Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection
|
|
|
- Rudolph Stanley
- 9 years ago
- Views:
Transcription
1 Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University [email protected] Abstract A number of Enterprise Frameworks (EAF) o exist, which are sometimes ifferent in approaches an at other times are base on other frameworks. This paper presents a survey of the current state of EAF. Comparisons will be hel among some selecte frameworks base upon ifferent criteria. These criteria will inclue the current market share of the selecte frameworks, goals, inputs, outcomes, strengths, weaknesses an frameworks supporte tools. Conclusion is mae concerning EAF selection. Key wors: Enterprise Frameworks (EAF), Information Systems Frameworks comparisons, Enterprise Frameworks selection criteria. 1. Introuction This paper starts by outlining the basic terms of architecture, enterprise, framework an Enterprise Frameworks (EAF). Backgroun on ifferent frameworks an a classification of these frameworks will be presente. Different criteria for EAF will be iscusse. At the en of this paper we will conclue how to choose an EAF regaring these criteria an the current state of EAF. Also recommenations for further research in this area will be presente. In this paper we will use EAF an information system frameworks interchangeably. 1.2 Basic efinitions : In this paper, we will use the IEEE Stanar for the term architecture. It is efine as The funamental organization of a system emboie in its components, their relationships to each other, an to the environment, an the principles guiing its esign an evolution. [1], where: funamental organization means essential, unifying concepts an principles. Galal Hassan Galal-Eeen Faculty of Computers an Information, Cairo University & The British University in Egypt [email protected] / [email protected] system inclues the application software system, platform, system-of-systems, enterprise, prouct line,... environment is evelopmental, operational, programmatic, context of the system. Framework: The framework is funamentally a conceptual moel [2]. A framework is a structure within which the key components of the architecture an the relationships between these components are efine. A framework [3]: Helps organize thinking about the architecture Provies a escription of the architectural artefacts Helps ensure that everyone is using the same set of semantics an presents them to the group of stakeholers intereste in the contents of the architecture. Provies a way to communicate the architecture It level-sets stakeholers about the contents of the architecture by proviing common efinitions an concepts It shows the relationships between business an technology elements, ensuring that there is coherence between all elements an that every business element can map to a corresponing element in the technical architecture an, similarly, that technical elements can be seen as supporting key business requirements. Enterprise: Any collection of organizations that has a common set of goals an/or a single bottom line [4]. In that sense, an enterprise can be a government agency, a whole corporation, a ivision of a corporation, a single epartment, or a chain of geographically istant organizations linke together by common ownership. Enterprise architecture (EA): A coherent whole of principles, methos, an moels that are use in the esign of an enterprise's organizational structure, business processes, information systems, an infrastructure [5]. The most important characteristic of an EA is that it provies a holistic view of the enterprise. Enterprise Framework (EAF):
2 The EAF is an instrument. When utilize it facilitates a holistic (cross-organizational, cross-functional, collaborative view of, elivery of an approach to the following key concepts [6]: Communication Organization aroun EA Mapping technical elements to business strategy Priority planning Asset an artifact management Service elivery Semantics Which collectively, guie the organization in the evelopment of the EA. An EAF is comprise of a coupling of two major components: Methoology an Framework. Table (1) shows the main characteristics of both components. Methoology Framework Describes stanarize processes for eveloping the EA. Describes stanarize eliverables an processes for eveloping the EA Table (1) Methoology an Framework characteristics Software : Stanarize classification tool for the EA eliverables or artifacts. Describes the "What" of EA. A place for everything an everything in it's place The software architecture of a system or a collection of systems consists of the important esign ecisions about the software structures an the interactions between those structures that comprise the systems. These esign ecisions support a esire set of qualities that the system shoul support to be successful. The esign ecisions provie a conceptual basis for system evelopment, support, an maintenance [7]. It relates requirements, fixe system harware, an infrastructure (i.e., COTS, GOTS) to software structures in orer to emonstrate software effectiveness [8]. Information System : An information system architecture typically encompasses an overview of the entire information system incluing the software, harware, an information architectures (the structure of the ata that systems will use). In this sense, the information system architecture is a meta-architecture [2]. It relates the requirements an the external worl to system / solution structures, incluing both harware an software, so that the effectiveness of a system esign concept can be communicate [8]. View: It is a representation of one or more structural aspects of an architecture that illustrate how the architecture aresses one or more concerns hel by one or more of its stakeholer [9]. Viewpoint It is a collection of patterns, templates, an conventions for constructing one type of view. It efines the stakeholers whose concepts are reflecte in the viewpoint an the guielines, principles, an template moels for constructing its views [9]. Stakeholer: An iniviual, team, or organization (or classes of thereof) with interests in, or concerns relative to, a system [5]. Most stakeholers of a system are not probably intereste in its architecture, but only on the impact of this on their concerns. However, an architect nees to be aware of these concerns an iscuss them with the stakeholers, an thus shoul be able to explain the architecture to all stakeholers involve, who will often have completely ifferent backgrouns. 2. Enterprise Frameworks 2.1 EAF history an taxonomies EA gaine popularity when John Zachman evelope his framework for ealing with large information systems on 1987 [10]. Figure (1), [8] illustrates the historical relationships among several frameworks. We notice that most enterprise architecture frameworks have a common history an are built on refinements an a-ons of other frameworks. Zachman framework is the olest an the father of the most frameworks. Different taxonomies are there for EAF. One of these is ifferentiations between two classes of frameworks: classic EAF, an feerate EAF [11]. The feerate enterprise architecture eals with creating integrate architectures. Examples of feerate enterprise architectures are C4ISR architecture framework, the feeral enterprise architecture framework an the treasury enterprise framework. Another taxonomy has been put by ISO [12], it consiere that there are two an only two types of architectures that eal with enterprise integration: System architectures (sometimes referre to as "type 1" architectures) that eal with the esign of a system, e.g. the system part of an overall enterprise integration; Enterprise-reference projects (sometimes referre to as "type 2" architectures) that eal with the organisation of the evelopment an implementation of a project such as an enterprise integration or other enterprise evelopment programme. In other wors, type 1 architecture represents system or sub-system in terms of its structure an behaviours. The type 2 architecture is actually framework aiming at structuring activities/tasks 2
3 necessary to esign an buil a system. For example, Zach-man s architecture is type 2 architecture [13]. Outsie the EA ifferent taxonomies, we can fin three main types of architecture. These three types are: EA, software architecture an system JTA architecture, which previously efine. Figure (2), represents the Relationships among System, Software, an Enterprise. referenc es DoDAF 2003 ISO/IEC Zachman 1987 DoDTRM supporte by TAFIM aopte by EAP 1992 referenc es TOGAF 1995 referenc es FEAF 1999 TISAF 1997 C4ISR 1999 supporte by TEAF 2000 Supporte by TOGAF 2002 Zachman 2003 FEAF 2003 E2AF 2003 UVA Moel 1994 IAF v Figure (1) Historical relationship among EAF IAF v3 EE 2001 XAF
4 Enterprise Architects Strategic Governance Business Technology Strategy Enterprise Architects Enterprise System Architects Solution Design Business System Information Information System Technology Infrastructure System Architects (B&I an IS&TI) Solution Delivery BPM/CRM/ER P Supply Chain Management Workflow Analysis Information Analysis Software Data Security Network Software Architects Intra Designers (CID) Security Specialists Governance Specialists Figure (2): Relationship among System, Software, an Enterprise 2.2 Enterprise survey The most important survey report in EAF is publishe yearly since 2003 by Institute For Enterprise Developments (IFEAD). This report presents the results of the thir electronic survey [14], its title is "Trens in Enterprise : How are Organizations Progressing?". The report is base on a 25 questions survey, aressing geographical aspects, branch aspects, EA implementations aspects as well about tools an methoologies use in Enterprise programs an the role of architects in organizations. 79 responents fille in the EA 2005 survey. One of these issues is "What kin of Enterprise Framework oes your organization use?". The following table represents the result of the survey question. What kin of Enterprise Framework oes your organization use? Framework Rate Zachman Framework 0.25 Organization own 0.22 C4ISR, US Defense Framework 0.11 TOGAF, The Open Group Framework 0.11 Extene Enterprise Framework (E2AF) 0.09 FEAF, US Feeral Enterprise Framework 0.09 Other 0.09 IAF, Capgemini's (Integrate Framework) 0.03 TAFIM, US Defense (Technical Framework for Information Management) 0.02 ISO/IEC (IEEE St ) Guie to the POSIX Open System Environment 0 None 0 TEAF, US (Treasury Enterprise Framework) 0 Table (1) Enterprise Framework Market share Table (1) shows the most use framework in 2005 is Zachman s Enterprise Framework an organization's own EAF came in the secon. When ealing with such surveys, we shoul take into consieration the following points: Filling in the EA survey 2005 at the website of IFEAD was voluntary, so the results can be a little bit istorte by the fact that only people who are intereste in Enterprise are taking the effort to fill in this survey. The rate of framework may iffer from year to year, an other frameworks may be isappeare from the survey. 3. Enterprise Framework selection criteria There are ifferent criteria that can be use to help in selecting an EAF. These criteria can be categorize into 4
5 four sections, these section are goals, inputs, outcomes an miscellaneous as shown in the following subsections. Other criteria elements coul be ae to these sections, specially when taking into consieration the software frameworks architecture, which may be in some EAF inclue in it, such as TOGAF. These criteria will be efine only in each section uner Other Criteria, but not inclue into comparison table. 3.1 Enterprise Goals The following goals are common, inepenent of inustry omain, architecture style an system size [15]. Definition an Unerstaning make use of stanar terms, principles an guielines for consistent application of the framework for the communication of architecture information to stakeholers. Process employ a well-efine process to guie the construction of architecture. Evolution Support employ processes an mechanisms that support systems evolution. Stanarization ensure evelopment an architectural stanars are maintaine. Knowlege Base provie consistent representation an repository of esign an architecture esign rationale. Other Goal Criteria: Moels provie consistent stanars to ocument architecture specifications for the planning, management, communication an execution of activities relate to system evelopment. Analysis provie a set of viewpoints to guie the collection an analysis of information for making architecture choices. 3.2 Enterprise Inputs Inputs represent information that architecture moelling consiers. Typical inputs to architecture esign activities are the following [15]. Business Drivers business goals, irection, principles, strategies an priorities Technology Inputs strategic architecture irection incluing technology platforms, future architecture, systems interoperability an emerging technology stanars. Other Inputs Criteria Business Requirements users requirements, functional requirements, ata requirements an other business system relate requirements Information System Environment buget, scheule, technical constraints, resources an expertise, organization structure, other constraints, enterprise knowlege base. Current current stanars an infrastructure. Non Functional Requirements some of these requirements are also referre to as Quality Attributes (QA) or Quality of Services (QoS). These requirements inclue availability, reliability, scalability, security, performance, inter-operability, moifiability, maintainability, usability an manageability. 3.3 Enterprise Outcomes Outcomes represent results an eliverables. Typical outputs to architecture activities are the following [15]. Business Moel escribes business moels, business requirements, business process, system roles, an policy statements. Transitional Design provies esigns an plans to support system transition an evolution. Other Outcomes Criteria System Moel moels major components of the system. To arrive at a system architecture moel, major traeoffs an esign ecisions are mae. Future system enhancements are also taken into consieration Information Moel contains ata moel, ata transformation an ata interface Computation Moel contains system functional escription, system process flow, system operations, software components an interactions. Software Configuration Moel escribes how software is package, store, configure, manage an share. Software Processing Moel escribes how software processes, software threas an run-time environment are structure. Implementation Moel escribes physical system structure such as operating environment, harware components an networking components of the system. Moels implementation processes such as installation, eployment, configuration an management. Platforms escribe platform software such as operating systems, harware an networking components, protocols an stanars. Non-functional Requirements Design moels the structure of the system to reflect esign of nonfunctional requirements. Design Rationale ocuments reasons of esign base on analysis an traeoffs that involve multiple imensions of inputs. 3.4 Other Criteria Conformance - The moeling metho shoul support the ability to efine conformance testing criteria (of the implementation to the architecture specification). Otherwise, the "architecture specification" may or may not specify the architecture of the resultant system no one will know for sure without provable tests. Some moels provie compliant test criteria to ensure the architecture moel is compliant with the moeling metho [16]. Clinger-Cohen Act (CCA) Compliance - The CCA specifies how the U.S. government is to plan, manage, an acquire information technology. This legislation 5
6 focuses on carrying through the information technology aspects of Government Performance an Results (GPRA) [17]. CCA manates the following : U.S. government agencies are to establish strategic performance goals for any information technology that supports the agency. Agencies are to achieve at least a five percent ecrease in the costs incurre to operate an maintain IT systems, an a five percent increase in agency operational efficiency as a result of IT investments every year. Each feeral agency is to have a chief information officer (CIO). The CIO is to help foster better technology investment, accountability, an ecision making within the agency. The CIO is to implement capital planning an investment controls for IT acquisition an management, where performance outcomes are measure, analyze, an reporte (per GPRA). Visualization tool - The visualization is a graphical of architecture or some part of architecture. Here we investigate if the framework has a graphical tool or not. Different tools are available in the market, an each one of them has its capabilities an supporte framework(s), such as Allen Systems Group (ASG) Rochae, Casewise Corporate Moeler, Computas Metis, IDS Scheer ARIS, MEGA International, Popkin Software System Architect, Proforma ProVision an Ptech Enterprise FrameWork. A comparison among these tools can be foun in [18]. 4. Frameworks In this section we provie a high level comparison an analysis of three EAFs. Our selection for the three EAF is base on table (1) of enterprise architecture framework market share. We select the high ranking (equal or over 11%). The three selecte EAF contain the basic two classes of EAF: two classical an one feerate. The classical are Zachman an TOGAF, an the feerate is C4ISR. Table (2) provie an overview an comparisons of EAFs. The following notations are use to express the framework status for supporting an element in the table: Y : If a framework explicitly supports an element. N : If a framework oes not support an element or there is no mention of that element in the ocumentation. P : Where a framework partially supports or elues to support an element. The extent to which each EAF supports an interpret an element may iffer even when they have the same values in the same row. The following subsections will provie etails analysis for each EAF escribe in table (2). Goals Definition an Unerstaning Zachman TOGA F P Y Y Process N Y Y C4ISR Evolution Support N Y Y Stanarization N Y Y Knowlege Base N Y Y Inputs Business Drivers P Y Y Technology Inputs N Y Y Outcomes Business Moel Y Y Y Transitional Design N Y Y Miscellaneous Conformance N Y P (CCA)Compliance P P P Visualization tool Y Y Y Table (2): Comparisons of EAFs 4.1 Zachman Information System Framework Introuction John Zachman is the "Father" of the Zachman Framework for Enterprise an Information Systems. The primary goals of Zachman framework are for enterprise architecture analysis an moelling an it is also concerne with perspectives of constructing an information system. A perspective is a row in a table representing how a stakeholer in a project team woul view the system [15]. Scope (Planer) Contextual Enterprise Moel (owner) Conceptual System Moel (esigner) Logical Technology Moel (builer) Physical What Data List of things Semantic moel Logical ata moel Physical ata moel How Function List of processes Business process Where Network List of locations Business logistics Who People List of organizations When Time List of events Workflow moel Master scheule Why Motivation List of goals Business plan Application Distribute Human interface Processing Business rule architecture system architecture architecture structure moel System esign Detaile Data Program Representations efinition Technology Presentation architecture architecture Network Security architecture architecture Control structure Timing efinition Rule esign Rule specification Functioning Data Function Network Organization Scheule Strategy Enterprise (Subcontractor) Table (3): The Zachman Framework The framework architecture is a matrix of 30 cells, where the rows represent the ifferent perspectives an the columns the things viewe from each perspective. The examples suggeste by Zachman for each cell are shown, slightly abbreviate table (3) [19]. Each Cell is an outcome of an architecture activity base on an aspect of a system for a particular group of people an a singular focus on one aspect of the architecture such as ata, process or location. ZACHMAN has six rules, these rules helps in builing the EAF. The six rules are as follows [20]: Rule 1: Columns have no orer Rule 2: Each column has a simple, basic moel Rule 3: Basic moel of each column is unique Rule 4: Each row represents a istinct view 6
7 Rule 5: Each cell is unique Rule 6: Combining the cells in one row forms a complete escription from that view Zachman Framework Discussion Although Zachman has been referre to an use in frameworks such as FEAF, DoDAF an TOGAF, it oesn't support most of the comparison criteria. Below some of Zachman framework rawbacks. Zachman uses an analogy from classical builing architecture an military aircraft manufacturing to help efine information systems architecture (ISA). This approach is useful when the final outcome is a system because ISA helps in unerstaning the components that make up each iniviual application or system. Information Framework (IFW) uses the alternative analogy of a city plan rather than a builing plan. It provies an effective way to graually evelop a complete city of information. This compilation inclues information about iniviual applications an systems, as well as information output from other types of projects such as strategic planning or business process reengineering. [21]. The relation between one cell an another is not efine. That is, the consistency of the artefacts is not aresse. There is no iscussion as to the consistency from one cell to another, or from one row to another, or from one column to another [16]. A solution was provie by [22] to facilitate using of Zachman an relates in a consistency way among cells. Semantic behaviour, an how that behaviour affects the functioning of the components an their interactions, is not aresse [16]. The Zachman framework is not a stanar written by a professional organization, so no explicit compliance rules have been publishe. However, if the framework is use in its entirely an all the given relationship rules are followe, then compliance can be assume by efault [8]. Many visualization tools support Zachman are available, such as Popkin an IDS Scheer ARIS. 4.2 The Open Group Framework (TOGAF) Introuction TOGAF evelope by the Open Group in TOGAF is base on the Technical Framework for Information Management (TAFIM), which evelope by the Department of Defence (DoD). Version 8.0 of TOGAF is calle the 'Enterprise Eition' an is eicate to EA. The main components of the TOGAF are escribe in figure (3) [5]. Figure (3): TOGAF main components Development Metho (ADM), which is a specific process efine by TOGAF for the evelopment an maintenance of the organization's technical architecture [23]. The ADM consists of seven major phases: initiations an framework, baseline escription, target architecture, opportunities an solutions, migration planning, implementation, an architectural maintenance. The ADM is consiere to be the core of TOGAF, an consists of a stepwise cyclic approach for the evelopment of the overall enterprise architecture [5]. The TOGAF Enterprise Continuum, which aggregates two continua, the architectural continuum an the solutions continuum. The architectural continuum escribes the generalization / specialization of architectural components, whereas the solutions continuum illustrates the actual implementation of the components [23], an TOGAF Founation that contains the Technical Reference Moel, The Open Group's Stanars Information Base (SIB), an The Builing Blocks Information Base (BBIB) [5]. The TOGAF Resource Base, which is a set of resources incluing guielines templates an backgroun information to help the architect in the use of the ADM. TOGAF has a list of recommene architecture views as part of its resource base. These architecture views can be ivie into two main views, as follows: Business architecture views, which aresses the concerns of the users of the system, an escribes the flows of business information between people an business processes (e.g., People View, Process View, Function View, Business Information View, Usability View, Performance View) [5]. Technical architecture views, which inclue: 7
8 o o o Engineering views, which aress the concerns of System an Software Engineers an inclue Security, Software engineering, Data, System engineering, an Communications engineering view. Operations views, which aress the concerns of Operators, Aministrators an Managers an inclue Security, Software, Data, Computing / Harware, Communications view. Acquirers views which aress the concerns of procurement personnel responsible for acquiring the Commercial Off-The-Shelf (COTS) software an harware an inclue Builing blocks cost, Stanars view The Open Group Framework iscussion TOGAF has "Y" for all of the comparison criteria, except for (CCA) Compliance, it gets "P". TOGAF is like Zachman in its compliance with CCA. CCA compliancy can be it can be achieve using TOGAF when following the compliancy rules [8]. From our point of view, TOGAF has many strengths an may be the leaer of Enterprise Framework. The strengths are: TOGAF is supporte by an open strong committee, which anyone can participate on an provie a fully publishe prouct of its results. Proven Metho TOGAF offers a proven metho that is the result of years of research an evelopment by the worl's leaing enterprise architects. Common Vocabulary TOGAF guies architects in using a stanar taxonomy for business, information systems, an technology moelling. This share vocabulary means that everyone in an organization can rea an unerstan the information. Communication Moels of the enterprise architecture give visual representation to business concepts, an, when publishe on the corporate intranet, isseminate knowlege of the business to the workforce. Comman Decisions A business-focuse enterprise architecture provies knowlege about an organization an enables managers to make betterinforme ecisions. Reuce complexity A well evelope architecture leas to a better integrate solution portfolio, fewer interfaces, increase ata sharing, improve reliability of the solutions, an easier maintenance. Business-IT alignment The business focus of the architecture evelopment process an the strong emphasis on the nee for the implemente solution to be architecture-compliant together will help ensure that IT solutions are aligne to the nees of the business. Many visualization tools support TOGAF are available, such as MEGA an Popkin. 4.3 The Comman, Control, Communications, Intelligence, Surveillance, an Reconnaissance (C4ISR) Introuction The Comman, Control, Communications, Intelligence, Surveillance, an Reconnaissance (C4ISR) Framework, came from Defence Science Boar, who etermine in the early 1990s that one of the key means for ensuring interoperable an cost effective military systems is to establish comprehensive architectural guiance for all of DoD. Consequently, the C4ISR Integration Task Force evelope version 1.0 of the C4ISR Framework in June of 1996, an the C4ISR Working Group complete version 2.0 in December of 1997 [24]. C4ISR consiers three viewpoints, namely, an operational viewpoint, a systems viewpoint, an a technical viewpoint. The three views an their relationships are shown in figure (4) [11]. The operational view escribes the tasks an activities, the operational noes, an the information flows between noes that are require to accomplish or support an operation. The operational view escribes the nature of information exchanges in etail sufficient to etermine what specific egree of information-exchange interoperability is require. The systems view translates the require egree of interoperability into a set of system capabilities neee, ientifies current systems that are use in support of the operational requirements (or postulate systems that coul be use), an facilitates the comparison of current/postulate system implementations with the neee capabilities. The technical view articulates the criteria that govern the implementation of require system capabilities [24]. 8
9 4.3.2 C4ISR iscussion Figure (4): C4ISR views an their linkages The kins of information represente in each architecture view are highlighte in each view box. The wors on the arrows between the ifferent architecture views represent the manner in which the framework provies consistency among the ifferent views. The architecture proucts result from each of the views, plus the general information artefacts [16]. Table (4) represents the essential proucts of C4ISR framework. Applicable View All Views (Context) All Views (Terms) Systems Prouct Overview an Summary Information Integrate Dictionary High-level Concept Graphic Noe Connectivity Description Information Exchange Matrix System Interface Description General Nature Scope, purpose, intene users, environment epicte, analytical finings of the architecture. Definitions of all terms use in all proucts. High-level graphical escription of operational concept (high-level organizations, missions, geographic configuration, connectivity, etc.). noes, activities performe at each noe, connectivity & information flow between noes. Information exchange between noes an the relevant attributes of that exchange such as meia, quality, quantity, an the level of interoperability require. Ientification of systems an system components an their interfaces, within an between noes. Technical Technical Extraction of stanars that apply to the given architecture. Profile Table (4): C4ISR Framework Proucts C4ISR has "Y" for most of the comparison criteria; except for Conformance an (CCA) Compliance it gets "P. There is no conformance of a system to the architecture, there are only conformance criteria for the use of C4ISR in an architecture representation [16]. In orer to comply with CCA, the architecture escription must [8]: a. Inclue the appropriate set of proucts for the intene use. b. Use the common terms an efinitions as specifie in the framework. c. Be consistent with the Global Information Gri (GIG) an the Joint Technical (JTA).. Describe interoperability requirements in a stanar way. C4ISR is intentionally venor-tool-inepenent. Venor proucts exist to provie the framework proucts, but no specific venor is require. Some of the venor tools that coul be use are Ptech FrameWork, netviz an Sterling Software's COOL tools. Consistency across the architecture views is not truly aresse an Relationships among the concepts, an rules of structure, are minimal [16]. 5. Conclusions This paper has review the current state of EAF an the criteria that can be taken into consieration for the election of EAF. An examination of the literature will reveal the following very popular themes: There is no one best Framework No one framework is fully complete. Rather, each has strengths an weaknesses. It is important to match a framework s strengths with the particular "pain points" in your organization, so that the specific aspects of the framework that you nee are well represente in the choice you make. Also, it is not our expectation that any framework will be implemente in its entirety. Rather, think of a framework as a restaurant menu, where you can pick from among the most-appetizing ishes, an in oing so, think about implementing those pieces in a sequence that makes sense. Frameworks have strengths an weaknesses Frameworks are aaptable Tailoring the framework you choose is not only acceptable, it is expecte Selecting a framework shoul not consume a great eal of resources (get in an get out). 9
10 References About the authors: Saber Aballah is a PhD stuent at the epartment of information systems, faculty of computers an informatics, Cairo University. He is conucting research into enabling an supporting ebate uring architecting activities. Dr Galal H. Galal-Eeen is an associate professor of information systems at the faculty of computers an informatics, Cairo University an a professor of information systems at the British University in Egypt. 10
State of Louisiana Office of Information Technology. Change Management Plan
State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change
Enterprise Resource Planning
Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach
This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.
WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the
RUNESTONE, an International Student Collaboration Project
RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department
Chapter 9 AIRPORT SYSTEM PLANNING
Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................
! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6
! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,
A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS
A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS Lise Urbaczewski, Eastern Michigan University, [email protected] Stevan Mrdalj, Eastern Michigan University, [email protected] ABSTRACT An Enterprise
Aon Retiree Health Exchange
2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie
Data Center Power System Reliability Beyond the 9 s: A Practical Approach
Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical
The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis.
The higher eucation factor: The role of higher eucation in the hiring an promotion practices in the fire service. By Nick Geis Spring 2012 A paper submitte to the faculty of The University of North Carolina
Modelling and Resolving Software Dependencies
June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software
Rural Development Tools: What Are They and Where Do You Use Them?
Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist [email protected] Juith I. Stallmann
10.2 Systems of Linear Equations: Matrices
SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix
An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations
This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi
Product Differentiation for Software-as-a-Service Providers
University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation
An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it
An introuction to the Re Cross Re Crescent s Learning platform an how to aopt it www.ifrc.org Saving lives, changing mins. The International Feeration of Re Cross an Re Crescent Societies (IFRC) is the
Improving Direct Marketing Profitability with Neural Networks
Volume 9 o.5, September 011 Improving Direct Marketing Profitability with eural etworks Zaiyong Tang Salem State University Salem, MA 01970 ABSTRACT Data mining in irect marketing aims at ientifying the
Minimizing Makespan in Flow Shop Scheduling Using a Network Approach
Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie
A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements
International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,
A Data Placement Strategy in Scientific Cloud Workflows
A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,
The one-year non-life insurance risk
The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the
USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS
Proceeings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, an M. Fu, es. USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Anthony
Sustainability Through the Market: Making Markets Work for Everyone q
www.corporate-env-strategy.com Sustainability an the Market Sustainability Through the Market: Making Markets Work for Everyone q Peter White Sustainable evelopment is about ensuring a better quality of
Performance And Analysis Of Risk Assessment Methodologies In Information Security
International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala
Professional Level Options Module, Paper P4(SGP)
Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be
Firewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
Introduction to Integration Part 1: Anti-Differentiation
Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction
The Path to Program Sustainability
The Path to Progra Sustainability by Karen Buck The Sustainability Conunru A New Moel for Sustainability The Path to Progra Sustainability Step 1: What exactly are we trying to sustain? Step 2: How uch
Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service
DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,
Software Diversity for Information Security
for Information Security Pei-yu Chen, Gaurav Kataria an Ramayya Krishnan,3 Heinz School, Tepper School an 3 Cylab Carnegie Mellon University Abstract: In this paper we analyze a software iversification-base
Dow Jones Sustainability Group Index: A Global Benchmark for Corporate Sustainability
www.corporate-env-strategy.com Sustainability Inex Dow Jones Sustainability Group Inex: A Global Benchmark for Corporate Sustainability Ivo Knoepfel Increasingly investors are iversifying their portfolios
Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law
Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC
Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture
Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and
MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND
art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN
View Synthesis by Image Mapping and Interpolation
View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer
Why is oil and grease-free so important in oxygen systems?
Why is oil an grease-free so important in oxygen systems? 1. Forewor Oxygen this vital gas is more complex in its use than one woul imagine when consiering how matter-of-factly we inhale an exhale every
Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines
EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,
Stock Market Value Prediction Using Neural Networks
Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: [email protected] Hamireza Taremian Engineering
ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters
ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,
Qualified Annuity Claimant s Statement
Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight
How To Segmentate An Insurance Customer In An Insurance Business
International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah
EU Water Framework Directive vs. Integrated Water Resources Management: The Seven Mismatches
Water Resources Development, Vol. 20, No. 4, 565±575, December 2004 EU Water Framework Directive vs. Integrate Water Resources Management: The Seven Mismatches MUHAMMAD MIZANUR RAHAMAN, OLLI VARIS & TOMMI
Option Pricing for Inventory Management and Control
Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories
Improving Emulation Throughput for Multi-Project SoC Designs
Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest
Non Qualified Annuity Claimant s Statement
Non Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight
Search Advertising Based Promotion Strategies for Online Retailers
Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit [email protected] ABSTRACT Web site aresses of small on line retailers are often unknown
Unbalanced Power Flow Analysis in a Micro Grid
International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung
1 Introduction to the Recommendations and their Application Principles
1 Introuction to the Recommenations an their Application Principles 1.1 National an International Regulations for Piling Wors (1) Since the implementation ofdin EN 1997-1:2009-09: Eurocoe 7: Geotechnical
HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT
International Journal of Avance Research in Computer Engineering & Technology (IJARCET) HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT Pawan Kumar, Pijush Kanti Dutta Pramanik Computer Science
Government-wide Enterprise Architecture In KOREA. National Computerization Agency
Government-wide Enterprise Architecture In KOREA Content 1. About NCA 2. Works on Enterprise Architecture 3. Government-wide Enterprise Archtecture Framework 4. Comparison with TOGAF 5. Future Work 2 About
A New Evaluation Measure for Information Retrieval Systems
A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz [email protected] Christian Bauckhage Deutsche Telekom Laboratories [email protected] Jérôme Kunegis [email protected]
JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT
OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,
Supporting Adaptive Workflows in Advanced Application Environments
Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering
SAMPLE SEO Analysis Report
Page 1 SAMPLE SEO Analysis Report October 3, 2009 Page 2 SAMPLE Keywor Phrase Analysis: Tier #3 Hello Via Net Marketing, Below is the list of keywors that represents the market research that has been performe
OSEMD-00-PP2 Page 1 of 5
OSEMD-00-PP2 Page 1 of 5 Oil Sans Environmental Management Division Approvals Program Interim Policy Emission Guielines for Oxies of Nitrogen (NOx) for New Boilers, Heaters an Turines Using Gaseous Fuels
Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform
Manate-Base Health Reform an the Labor Market: Evience from the Massachusetts Reform Jonathan T. Kolsta Wharton School, University of Pennsylvania an NBER Amana E. Kowalski Department of Economics, Yale
y or f (x) to determine their nature.
Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic
Optimal Energy Commitments with Storage and Intermittent Supply
Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,
Math 230.01, Fall 2012: HW 1 Solutions
Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The
Cross-Over Analysis Using T-Tests
Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES
A MUTI-CRITERIA EVAUATION OF INFORMATION SECURITY CONTROS USING BOOEAN FEATURES Angel R. Otero 1, Carlos E. Otero 2 an Abrar Qureshi 2 1 Grauate School of Computer an Information Sciences, Nova Southeastern
Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy
Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Level 2 Valiation Version 1.1 July 2011 Table of Contents Introuction 2 References 2 Document Organization 2 Moule Descriptions
Malawi Television White Spaces (TVWS) Pilot Network Performance Analysis
Journal of Wireless Networking an Communications 2014, 4(1): 26-32 DOI: 10.5923/j.jwnc.20140401.04 Malawi Television White Spaces (TVWS) Pilot Network Performance Analysis C. Mikeka 1,*, M. Thoi 1, J.
Young people and healthy eating: a systematic review of research on barriers and facilitators
HEALTH EDUCATION RESEARCH Vol.21 no.2 2006 Theory & Practice Pages 239 257 Avance Access publication 26 October 2005 Young people an healthy eating: a systematic review of research on barriers an facilitators
The development of an innovative education curriculum for 11 16 yr old children with type 1 diabetes mellitus (T1DM)
Peiatric Diabetes 2006: 7: 322 328 All rights reserve # 2006 The Authors Journal compilation # 2006 Blackwell Munksgaar Peiatric Diabetes Original Article The evelopment of an innovative eucation curriculum
DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES
DECISION SUPPORT SYSTEM OR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES Svetlana Vinnik 1, Marc H. Scholl 2 Abstract Decision-making in the fiel of acaemic planning involves extensive analysis
An Overview of Enterprise Architecture Framework Deliverables
An Overview of Enterprise Architecture Framework Deliverables A study of existing literature on architectures Frank Goethals - SAP-leerstoel Abstract: A number of enterprise architecture frameworks do
Software Development in the Large!
Software Development in the Large! Peter Eeles Executive IT Architect, IBM [email protected] IBM Rational Software Development Conference 2007 2007 IBM Corporation Agenda IBM Rational Software Development
Cost optimization of supply chain with multimodal transport
Proceeings of the Feerate Conference on Computer Science an Information Systems pp. 8 ISB 978-83-6080-5-4 Cost optimization of supply chain with multimoal transport Paweł Sitek Kielce University of Technology
Digital barrier option contract with exponential random time
IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun
Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market
RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational
Hybrid Model Predictive Control Applied to Production-Inventory Systems
Preprint of paper to appear in the 18th IFAC Worl Congress, August 28 - Sept. 2, 211, Milan, Italy Hybri Moel Preictive Control Applie to Prouction-Inventory Systems Naresh N. Nanola Daniel E. Rivera Control
Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition
Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli
Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014
Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,
INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES
1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical
An Introduction to Event-triggered and Self-triggered Control
An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale
A hybrid approach to supply chain modeling and optimization
Proceeings of the 2013 Feerate Conference on Computer Science an Information Systems pp. 1211 1218 A hybri approach to supply chain moeling an optimization Paweł Site Kielce University of Technology Al.
Achieving quality audio testing for mobile phones
Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing
The most common model to support workforce management of telephone call centers is
Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering
ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014
ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory
Trends in Enterprise Architecture
Trends in Enterprise Architecture 2005 How are Organizations Progressing? Web-form Based Survey 2005 Report of the Third Measurement December 2005 Edition 1.0 J. Schekkerman 1 Copyright, Institute For
Net Neutrality, Network Capacity, and Innovation at the Edges
Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)
Feasibility of Implementation of Strategic Management on Brand Identity of Sepah Bank
Online Access: www.absronline.org/journals Management an Aministrative Sciences Review Volume 4, Issue 3 Pages: 635-646 May 2015 e-issn: 2308-1368 p-issn: 2310-872X Feasibility of Implementation of Strategic
Enterprise Architecture Assessment Guide
Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s
