: programme/project/change managers. Steer plans Buyers: procurement/acquisition organisation. Explain requirements Suppliers: service and product providers. Engage suppliers Apply due diligence to suppliers Monitor quality (and timeliness?) of supplier deliverables Designers, Builders, Testers: other project team members: Approve designs, govern architectures and implementation Monitor quality and timeliness of team deliverables Users: representatives and domain experts Explain problems and solutions Sell solutions, manage expectations Operators and Maintainers: IT Services Management. Shoot troubles For all stakeholders, the architect identifies and mitigates technical risks Copyright Limited 2013 Copyright Limited

5 How to manage stakeholders? The techniques of business and systems analysis can help Interviews Workshops Documentation of problems and requirements Stakeholder management per se is something else 1. Identify Your Stakeholders 2. Prioritize Your Stakeholders: 3. Understand your key stakeholders 4. Classify by attitude 5. Consider how to manage blockers 6. Record you analysis in a stakeholder map. 7. Plan communication with each stakeholder See the process in Methods Copyright Limited 2013 Plan communication with each stakeholder Are you communicating as effectively as you should be with your stakeholders.? The end product Stakeholders Owners & Customers Managers & Designers Builders & Operators Stakeholder Concerns Power (H,M,L) Interest (H,M,L) Communication plan 1 Customer Goal, Deadline High High Involve - Manage closely 2 Manager Reputation, Profit High Low Persuade Satisfy - Monthly status report 3 End user Usability Low High Inform Weekly newsletter JAD workshops 4 Sales person Customer relationship Low Low Monitor Copyright Limited 2013 Copyright Limited

6 2. Architecture precursors 2. Architecture precursors Stakeholders and concerns Structured requirements & constraints Explicit requirements Implicit requirements Target solution hierarchy Scope of architecture work Business case (before architecture) Directives Principle Aims Goal Objective Copyright Limited 2013 CxO level influences CxO-level Influences Driver Mission Vision Influence a belief, fact or statement that acts as a requirement for or constraint on behaviour or choices. Examples include instances of drivers, directives, aims (defined below). Driver [an influence] a force, recognised by managers, that shapes the directives and aims of a business. Driver areas and types include Political, Economic, Social, Technical, Legal and Ecological (PESTLE) and Strengths, Weaknesses, Opportunities and Threats (SWOT). Copyright Limited 2013 Copyright Limited

7 Imposing a structure on the mess of precursors The inputs to architecture definition include high level aims, directives, visions and strategies. During architecture definition, these are decomposed and elaborated. So the outputs include lower-level elaborations of the inputs. This reference model tends to distinguish different levels of decomposition by using different words. CxO level influences Driver Mission Vision EA Could enter here Directives Principle Aims Goal levels Vision Plans Strategy SA Could enter here Objective Outline Programme Could enter here to Build Project Copyright Limited 2013 Business analysis concepts mapped to E&SA concepts SWOT Strengths (internal) Weaknesses (internal) Opportunities (external) Threats (external) Enterprise Business Organisation Directives Principle PESTLE (external forces) Political Economic Social Technological Legal Environment Driver Mission Vision Aims Goal Objective levels Vision Outline to Build Plans Strategy Programme Project 5-forces analysis (external forces) Buyers Suppliers Competitors New entrants Substitute products MOST Mission Objectives Strategy Tactics Business activity model Control activities Monitoring activities Doing activities Enabling activities Planning activities Copyright Limited 2013 Copyright Limited

8 Drivers Drivers are pressures external or internal - e.g. changes in customer behaviour or interest the threat of increased competition from a new entrant to the market. high turnover of staff, with negative reports in leaving interviews. increased media attention to embarrassing loss of citizen data. Drivers stimulate enterprise leaders to define aims and directives for activity. Forces Drivers (SWOT) Visions Mission Directives Aims Copyright Limited 2013 From drivers to directives Driver = high turnover of staff, with negative reports in leaving interviews. Principle = We value our people. Driver = increased media attention to embarrassing loss of citizen data. Principle = Data security is paramount. Drivers (SWOT) Forces Visions Mission Directives Principles Policies s Copyright Limited 2013 Copyright Limited

9 A structured terminology for directives helps people talk about directives at different levels of abstraction Executive level Driver (inc SWOT) Mission Vision EA level Principle Principle Principle Principle Principle SA level Not a strict hierarchy More art than science Copyright Limited 2013 Directives Directive Directives Principle [an influence] a principle or policy, enduring and seldom amended, that steers or constrains behaviour or choices. It may be specifiable as a data processing rule. Directives may be arranged in a hierarchical structure in which principles are supported by lower level policies, and policies are specified as business rules. Copyright Limited 2013 Copyright Limited

10 Directives: Policies Principle [a directive] that is strategic and not-directly-actionable. (E.g. Waste should be minimised. Data security is paramount.) [a directive] that is more tactical than a principle. It may be implemented by business rules. (E.g. The public have minimal access to business data. USB ports are disabled. Messages at security level 3 are encrypted.) Business [a directive] that is formalised in data processing. (E.g. Access Level = Low if User Type = Public. See Process rule and Data rule for further definition.) Copyright Limited 2013 Directives: IT Architecture Principles The practitioner manual has a menu of c80 principles. And this example from one enterprise E.g. a Telco s principles 1. Buy rather than Build 2. Adopt a multi-tier systems architecture 3. Minimise and manage duplication of data and system functionality 4. Maximise the re-use and sharing of information, as far as possible 5. Ensure clarity of systems, processes and data ownership 6. Adopt scalable, proven technology 7. Extend the existing application portfolio as far as possible 8. Use point solutions only when necessary 9. Avoid point-to-point integration by adopting a bus integration architecture 10. Follow a component based approach to shared IT solutions 11. Ensure a consistent user experience across multiple channels 12. Ensure that IT initiatives are guided by business needs and priorities 13. Ensure conformity of IT solutions to IT standards and architecture 14. Use selective sourcing where appropriate Directives Principle Copyright Limited 2013 Copyright Limited

11 Directives: Principles are a tool of governance are simple statements (even aphorisms) define the way an organisation does or wants to operate reflect the goals of the organisation and the intentions of the governance board reflect strengths and weaknesses steer an organisation in directions compatible with strategic business and technical goals and objectives are more abstract than goals; qualitative rather than quantitative both aid and constrain decision making are useful as dispute resolvers facilitate choices between design options often conflict with each other, so trade-offs must be addressed. Directives Principle Copyright Limited 2013 Directives: Principle conflicts The practitioner manual has a menu of c80 principles. Some are contradictory You may select contradictory principles provided you include in them guidance on how to choose one over another e.g. what kind of data must be secure what kind of data must be accessible. Directives Principle Copyright Limited 2013 Copyright Limited

12 From directives to aims Directives Principles Policies s Aims Goals Objectives s SMART Principle data security is paramount Goal in the next year, we shall have no more than 2 top-level security incidents. Principle buy rather than build. Goal in the next year at least 75% of our new application systems will be packages rather than bespoke. Copyright Limited 2013 From drivers to aims Enterprise leaders respond to drivers by defining aims e.g. define expansion goals to ward off competition. As they cascade downwards, broad and high level aims are hierarchically decomposed into narrower and more detailed aims. A lower level aim can support more than one higher level aim so it is not a strict hierarchy. Drivers (SWOT) Forces Visions Mission Aims Goals Objectives s Copyright Limited 2013 Copyright Limited

13 Aim hierarchies There is a loosely structured hierarchy of aims. The terms goal, objective and requirement can be used to differentiate levels within a given aim hierarchy. But there is no sharp or universally agreed distinction between aims at different levels. Aims Goals Objectives s Copyright Limited 2013 A structured terminology for aims helps people talk about aims at different levels of abstraction EA level Executive level Driver Mission Vision SMART Aims Goal Goal Objective Objective Goal Goal Goal SA level Objective Objective Not a strict hierarchy More art than science Objective Objective Objective Objective Objective Copyright Limited 2013 Copyright Limited

14 Aims: Specific Measurable Actionable Realistic Timebound Aim [an influence] a goal or objective that is declared or recognised by business managers, or a requirement for a particular endeavour or system. It should be SMART (Specific, Measurable, Actionable, Realistic and Timebound.). Goal [an aim] that is strategic. It may be quantified using Key Goal Indicators. It may be decomposed into lower level goals or objectives. Objective [an aim] that is more tactical than a goal. It may support one or more higher-level goals. It should be quantified using Key Performance Indicators. It may be decomposed into lower level objectives or seen as a high-level requirement. [an aim] a statement of need with which compliance can be demonstrated in a specific solution or project. It should have acceptance tests and an acceptance authority. It may be captured in a requirements catalogue or in the text of a service contract or use case. It should be traceable to higher level concerns, aims, directives or strategies. Copyright Limited 2013 Aims: top level goals It is common to define business goals under three headings in the iron triangle of project management Aims Goal Objective Time Cost Quality Faster: Deliver sooner or faster Cheaper: Reduce cost Better: Improve quality Copyright Limited 2013 Copyright Limited

15 2. Architecture precursors 2. Architecture precursors Stakeholders and concerns Structured requirements & constraints Explicit requirements Implicit requirements Target solution hierarchy Scope of architecture work Business case (before architecture) Aims Goal Objective Types Regulatory Functional Audit Non-Functional Specific, Measurable, Actionable, Realistic, Timebound Copyright Limited 2013 types catalogue type Functional requirement NFR: Nonfunctional requirement [a document] a structured list of requirement instances in which each is recorded with properties such as reference number, description, source, owner, priority, and requirement type. (E.g. throughput = 100 tps, response time = 1 second.) [a concern] a kind or group of needs that is generally applicable to system structure or behaviour. It usually correspond to a concern that is held by stakeholders or addressed in viewpoints. (E.g. throughput, response time.) [a requirement type] related to services offered by a system, including inputs and outputs, processes and business rules. [a requirement type] that quantifies qualities that specify how well, effectively or efficiently a system should deliver services. (See section 8 for a list of kinds.) Copyright Limited 2013 Copyright Limited

16 2. Architecture precursors 2. Architecture precursors Stakeholders and concerns Structured requirements & constraints Explicit requirements Implicit requirements Target solution hierarchy Scope of architecture work Business case (before architecture) Copyright Limited 2013 Explicit and implicit requirements Explicit requirement Implicit requirement [a requirement type] that classifies requirements that are declared by stakeholders. [a requirement type] that must be addressed, even if never mentioned by stakeholders. Under any best endeavours obligation, the architect must be aware of the possibly implicit requirements below. Copyright Limited 2013 Copyright Limited

17 Regulatory requirements Regulatory requirement Clinger Cohen Act and enterprises from Copyright theft of intellectual Limited 2013 property. [a requirement type] include legislation and regulations that direct or constrain architecture work. IT accountability and procurement: Regulation that makes public sector, IT directors and CIOs accountable for justifying investment in IT and for fair procurement from suppliers. E.g. Information Technology Management Reform act (ITMRA) of 1996, Division E, P.L This Clinger Cohen Act was the stimulus for many early enterprise architecture initiatives. Data protection: Legislation that directs an enterprise to protect data from unauthorised access. E.g. UK's data protection act. Data freedom: Legislation that directs an enterprise to make data available to people who request it. E.g. Freedom of Information Act Disability and accessibility: Legislation that directs enterprise to build systems that can be accessed by any member of the public. E.g. UK Equality act. US Americans with Disability act. W3C Web Content Accessibility Guidelines. Shareholder protection and audit: Legislation that directs an enterprise to maintain records showing how it has directed, monitored and controlled its business. E.g. US Sarbanes-Oxley act of Basel II. Intellectual property rights: International and national laws protect people The IT management reform (Clinger-Cohen) act of 1996 A USA federal government regulation A response to the mess IT was in by the early 1990s Clinger and Cohen heard testimony from John Zachman among others Defines roles and responsibilities of IT director CIO Makes CIOs responsible for developing, maintaining and facilitating the implementation of a sound and integrated IT architecture for the executive agency. Copyright Limited 2013 Copyright Limited

18 Office and Management and Budget (OMB) circular Q-130 Refines the definition of EA Requires that EA describes current architecture, target architecture and transition processes The basis of TOGAF s process (ADM) includes a TRM a Standards Profile Hence the TRM in TOGAF Hence the SIB in TOGAF search SIB Copyright Limited 2013 Regulatory requirement references UK's data protection act: Freedom of Information act 2000: UK Disability Discrimination act: W3C Web Content Accessibility Guidelines: US Americans with Disability act. US Sarbanes-Oxley act of Basel II. Also Solvency 2 PCI FSA VISA Patriots Act International and national laws protect people and enterprises from theft of intellectual property. Copyright Limited 2013 Copyright Limited

19 Standards Standard Enterprise Standards Information Base [a concern] a widely-accepted definition of a structure, process or rules, intended to increase uniformity and interoperability between distinct systems and processes. [an artefact] a catalogue of standards that is recommended or used across the enterprise. (Cf. The Open Group s SIB.) The aim is to ensure your enterprise does not rely on the haphazard knowledge that individual architects have of which standards are relevant See search SIB Copyright Limited 2013 Standards bodies An enterprise with a mission to set standards and assess compliance to them. E.g. American National Standards Institute (ANSI). British Computer Society (BCS). Information Systems Examination Board (ISEB). Institute of Electrical and Electronic Engineers (IEEE). Information Systems Audit and Control Association (ISACA) International Standards Organisation (ISO). Office of Government Commerce (OGC). Open Applications Group Standards (OAGIS). Organisation for Advancement of Structured Information Standards (OASIS). The Object Management Group (OMG). The Open Group. US National Institute of Standards and technology (NIST). Software Engineering Institute (SEI). Internet Engineering Taskforce (IETF) Copyright Limited 2013 Copyright Limited

20 Industry standards in the reference model These standards appear (incidentally) in reference model entries: Number Topic Title / subject matter ISO/IEC ISO/IEC ISO/IEC 24762:2008 ISO/IEC CMM-I ISO 9001 ISO/IEC Architecture Description Security Security Security Quality Quality ITSM Recommended Practice for Architecture Description of Software-Intensive Systems. Information technology: Code of practice for information security management (OLD superseded by 27001) Information technology Security techniques Guidelines for information. Information technology Security techniques Information Capability maturity model integrated (process quality standard) A standard in the ISO 9000 family for quality management systems. An international standard for ITSM (based on the earlier British Standard, BS 15000). Copyright Limited 2013 Other standards Open standards (e.g. W3C). Government standards (e.g. e-gif) Payment card industry, data security standards (PCI DSS) A technical strategy that mandates (say) choice of database or mid-range servers. Copyright Limited 2013 Copyright Limited

21 2. Architecture precursors end of pass 1 SHOW RELEVANT MOCK EXAM QUESTIONS Copyright Limited Architecture precursors 2. Architecture precursors Stakeholders and concerns Structured requirements & constraints Explicit requirements Implicit requirements Target solution hierarchy Scope of architecture work Business case (before architecture) Business case (before architecture) levels Vision Outline to Build Copyright Limited 2013 Copyright Limited

22 2.5: Scoping Real world Example Strategy RFI RFP ITT Overview Design Document High Level Design architecture description vision levels Vision outline Outline [an architecture description] describing a solution to problems and requirements. Its elements may be mapped to directives, aims and plans. Kinds include definitions at different levels of abstraction. briefly describes of a target, just enough to enable options to be compared (including any initial idea of costs and risks) and solution outline work to proceed. It may be a response to a business problem or an elaboration of how to reach a business vision. describes the high-level design of a target system, produced after a first pass architecture description, enough to enable an acceptably accurate estimate of cost, benefits and risks, and projects to be planned. Low Level Design to Build to be built describes a project-ready architecture, completed in sufficient detail for the project to be scheduled and resourced, and the building team to start work. Copyright Limited 2013 Concept/Vision diagram: MODAF style Based around a rich picture or cartoon Copyright Limited 2013 Copyright Limited

23 Iterative elaboration of a solution architecture levels Vision Outline Architecture Levels Enterprise Architecture Architecture Software Architecture Strategy Enterprise Arch Inception & Elaboration Technical Risk Management ITT/Bid Initiation Program or Project to Build Elaboration Construction Copyright Limited 2013 A structured terminology for planning helps people talk about plans at different levels of abstraction EA level Executive level Driver Mission Vision Business Strategy IT Strategy PM methods have variations on this structure EA Project Programme Programme Programme Project Work Package Project Project Project SA level Work Package Work Package Work Package Work Package Work Package Work Package Specialist level Task Task Task Task Task Task Copyright Limited 2013 Copyright Limited

24 2. Architecture precursors 2. Architecture precursors Stakeholders and concerns Structured requirements & constraints Explicit requirements Implicit requirements Target solution hierarchy Scope of architecture work Business case (before architecture) Depth Technology Data Applications Business Constraints Breadth of SYSTEM Copyright Limited 2013 Three dimensions of scope Fix any 2 dimensions, and the 3 rd dimension is derivable Three dimensions of scope Breadth Constraints Depth Size & complexity of system or project Large / Medium / Small Time & resources to describe the system or project Little / Moderate / Lots Level of detail reachable in descriptions or plans Large Little Vacuous Medium Little Sketchy Large Moderate Sketchy Medium Moderate Elaborate Small Little Elaborate Large Lots Elaborate Small Moderate Fulsome Medium Lots Fulsome Small Lots Complete Copyright Limited 2013 Copyright Limited

25 The 4 dimensions in the reference model Scope view [a view] a dimension of scope. Breadth: scope of the enterprise, system or solution. Depth: the detail to which description or design should be completed Constraints on work. Domain in focus: business, application or infrastructure change. Depth Technology Data Applications Business Constraints Breadth of SYSTEM Copyright Limited 2013 Breadth of enterprise or system Breadth of enterprise or system a scope view] that may be defined in several ways. Sales person Marketeer Aim view: goal/objective/requirement catalogue Supplier System Fulfiller Customer Service view: a service catalogue. Sales person Review Sale Marketeer System view: a top-level context diagram. Fulfiller Supplier Goods Out Goods In Customer Process view: a top-level process map or use case diagram. Customer Sale Product Stock Depot Data view: a conceptual/domain/business data model. Copyright Limited 2013 Copyright Limited

26 The scope of an enterprise or system Context Diagram [an artefact] that shows a system s scope in terms of inputs consumed, outputs produced, and the external entities (actors and/or roles) that send inputs and receive outputs. The system is shown as a black box. As in SIPOC in Six Sigma Supplier Input Process Output Customer Enterprise Supplier Input Output Customer Or System Shows why the system exists the system that is the focus of design the external entities, inputs and outputs around the boundary. Does not show what the system is made of parts or components are hidden from view Copyright Limited nd dimension: constraints Constraint (on work) [a scope view] a factor such as time, budget and resources that limits work to be done, or potential options. Depth Technology Data Applications Business Breadth of SYSTEM Constraints Time, cost, resource You can only do what you have time, money and resources to do Copyright Limited 2013 Copyright Limited

27 2. Architecture precursors 2. Architecture precursors Stakeholders and concerns Structured requirements & constraints Explicit requirements Implicit requirements Target solution hierarchy Scope of architecture work Business case (before architecture) Copyright Limited 2013 Business planning context Planning is addressed in last two sections of the reference model Business case (before architecture) [a document] that justifies work to build or change systems. It will be outlined at the start and updated as need be. It will be reviewed and refined several times while architecture work is done. It may be decomposed into business cases for specific options, stages or projects within the overall solution. [See the Migration Planning section for further definitions of supporting terms below. Return on Investment (ROI) Cost-benefit analysis options Risk analysis Gap analysis (options) Trade-off analysis.] Copyright Limited 2013 Copyright Limited

28 Business planning context Planning is addressed in last two sections of the reference model Business scenario Business scenariodriven design [an artefact] that outlines a process, along with the human and computer actors involved in the process steps. It is useful in creating and presenting an architecture description. It may be defined to support a solution vision or business case. It may be defined during business architecture description. It may be presented as an example instance of a business process. [a technique] that proceeds by defining four main elements: The aims (outcomes or effects) of the process. The outputs (products or services) the process produces The steps of the process (scenario or value stream) The actors/components involved in the process. There are two or three business scenario exercises in the course Copyright Limited 2013 Business Scenario (much adapted from a TOGAF example) Precondition: Sales visit to customer premises has been agreed and scheduled Human actors Computer actors Process Customer Sales person Client app use case Data centre app 1 Initiate sales process with the customer Accept sales person 2 Discuss customer requirements Explain problems & requirements 3 Work with customer to create a product configuration 4 Verify that the desired configuration can be delivered 5 Determine price of requested configuration 6 Confirm customer desire to purchase Select one option based on capabilities Greet customer Listen Show product and configuration options Show availability to customer Copyright Limited 2013 Get product description Assemble configuration Check configuration availability Product Configurator App Inventory App Accept Show delivery date to customer Get delivery date Scheduling App Accept Show price to customer Price configuration Pricing App Accept Show offer in full 7 Place an order Capture order details and print Enter order Get fax response 8 Customer acceptance Sign Request signature Post condition: Order captured Order App Copyright Limited

Reference Model for ISEB Certificates in Enterprise and Solution Architecture. Version 3.0

Reference Model for ISEB Certificates in Enterprise and Solution Architecture. Version 3.0 Reference Model for ISEB Certificates in Enterprise and Solution Architecture Version 3.0 June 2010 Reference Model for ISEB Certificates in Enterprise and Solution Architecture This reference model follows

More information

Reference Model for Enterprise and Solution Architecture v10.7

Reference Model for Enterprise and Solution Architecture v10.7 Reference Model for Enterprise and Solution Architecture v10.7 April 2016 Individuals who have attended Avancier-accredited training have the right to use this reference model for their personal use. Any

More information

Avancier Methods (AM)

Avancier Methods (AM) Methods (AM) INITIATE Define architect roles It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission of the copyright holder

More information

Business Architecture with ArchiMate symbols and TOGAF Artefacts

Business Architecture with ArchiMate symbols and TOGAF Artefacts Business Architecture with ArchiMate symbols and TOGAF Artefacts This is a supplement to the broader framework TOGAF s generic conceptual framework with ArchiMate symbols http://grahamberrisford.com/00eaframeworks/03togaf/togaf%20conceptual%20framework%20-%20with%20archimate%20symbols.pdf

More information

CMS Policy for Configuration Management

CMS Policy for Configuration Management Chief Information Officer Centers for Medicare & Medicaid Services CMS Policy for Configuration April 2012 Document Number: CMS-CIO-POL-MGT01-01 TABLE OF CONTENTS 1. PURPOSE...1 2. BACKGROUND...1 3. CONFIGURATION

More information

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and

More information

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com COBIT 5 All together now! Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com 1 Copyright Notice COBIT is 1996, 1998, 2000, 2005 2012 ISACA and IT Governance Institute.

More information

Developing Business Architecture with TOGAF

Developing Business Architecture with TOGAF Developing Business Architecture with TOGAF Building Business Capability 2013 Las Vegas, NV Armstrong Process Group, Inc. www.aprocessgroup.com Objectives Introduce The Open Group Architecture Framework

More information

<Business Case Name> <Responsible Entity> <Date>

<Business Case Name> <Responsible Entity> <Date> (The entity Chief Information Officer, Chief Financial Officer and Business Area programme Lead must sign-off the completed business case) Signed: Date:

More information

Qlik UKI Consulting Services Catalogue

Qlik UKI Consulting Services Catalogue Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE CONTINUAL SERVICE IMPROVEMENT CERTIFICATE SYLLABUS Page 2 of 18 Document owner The Official ITIL Accreditor Contents CONTINUAL

More information

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013 Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of

More information

Assessment of Software for Government

Assessment of Software for Government Version 1.0, April 2012 Aim 1. This document presents an assessment model for selecting software, including open source software, for use across Government, and the wider UK public sector. 2. It is presented

More information

ITC 19 th November 2015 Creation of Enterprise Architecture Practice

ITC 19 th November 2015 Creation of Enterprise Architecture Practice ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG

More information

Reference Process for Enterprise Architecture enabled ICT Planning

Reference Process for Enterprise Architecture enabled ICT Planning Reference Process for Enterprise Architecture enabled ICT Planning NSW GEA Toolkit R1 April 2015 Contact ea@finance.gov.nsw Strategic Policy Department of Finance, Services & Innovation 1 Table of Contents

More information

The Open Group Architectural Framework

The Open Group Architectural Framework The Open Group Architectural Framework Background TOGAF is a step-by-step method for developing an enterprise architecture, using a set of prescribed tools. It is freely available on the Open Group website

More information

Guide to CQI Qualifications for learners

Guide to CQI Qualifications for learners Guide to CQI Qualifications for learners CQI Qualifications and Professional Recognition Quality management is about improving organisational performance in delivering product and service that meet customer

More information

Information and Communication Technology

Information and Communication Technology Position Description Position Title: Employment Type: Section: Division: Salary Band: Agreement: Reporting To: Enterprise Architect Full Time fixed term ICT Project Services Information and Communication

More information

The Cornwell Enterprise Architecture Maturity Dashboard

The Cornwell Enterprise Architecture Maturity Dashboard The Cornwell Enterprise Architecture Maturity Dashboard Ian Bailey This paper outlines Cornwell s approach to assessing the maturity of an organisation s Enterprise Architecture. The method uses standard

More information

A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0

A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0 A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0 www.theiiba.org International Institute of Business Analysis, Toronto, Ontario, Canada. 2005, 2006, 2008, 2009, International

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

Network Rail Infrastructure Projects Joint Relationship Management Plan

Network Rail Infrastructure Projects Joint Relationship Management Plan Network Rail Infrastructure Projects Joint Relationship Management Plan Project Title Project Number [ ] [ ] Revision: Date: Description: Author [ ] Approved on behalf of Network Rail Approved on behalf

More information

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP

More information

Ghana Government Enterprise Architecture Implementation Guide

Ghana Government Enterprise Architecture Implementation Guide Ghana Government Enterprise Architecture Implementation Guide GGEA Implementation Guide v1 Copyright 2009 Page 1 of 22 ABBREVIATIONS Term GGEA EA MDA GICTeD GoG CIO QAC RFP CMM Definition Ghana Government

More information

ITIL V3 and ASL Sound Guidance for Application Management and Application Development

ITIL V3 and ASL Sound Guidance for Application Management and Application Development For IT V3 and Sound Guidance for Application and Application Development Machteld Meijer, Mark Smalley & Sharon Taylor Alignment White Paper January 2008 V3 & : A Comparison Abstract In May 2007, the Office

More information

Extended Enterprise Architecture Framework Essentials Guide

Extended Enterprise Architecture Framework Essentials Guide Extended Enterprise Architecture Framework Essentials Guide Editorial Writer: J. Schekkerman Version 1.5 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve

More information

BCS Foundation Certificate in Business Analysis Syllabus. Version 3.8 July 2016

BCS Foundation Certificate in Business Analysis Syllabus. Version 3.8 July 2016 BCS Foundation Certificate in Business Analysis Syllabus Version 3.8 July 2016 Copyright BCS 2015 BA Foundation Syllabus Change History Any changes made to the syllabus shall be clearly documented with

More information

Achieve. Performance objectives

Achieve. Performance objectives Achieve Performance objectives Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants.

More information

Advanced Topics for TOGAF Integrated Management Framework

Advanced Topics for TOGAF Integrated Management Framework Instructor: Robert Weisman MSc, PEng, PMP CD Robert.weisman@buildthevision.ca Advanced Topics for TOGAF Integrated Management Framework ROBERT WEISMAN CEO BUILD THE VISION, INC. WWW.BUILDTHEVISION.CA EMAIL:

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

Develop Project Charter. Develop Project Management Plan

Develop Project Charter. Develop Project Management Plan Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs

More information

A Risk Management Standard

A Risk Management Standard A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management

More information

BCS Certificate in Business Analysis Extended Syllabus. Version 2.4 March 2015

BCS Certificate in Business Analysis Extended Syllabus. Version 2.4 March 2015 BCS Certificate in Business Analysis Extended Syllabus Version 2.4 March 2015 http://certifications.bcs.org Change History Any changes made to the syllabus shall be clearly documented with a change history

More information

TOGAF 9 Level 1 + 2 Exam Study Guide

TOGAF 9 Level 1 + 2 Exam Study Guide TOGAF 9 Level 1 + 2 Exam Study Guide Created by Nik Ansell http://ae.linkedin.com/in/nikansell Introduction This document was created to help focus the study areas of TOGAF 9 students, studying for the

More information

Management and Leadership. Level 5 NVQ Diploma in Management and Leadership (QCF)

Management and Leadership. Level 5 NVQ Diploma in Management and Leadership (QCF) Management and Leadership Level 5 NVQ Diploma in Management and Leadership (QCF) 2014 Skills CFA Level 5 NVQ Diploma in Management and Leadership (QCF) Page 1 Level 5 NVQ Diploma in Management and Leadership

More information

Revised October 2013

Revised October 2013 Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience

More information

PROJECT MANAGEMENT PLAN CHECKLIST

PROJECT MANAGEMENT PLAN CHECKLIST PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Certification in Humanitarian Supply Chain Management (CHSCM) Competence Model. Final Version 2007

Certification in Humanitarian Supply Chain Management (CHSCM) Competence Model. Final Version 2007 Certification in Humanitarian Supply Chain Management (CHSCM) Competence Model Final Version 2007 Contents Competence Model Context... 3 Functional Map... 6 UNIT 1 Supply Chain Planning... 7 UNIT 2 Supply

More information

Simon Brown Software architecture for developers. Follow me on Twitter @simonbrown

Simon Brown Software architecture for developers. Follow me on Twitter @simonbrown Simon Brown Software architecture for developers Follow me on Twitter @simonbrown I help software teams understand software architecture, technical leadership and the balance with agility (I code too)

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

HKITPC Competency Definition

HKITPC Competency Definition HKITPC Competency Definition for the Certification copyright 2011 HKITPC HKITPC Competency Definition Document Number: HKCS-CD-L1L2 Version: 1.0 Date: June 2011 Prepared by Hong Kong IT Professional Certification

More information

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact info@uxcconsulting.com.au http://www.uxcconsulting.com.au This summary

More information

Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011

Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011 Use Cases Massimo Felici Use Cases 1 Support requirements engineering activities and the requirement process Capture what a system is supposed to do, i.e., systems functional requirements Describe sequences

More information

Modelling the Business Case Study 3 Attendance Monitoring Project and Enterprise Architecture

Modelling the Business Case Study 3 Attendance Monitoring Project and Enterprise Architecture Modelling the Business Case Study 3 Attendance Monitoring Project and Enterprise Architecture Background: Currently, in Roehampton University, class attendance data is collected and used as one of the

More information

California Enterprise Architecture Framework

California Enterprise Architecture Framework Version 2.0 August 01, 2013 This Page is Intentionally Left Blank Version 2.0 ii August 01, 2013 TABLE OF CONTENTS 1 Executive Summary... 1 1.1 What is Enterprise Architecture?... 1 1.2 Why do we need

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take

More information

iso20000templates.com

iso20000templates.com iso20000templates.com Public IT Limited 2011 IT Service Policy Document Ref. ITSM01001 Version: 1.0 Draft 1 Document Author: Document Owner: V 1.0 Draft 1 Page 1 of 11 Revision History Version Date RFC

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Enterprise Architecture 101. (Includes numerous samples/ templates produced using TOGAF methodology) Shail Sood

Enterprise Architecture 101. (Includes numerous samples/ templates produced using TOGAF methodology) Shail Sood Enterprise Architecture 101 (Includes numerous samples/ templates produced using TOGAF methodology) Enterprise Architecture Key Question What is Enterprise Architecture? Why Enterprise Architecture? What

More information

In the first three installments of our series on Information Security

In the first three installments of our series on Information Security Information Security Management Programs: Assessment Analysis Lessons Learned and Best Practices Revealed JUSTIN SOMAINI AND ALAN HAZLETON This article, the fourth in a series, expands on the overlooked

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer RISK MANAGEMENT FRAMEWORK 1 SUMMARY The Risk Management Framework consists of the following: Risk Management policy Risk Management strategy Risk Management accountability Risk Management framework structure.

More information

ITIL. Lifecycle. www.alctraining.com.my. ITIL Intermediate: Continual Service Improvement. Service Strategy. Service Design. Service Transition

ITIL. Lifecycle. www.alctraining.com.my. ITIL Intermediate: Continual Service Improvement. Service Strategy. Service Design. Service Transition Take your ITIL skills to the next level ITIL Lifecycle ITIL Intermediate: Part of the complete ITIL Education Program Advance your career Add value to your organisation Gain credits towards ITIL Expert

More information

APMP. The APM Project Management Qualification. Syllabus, learning outcomes and assessment criteria aligned to the APM Body of Knowledge 6 th edition

APMP. The APM Project Management Qualification. Syllabus, learning outcomes and assessment criteria aligned to the APM Body of Knowledge 6 th edition The syllabus provides a summary of the coverage of the qualification, the details are then found in the learning outcomes and assessment criteria. Both the syllabus and the learning outcomes and assessment

More information

Concept of Operations for Line of Business Initiatives

Concept of Operations for Line of Business Initiatives Concept of Operations for Line of Business Initiatives Version 1.0 Office of E-Gov and IT, OMB March 2006 Table of Contents FOREWORD...2 1 OBJECTIVES OF THE LINES OF BUSINESS CONCEPT OF OPERATIONS...3

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

Enterprise Architecture Framework

Enterprise Architecture Framework Page 1 of 34 Contents 1 Introduction... 4 1.1 Background... 4 1.2 Scope... 4 1.3 Purpose... 4 2 Framework Description... 5 2.1 Architecture Process... 5 2.2 Architecture Framework... 7 2.3 Governance...

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY MANAGEMENT OF PERFORMANCE INFORMATION POLICY AND PROCEDURES DOCUMENT

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY MANAGEMENT OF PERFORMANCE INFORMATION POLICY AND PROCEDURES DOCUMENT THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY MANAGEMENT OF PERFORMANCE INFORMATION POLICY AND PROCEDURES DOCUMENT ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive

More information

TOGAF and ITIL. A White Paper by: Serge Thorn Merck Serono International SA

TOGAF and ITIL. A White Paper by: Serge Thorn Merck Serono International SA A White Paper by: Serge Thorn Merck Serono International SA June 2007 Copyright 2007 The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: (wahlgren@dsv.su.se), 2: (stewart@dsv.su.se) ABSTRACT

More information

Benefits. MIRACLE Benefits. I have no idea! What is going on in here? Konferencja "Bezpieczny Projekt" WARSZAWA 11 maja 2010 r.

Benefits. MIRACLE Benefits. I have no idea! What is going on in here? Konferencja Bezpieczny Projekt WARSZAWA 11 maja 2010 r. Programme Plan MIRACLE Benefits Benefits What is going on in here? I have no idea! 1 W A R S Z A W A R Z E S Z Ó W W R O C Ł A W 1 Fitting the pieces together How the APMG Product Set helps you manage

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

ENTERPRISE ARCHITECTUE OFFICE

ENTERPRISE ARCHITECTUE OFFICE ENTERPRISE ARCHITECTUE OFFICE Date: 12/8/2010 Enterprise Architecture Guiding Principles 1 Global Architecture Principles 1.1 GA1: Statewide Focus 1.1.1 Principle Architecture decisions will be made based

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

Quality Manual ISO 9001:2015 Quality Management System

Quality Manual ISO 9001:2015 Quality Management System Quality management input comprises the standard requirements from ISO 9001:2015 which are deployed by our organization to achieve customer satisfaction through process control. Quality Manual ISO 9001:2015

More information

Organizational Requirements Engineering

Organizational Requirements Engineering Chapter 9, Non-functional Requirements Organizational Requirements Engineering Prof. Dr. Armin B. Cremers Sascha Alda Armin B. Cremers, Sascha Alda Organizational Requirements Engineering 1 Overview of

More information

Avancier Reference Model

Avancier Reference Model Reference Model s Architecture (ESA 7) It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission of the copyright holder Copyright

More information

, Head of IT Strategy and Architecture. Application and Integration Strategy

, Head of IT Strategy and Architecture. Application and Integration Strategy IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL

More information

Agenda. Seda Overview Seda EA Project Requirements Enterprise Architecture Approach

Agenda. Seda Overview Seda EA Project Requirements Enterprise Architecture Approach Seda Case Study "To effectively communicate, we must realize that we are all different in the way we perceive the world and use this understanding as a guide to our communication with others." -- Tony

More information

Description of Program Management Processes (Initiating, Planning) 2011 PROGstudy.com. All rights reserved

Description of Program Management Processes (Initiating, Planning) 2011 PROGstudy.com. All rights reserved Description of Program Management Processes (Initiating, Planning) Topics Covered Program Management Process Groups salient features Description of all processes in Initiating Process Group: Initiate Program

More information

Manchester City Council Role Profile. Enterprise Architect, Grade 12

Manchester City Council Role Profile. Enterprise Architect, Grade 12 Key Role Descriptors: Manchester City Council Role Profile Enterprise Architect, Grade 12 ICT Service, Corporate Core Directorate Reports to: Head of Enterprise Architecture Job Family: Technical This

More information

Service Improvement. Part 3 The Strategic View. Robert.Gormley@ed.ac.uk http://www.is.ed.ac.uk/itil

Service Improvement. Part 3 The Strategic View. Robert.Gormley@ed.ac.uk http://www.is.ed.ac.uk/itil Service Improvement Part 3 The Strategic View Robert.Gormley@ed.ac.uk http://www.is.ed.ac.uk/itil Service Management House Customers Avail. Mgmt Capacity Mgmt Service Level Mgmt Continuity Mgmt Financial

More information

ArchiMate and TOGAF. What is the added value?

ArchiMate and TOGAF. What is the added value? ArchiMate and TOGAF What is the added value? Why use TOGAF next to ArchiMate? ArchiMate provides a (visual) language ArchiMate provides a content framework TOGAF provides a process TOGAF provides a way

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

Institute of Chartered Accountants Ghana (ICAG) Paper 2.2 Management Accounting

Institute of Chartered Accountants Ghana (ICAG) Paper 2.2 Management Accounting Institute of Chartered Accountants Ghana (ICAG) Paper. Management Accounting Final Mock Exam Marking scheme and suggested solutions DO NOT TURN THIS PAGE UNTIL YOU HAVE COMPLETED THE MOCK EXAM ii Management

More information

44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam

44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam 44-76 mix 2 Number: MB5-705 Passing Score: 800 Time Limit: 120 min File Version: 22.5 http://www.gratisexam.com/ Exam Code:MB5-705 Exam Name: Managing Microsoft Dynamics Implementations Exam Exam A QUESTION

More information

SFJ EFSM14 Manage the performance of teams and individuals to achieve objectives

SFJ EFSM14 Manage the performance of teams and individuals to achieve objectives Manage the performance of teams and individuals to achieve objectives Overview This standard is about making the best use of your team and its members so that they can achieve your organisation's objectives.

More information

White Paper. Business Analysis meets Business Information Management

White Paper. Business Analysis meets Business Information Management White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute

More information

Partnering for Project Success: Project Manager and Business Analyst Collaboration

Partnering for Project Success: Project Manager and Business Analyst Collaboration Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,

More information

Performance objectives

Performance objectives Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants. They also outline the values

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

IRCA Briefing note ISO/IEC 20000-1: 2011

IRCA Briefing note ISO/IEC 20000-1: 2011 IRCA Briefing note ISO/IEC 20000-1: 2011 How to apply for and maintain Training Organization Approval and Training Course Certification IRCA 3000 Contents Introduction 3 Summary of the changes within ISO/IEC

More information

Process-Based Business Transformation. Todd Lohr, Practice Director

Process-Based Business Transformation. Todd Lohr, Practice Director Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt Programme, Project & Service Management Analysis Table of Content 1 Executive Summary... 3 1.1 Scope of Work... 3 1.2 Methodology for

More information

SOA: The missing link between Enterprise Architecture and Solution Architecture

SOA: The missing link between Enterprise Architecture and Solution Architecture SOA: The missing link between Enterprise Architecture and Solution Architecture Jaidip Banerjee and Sohel Aziz Enterprise Architecture (EA) is increasingly being acknowledged as the way to maximize existing

More information

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

The Asset Management Landscape

The Asset Management Landscape The Asset Management Landscape Second Edition ISBN 978-0-9871799-2-0 Published March 2014 www.gfmam.org The Global Forum on Maintenance and Asset Management The Global Forum on Maintenance and Asset Management

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

ISO20000: What it is and how it relates to ITIL v3

ISO20000: What it is and how it relates to ITIL v3 ISO20000: What it is and how it relates to ITIL v3 John DiMaria; Certified Six Sigma BB, HISP BSI Product Manager; ICT (ISMS,ITSM,BCM) Objectives and Agenda To raise awareness, to inform and to enthuse

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Human Resources and Organisational Development. Job No. (Office Use)

Human Resources and Organisational Development. Job No. (Office Use) ROLE PROFILE Human Resources and Organisational Development Role Profile Job Title Head of Business and Technical Architecture Job No. (Office Use) F27 Grade (Office Use) Directorate Transformation and

More information