Application of Network Visualization to Identify Gaps in Complex. Information System Architectures. Carlos E. Martinez. Sheila A.
|
|
|
- Darrell Richardson
- 9 years ago
- Views:
Transcription
1 Approved for Public Release; Distribution Unlimited Case # Application of Network Visualization to Identify Gaps in Complex Information System Architectures Carlos E. Martinez Sheila A. Cane Salwa Abdul-Rauf Kevin Smith Kristin Lee POC: Carlos E. Martinez The MITRE Corporation 7515 Colshire Dr. McLean, VA [email protected] Approved for Public Release; Distribution Unlimited MITRE Tracking Number: The MITRE Corporation. All rights reserved. 1
2 Application of Network Visualization to Identify Gaps in Complex Information Systems Architectures Abstract This paper follows earlier work aimed at ensuring a connection between the information sharing needs of a large number of participants comprising a distributed command, control, and coordination network and the underlying communications capabilities that they possess; and on the relational model and database built as part of a subsequent effort to analyze the complex relationships involved. The relationships among participants and their varied means of communications is captured in a relational database, which provides the means to automatically catalog needs and capabilities as well as to enumerate gaps between participants. However, complexity due to the large numbers of entities and relationships makes it difficult to readily identify the most critical gaps, or identify patterns in gaps among various classes of participants by using tabular reports alone. This paper examines the applicability of network visualization techniques linked directly to the underlying relational data elements to analyze and portray information in a more intuitive way, including identification, comprehension, and presentation of participant interdependent relationships and capability gaps. The paper will present a summary of the problem, a discussion of visualization techniques that will be used to conduct analyses, and an assessment of the utility of various visualization approaches. Since the paper is being written on the basis of current ongoing research and analysis in the classified arena, the paper will present notional examples rather than actual results. 2
3 Introduction Organizations are increasingly called upon to work in concert to achieve a common purpose. Examples include multi-national military coalitions formed to establish and maintain peace in a distant land; local police, fire, and emergency rescue units jointly tasked to respond to a major disaster; and metropolitan transportation authorities directed to ensure smooth traffic flows in and out of large cities that straddle jurisdictions. Usually the individual entities in these partnerships were created to meet different objectives; governed by different entities; and characterized by very different organizational structures, processes, and communications infrastructures. These and similar entities are often federated into joint organizations to ensure proper command, control, and coordination of crisis management activities. The necessary business processes, information flows, and supporting information systems of these joint entities can be represented as a complex, information systems architecture. Each member brings missions, organizations, information elements, facilities, communications, and information technology components to bear on any particular scenario. A notional model of this complex architecture is shown in Figure 1 (Lee, Cane, Abdul-Rauf, & Martinez, 2007). Figure 1: Conceptual Model of a Complex Information Systems Architecture (Lee, et. al, 2007) 3
4 To address the complexities represented by this architecture, the authors developed a relational database that would permit pulling analytical threads through the architecture to answer a rich variety of questions regarding the ability of a complex organization to meet its mission objectives given the infrastructure components its members possessed (Martinez, Mullins, & Sullivan, 2006). Lee, et al. (2007), describes the analytical objectives of the architectural database, as shown in Figure 2. This paper addresses the analysis required to identify operational gaps, and to associate proposed changes to these gaps, as shown in Figure 2 by the arrow between the as-is operational/business architecture and the to-be operational/business architecture. It also begins to address at a high level the analysis of organizational infrastructure required to support operational needs. Figure 2: Analytical Objectives of the architecture (Lee et al., 2007). The use of a model such as this presupposes that the operational/business model has been adequately defined. Where a central authoritative source exists, it may be fairly straightforward to define and document the operation/business model, although for a large-scale business enterprise, it may still be fairly laborious to do so. However, for a large-scale complex system such as that represented by a distributed command, control, and coordination system, where a set of independent organizations must work in concert to accomplish a set of common objectives, it is not likely that there is a single authoritative source to provide the necessary information to define the operational/business model. Each organization may have to be polled independently and their multiple inputs integrated into a single model. To do so, their inputs need to be reconciled to ensure that the organizations possess a common understanding of their respective roles and responsibilities and a common perspective of their needs to 4
5 communicate between organizations. To do so, questions such as the following must be answered: 1. What functions must each organization perform to fulfill their responsibilities within the overall context of the complex system? 2. Which organizations believe they have a need to communicate with which other organizations to accomplish their respective functions? 3. By what means do these organizations need to communicate with each other? 4. Do the various organizations agree with respect to their mutual need to communicate and the means by which they must do so? 5. Do the organizations with identified needs to communicate with each other represent reasonable groupings of organizations that should be expected to communicate with each other in a distributed command, control, and coordination system? It is to answer questions such as these that the authors have proposed the use of visualizations of the architecture model visualizations drawn directly from the data. Assuming one has collected the necessary information from each of the organizations and entered the results into an integrated relational database, the first three of these questions can be answered via fairly simple queries with the results presented either in tabular or graphic form. For the fourth question, more complex queries are needed, and while the results may still be presented in tabular form, the advantages of visualization techniques are apparent. Finally, to answer the last question, which requires the considerable application of human judgment, some form of visualization becomes almost a necessity. Beyond answering pre-defined questions from the database, another advantage of visualization is its ability to inspire the analyst. Visualizations help suggest additional queries: when an analyst sees a picture, it may stimulate another question. This paper presents the results of the research team s work in prototyping a visualization approach to presenting and analyzing a complex information system architecture, with a particular emphasis on inter-organizational communication support for key missions. It begins with a discussion of alternative architecture tools and visualization methods considered, describes the team s methodology for conducting analyses to help establish the operational/business model for a complex, distributed command, control, and coordination system using a visualization approach, and presents comparative results of the use of tabular versus visual representation in support of establishing the operational/business model. The paper provides initial conclusions, and offers recommendations for further study. Enterprise Architecture Frameworks and Tools Enterprise architecture provides a framework or taxonomy of systems analysis models and is used to align information technology with organizational strategy (Rico, 2006). Enterprise architecture is a strategic information asset base, which defines the business, the information necessary to support the business operations, and the transitional processes necessary for implementing new technologies in response to the changing 5
6 needs of the business and is used to explain how the information technology elements of the organization works together, including people, processes, systems and organizations (Morganwalp and Sage, 2004). Enterprise architectures, by their very name, are designed to address large-scale, complex systems and employ the use of visualizations to support comprehension of the information they present. Many architecture frameworks have been defined in the recent past. Notable examples include Zachman (1987), Spewak (1992) and the US Department of Defense Architecture Framework (DoDAF). The Zachman framework includes architectural models developed by considering classic building architecture processes, and aims to provide the different perspectives of all of the different participants. Spewak s enterprise architecture planning method is less complex than Zachman s, and attempts to provide an overarching plan for an enterprise s technology, including the definition of architectures representing the information used to support the business and the plan to implement those architectures. Spewak s architecture is often represented as a wedding cake. The top layer includes the initiation of planning; the second layer describes the as-is state of the organization and includes models of the business and a description of the current systems and technology; the third layer identifies the data, applications and the technology architecture required for the future state; the fourth layer describes the implementation and migration plans required to make the architecture a reality. The DoDAF principally is a set of architecture models and data that are driven from the perspective of supporting engineering design and analysis, which provides much more detailed views of an architecture, but consequently serves a narrower set of constituents. The enterprise architecture frameworks as implemented in many tools consist of sets of useful abstract views of an enterprise, each capable of being represented by one or more visual aids. However, these abstractions have purposes which may be better suited for one end and not for another. The visual aspects of enterprise architecture tools are used to conceive of and portray technical or operational solutions. While these enterprise architecture tools provide techniques for design, when the scope is large they have limited capability to visually present analytical results. The focus of architecting tools (to date) has been geared towards system engineering and graphics generation or modeling, and not on the data or the analysis of the data captured in the models. That is, in developing a architecture a user is directed into developing a graphic model, either based on some standard or a template provided by the tool. For example, in developing a business process the user is taken directly into a drawing environment to model the process. Similarly, to develop an organization chart a drawing environment is used to model the organization. There are numerous architecture tools that have been developed to help portray enterprise architectures (e.g., System Architect, Metis). These tools are principally designed for the user to draw or model an architecture (usually for a system or a business process). While modeling a system, it is as important to fully understand and develop the architecture s underlying data/information constructs, relations, and rules, as it is to draw a model of the system and organizational relationships. While the tools provide very robust capabilities to visually depict various views of the architecture, they presume that the architect or 6
7 analyst already possesses a sufficient understanding of the underlying complexities of the system being modeled to accurately and adequately depict these relationships using the visualization capabilities provided by the tool. Furthermore, once the models are drawn, the tools do not provide off-the-shelf analysis of the data/information portrayed in these models to, for example, examine gaps in capabilities either internal to an organization, or across organizations. Herein lies the problem with the use of most architectural tools available today. If the analyst does not already possess the necessary knowledge and insight into the relationships in the architecture model, such as is likely to be the case in a complex distributed command, control, and coordination system, he or she is at a major disadvantage in presenting an accurate visual representation of the architecture. Our experience shows that it is easier to for an analyst to grasp complex information in a graphic format rather than text. Consequently, a means must be provided to enable the analyst to enhance comprehension of the relationships inherent in an architecture model. Furthermore, while enterprise architecture tools may provide adequate capabilities to support engineering level decisions, they have limited utility in summarizing the information to support executive level decision making. Database-Driven Analytical and Visualization Approach Our approach takes the opposite approach of most enterprise architecture tools and creates visualizations from data, rather than data from visualizations. Specifically, our approach is to use visualization of the data to provide the capability for analysts to literally see complex relationships and immediately recognize disconnects in capabilities, both operational and technical. To do so, requires the development and population of an integrated relational database as described in Lee, et al (2007). The team s approach to development of the database consisted of the following steps: 1. Define the issues and questions to be answered by the architecture. For example, what are the relationships between organizations that allow them to communicate to execute missions, and what are the gaps in those relationships? Definition of the issues and questions helps direct and define the data modeling process, scope the breadth of the data collection effort, and define the level of detail that needs to be captured. 2. Build a relational database to provide explicit links between the elements of the architecture. The database should include explicit data elements defined to levels of detail required to address the issues and answer the questions defined in Step 1. While there is room here for a cost-benefits assessment, in general the team believed the best strategy was to build a database that models the actual environment with as much fidelity as possible, and provide custom views of the data in the form of tables, charts, and other visualization aids to meet a variety of specific analytic needs. The database employs key fields that provide the capability to implement complex queries. In developing the database, the team focused on the data, its constructs, relations, and rules. By construct, we mean the definition of the data object and its attributes; the relations 7
8 define the relationships that exist between the defined objects; and the rules define specific rules associated with a particular attribute or collection of attributes. 3. Build and use tools/mechanisms to enter and maintain the data in the database. The team considered collecting and displaying the data in spreadsheets. While that may serve a particular need well, it may be of no or limited value for other needs. Attempts at simplifying data collection and abstracting away complexity may have short term utility, but often lead to analytic dead ends. To make the data available for later analysis, the team developed rule-driven data entry screens that employ pick lists of standardized terms to facilitate data entry and ensure a consistent data set that can support automated queries. The team employed a combination of MS Access and SQL Server to provide data entry and query capabilities. Given that we built an open database, we could easily connect or import data to any number of tools (e.g., develop an organization chart in System Architect). 4. Build and use tools/mechanisms to generate graphic visualizations directly from the database. The team selected netviz to provide visualizations of the database contents. The netviz software is an off-the-shelf network analysis tool that allows you to search and filter data, view connectivity between nodes, and portray data in tabular format. In addition, netviz provides the capability to show gaps in connectivity. While netviz is typically marketed as a telecommunications analysis tool, we used it to analyze operations and gaps. Having chosen netviz, we found we could model objects using any set of visualization icons and any number of types of lines to connect those objects. Proposed Visualization Methodology As described in the Introduction, the first problem set the team addressed was to develop a consistent operational/business model for a set of organizations comprising a complex, distributed command, control, and coordination system. A complex endeavor is characterized by a large number of disparate entities that include not only various military units but also civil authorities, multinational and international organizations, non-governmental organizations, companies, and private volunteer organizations (Alberts and Hayes, 2007, p.9-10). The complex endeavor we are concerned with is loosely organized, with no centralized authority, where the components need to work together to achieve a set of objectives. To enable development of a consistent operational/business model among the organizations within the complex endeavor requires identification of inconsistencies among participants, both with regard to their perceived needs to communicate with to each other, and the means by which they must communicate. The relational database was developed to capture information on communication needs from each of the participating organizations for each of their functions. Communications needs include who the partner organizations are as well as whether or not they communicate using voice, video or data. The team defined a set of visualizations to permit recognition of inconsistencies and disconnects among the data. A data inconsistency occurs when two different data elements with the same meaning have 8
9 different names. Inconsistencies are likely to be found in the data because each organization involved in the project will provide inputs to the database from their own perspective with little or no opportunity to coordinate responses with other organizations. The team provided pick-lists to minimize the occurrence of data inconsistencies for simple entities. However, for complex functions, it is not feasible to provide pick lists. Inconsistencies can be found by examining the data. We define a disconnect (or gap) as occurring when two organizations identify conflicting partnerships. For example, if organization A identifies organization B as a partner, but organization B does not identify organization A as a partner, there is a disconnect between organizations A and B. Inconsistencies can be found in organizational relationships as well. For example, if organization A and B each identify the other as a partner, but they identify differing communication needs, their relationship is considered inconsistent. Figures 3 and 4 present the team s proposed visualization approach to enable analysts as well as senior managers to quickly recognize inconsistencies and disconnects among the operational/business model of the organizations with respect to their inter-organizational communications needs. Figure 3 describes the symbology used to describe organizational relationships as well as high-level communications needs. Figure 3: Visualization Symbology to Describe Organizational Relationships Organizations are portrayed using circles (nodes). The lines between nodes represent the relationships between the organizations. For any two organizations, if each identifies the 9
10 other as a partner and they agree on media (voice, video or data) the relationship is fully consistent and the line is solid. If they both agree they are partners but don t agree on the communications media, the relationship is partially consistent. If one has identified the other as partner, but the partner has not reciprocated, the relationship is inconsistent. The right side of figure 3 articulates the logic behind these relationships. Figure 4 contains an example visualization of an executive level view of the status of the complex endeavor s communications. This view shows an overall picture of nodes and their partners. Organizations are green when all of their relationships are fully consistent, i.e., they know who their partners are, and they know at a high level how they will communicate. Organizations are yellow when only some of their partner relationships are fully consistent. Organizations are red when none of the relationships with their partners are fully consistent. While a complex organization has no central authority, there will usually be an architect or executive that has overall responsibility for identifying issues. This view provides the architect or executive a means to understand the organizational disconnects, as well as help them to prioritize risk mitigation. This view provided over time also gives the executive a means of tracking progress in correcting gaps. Figure 4: Sample Visualization of Organizational Relationships Given the manually-developed symbology defined in Figures 3 and 4, the team evaluated netviz to see if it could emulate the symbology using the information from the database. Because the actual problem set against which the team s methodology is being employed 10
11 is classified, the team defined a completely unclassified, yet comparably complex problem against which to test the methodology. The test set consists of the primary functions of a number of local government organizations that may have to work cooperatively within a given region to respond to a major emergency. Figure 5 presents the selected symbology as implemented in netviz. Figure 5 demonstrates another feature of data visualization the layout of the various organizational elements to show relationships among different types of organizations such as mayor s offices, police departments, fire departments, etc. Figure 5: Sample netviz Representation of Inter-Organizational Relationships Comparative Analysis of Techniques The comparative analysis is based on a test data set, as examined by queries of the database. The test data set uses Washington, D.C. area government agencies emergency response functions (i.e., fire, rescue, police, etc.) for context. The test data set describes a set of notional emergency response functions performed by a variety of local government organizations. To build the data set, the team researched web pages to determine the actual organizational structures of several local government agencies, including the State of Virginia, Fairfax County, VA, and Arlington, VA i. Several organizations that would likely have emergency response responsibilities were selected, and a database populated with notional information regarding the emergency functions that these organizations would likely perform, other organizations with whom 11
12 they would have to work to accomplish the identified function, and the means of communications they would likely need with each of these organizations. Three possible means of communication were identified for the test case: Audio. Simple voice communications such as landline telephones, ordinary cell phones, or radio. Video. Video teleconferencing communications to enable face-to-face meetings and expand upon audio communications to enable sharing of simple graphics. Data. Electronic exchange of digital media to include with attachments and file transfers. For example, the team postulated that the Fairfax County Emergency Fire and Rescue organization would need to perform the function Contain and extinguish Fairfax County fires. For this function a number of partner organizations were identified with whom the Fairfax County Emergency Fire and Rescue organization would likely need to work, such as the Fairfax County Office of Emergency Management, the Virginia Department of Emergency Management, and the Fairfax County Police Department. The team also postulated that among these partners, only audio communications would be needed. The team repeated the process for several government agencies within Fairfax and Arlington Counties in Virginia and for selected state-level government agencies. The data was entered into a relational database against which queries could be conducted to determine which organizations had identified which others as partners and what means of communications each of these organizations believed they needed with each of their partners. To demonstrate the utility of the analytical technique in finding anomalies, the team intentionally excluded several organizations and relationships that would ordinarily exist. Figure 6 presents a typical tabular presentation of the contents of the database for the hypothetical set of organizations for which test data was entered. This particular tabular view is an NxN table that shows the same set of organizations down the side as across the top. Each cell in the table presents the required means of communications (a = audio, v = video, d = data) between the pairs of organizations that form the cell intersection. The data was compiled and presented from the perspective of the organizations listed in the rows. For example, as shown by the symbols a,d at the intersection of the 4th row and 5th column of the table, hypothetically, the Fairfax County Office of Emergency Management has expressed a need for audio and data communications with the Fairfax County Fire and Rescue Department. However, as shown by the symbol a at the intersection of the 5th row and 4 th column of the table, the Fairfax County Fire and Rescue Department only believes that it needs audio for its communications with the Office of Emergency Management of Fairfax. Similarly, while the Arlington County Fire Department has indicated no need for any communications with the Arlington County Sheriff (blank cell at the intersection of row 9 and column 11), the Arlington County Sheriff has indicated a need to have audio communications with the Arlington County Fire Department ( a at the intersection of row 11 and column 9). 12
13 Figure 6: Notional Partners and Communications Needs among Organizations As can be seen from this simple hypothetical example, however, it is difficult to recognize which organizations have a common perspective regarding the need to communicate with each other, which organizations have a common perspective regarding their required mutual needs of communication, or even if there are some organizational relationships that should have been identified, but were not. Using the notational symbology presented in Figure 4, the same information can be presented visually as depicted in Figure 7. This figure was hand drawn from the data presented in Figure 6 via a laborious process that required careful examination of the contents of the table and was designed to establish a benchmark against which to test the software queries and resulting netviz graphics that facilitate analysis of the data contents via visualizations. The actual netviz-generated graphics are presented in Appendix A. As can be seen from this figure, it is relatively easy to see which organizations have a common perspective with respect to their mutual communications needs (solid lines), which disagree with respect to the means of communication (dashed lines), and which do not share a common perspective with regard to the need to communicate with each other at all (dotted lines). 13
14 Figure 7: Visual Presentation of Communications Needs among Organizations While database queries can be written to list these inconsistencies in tabular or narrative reports, the authors believe that visual presentations portray the information in a more readily comprehendible way, in particular for its use by analysts and managers. In addition, the visual presentations can highlight inconsistencies in the data that the human mind can immediately detect but would be difficult to detect using database queries. In Figure 7, the organizations have been laid out with one county s organizations on the left and the other county s functional counterparts on the right, such that differences between the two become readily apparent. For example, the blue circles in Figure 8 highlight information that is presented on one side of the graphic but not the other. There appear to be major differences between the information captured for one county s (notional) organizations than for the other. This could be due to incomplete data gathering, inconsistencies in organizational perspectives, or differences in organizational structures and relationships. The visualizations make these differences readily apparent and prompt the analyst to probe further into the data. 14
15 Figure 8: Demonstration of Advantages of Visualization Layout Results and Conclusions From the fictitious example constructed for this paper, the authors have concluded that graphical visualizations of the data can significantly reduce the time needed to comprehend the results of analysis of the complicated relationships that are characteristic of complex endeavors. Even for this simple example that contains only a handful of organizations, there were relationships (or absences thereof) that would have been next to impossible to detect without presenting graphics that were directly derived from the data. For a real example, say all of the counties and emergency response organizations within a large metropolitan area, the analytical problem would become almost intractable. However, the ability to model the elements of the architecture in a relational database coupled with an automated query capability and visualization tool to generate the graphics directly from the data enables the complexities of such information system architectures to be more readily studied. Recommendations for Follow-on Research Future work in the use of database-driven analysis coupled with automated visualizations is being pursued with respect to identifying gaps between communications needs as 15
16 described in the sample presented herein, and capabilities to communicate, as can be captured with respect to the existing means of communications that exist among participating organizations. The results of these analyses and how they can support operational planning and investment decisions will be the subject of additional future study. 16
17 Appendix A: Sample netviz Results 17
18 References Alberts, D.S. and R.E. Hayes, Planning: Complex Endeavors. Washington, DC:CCRP DoD Architecture Framework, Version 1.0, Volume 1: Definitions and Guidelines Downloaded from Lee, K., S. Cane, S.Abdul-Rauf, and C. Martinez An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment. Paper presented at Command and Control Research and Technology Symposium, June 19-21; in Newport, RI. Martinez, C.E., K. Mullins, and K.S. Sullivan A Framework for Architecture Based Planning and Assessment to Support Modeling and Simulation of Network Centric Command and Control, Paper presented at Command and Control Research and Technology Symposium, June 20-22; in San Diego, CA. Morganwalp, J.M., and A.P. Sage Enterprise Architecture Measures of Effectiveness. International Journal of Technology, Policy and Management, 4(1): Rico, D.F A Framework for Measuring ROI of Enterprise Architecture. Journal of Organizational and End User Computing, 18(2): i-xii. Spewak, S.H., and S.C. Hill Enterprise Architecture Planning: Developing a Blueprint for Data, Applications, and Technology. New York, N.Y.:John Wiley and Sons, Inc. Zachman, J.A A Framework for Information Systems Architecture. IBM Systems Journal, 26(3): i Organizational names were selected from the following web pages: the State of Virginia at nch.html, Fairfax County, VA at and Arlington, VA at 18
An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment
An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment Kristin Lee Sheila Cane Salwa Abdul-Rauf Carlos E. Martinez The MITRE Corporation McLean, Virginia March
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
Issues in Information Systems Volume 15, Issue I, pp. 52-60, 2014
ORGANIZATIONALLY AGNOSTIC BUSINESS MODELING: HOW TO MAKE BUSINESS ARCHITECTURE ADAPTABLE TO ORGANIZATIONAL CHANGE Carlos E. Martinez, The MITRE Corporation, [email protected] Sheila A. Cane, The MITRE
Service Oriented Architectures Using DoDAF1
1 Service Oriented Architectures Using DoDAF1 Huei-Wan Ang, Fatma Dandashi, Michael McFarren The Mitre Corporation The MITRE Corp. 7515 Colshire Dr. McLean, VA 22102 hwang(at)mitre.org, dandashi(at)mitre.org,
Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005
Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005 Government Investment Analysis Guidance Current Government acquisition guidelines mandate the
White Paper on netterrain, An Automated, Graphical IT Documentation System Published by Graphical Networks
White Paper on netterrain, An Automated, Graphical IT Documentation System Published by Graphical Networks IT networks, workflow models, and conceptual designs have one thing in common: they are complex
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains Mary J. Simpson System Concepts 6400 32 nd Northwest, #9 Seattle, WA 98107 USA Joseph J. Simpson System Concepts
Northrop Grumman White Paper
Northrop Grumman White Paper A Distributed Core Network for the FirstNet Nationwide Network State Connectivity to the Core Network April 2014 Provided by: Northrop Grumman Corporation Information Systems
Modeling Guidelines Manual
Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe [email protected] Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
Information Architecture Planning Template for Health, Safety, and Environmental Organizations
Environmental Conference September 18-20, 2005 The Fairmont Hotel Information Architecture Planning Template for Health, Safety, and Environmental Organizations Presented By: Alan MacGregor ENVIRON International
An Esri White Paper May 2012 ArcGIS for Emergency Management
An Esri White Paper May 2012 ArcGIS for Emergency Management Esri, 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB esri.com Copyright 2012 Esri
ARCHITECTURE DESIGN OF SECURITY SYSTEM
Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN
Developing an Enterprise Architecture
21234 21234 21234 21234 21234 21234 21234 21234 21234 21234 21234 21234 21234 BUSINESS PROCESS TRENDS 21234 21234 21234 WHITEPAPER January 2003 Author: Paul Harmon Executive Editor Process Trends Developing
Enterprise Architecture Assessment Guide
Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s
Guidelines for Best Practices in Data Management Roles and Responsibilities
Guidelines for Best Practices in Data Management Roles and Responsibilities September 2010 Data Architecture Advisory Committee A subcommittee of Information Architecture & Standards Branch Table of Contents
A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Overview.
A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Andersen Consultng 1600 K Street, N.W., Washington, DC 20006-2873 (202) 862-8080 (voice), (202) 785-4689 (fax) [email protected]
Business Analyst to Business Architect
Business Analyst to Business Architect To Infinity... and Beyond! White Paper March 2010 Authors: Jack Hilty Cathy Brunsting Editor: Janice Koerber Copyright 2010 SentientPoint, Inc. All Rights Reserved
Training Opportunities
FEMA Independent Study Courses IS-288.A: The Role of Voluntary Organizations in Emergency Management To complete the above course please visit the FEMA Independent Study Website at: http://training.fema.gov/is
Partnering for Project Success: Project Manager and Business Analyst Collaboration
Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,
Transforming Internal Audit: A Maturity Model from Data Analytics to Continuous Assurance
ADVISORY SERVICES Transforming Internal Audit: A Model from Data Analytics to Assurance kpmg.com Contents Executive summary 1 Making the journey 2 The value of identifying maturity levels 4 Internal audit
All-in-One Asset Management Tool
APEX-RU0781 All-in-One Asset Management Tool Final Report October 2012 Submitted by Mansooreh Mollaghasemi, Ph.D. Chairman and CEO Productivity Apex, Inc 3505 Lake Lynda Drive, Suite 206 Orlando, FL 32817
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
CHAPTER 4: BUSINESS ANALYTICS
Chapter 4: Business Analytics CHAPTER 4: BUSINESS ANALYTICS Objectives Introduction The objectives are: Describe Business Analytics Explain the terminology associated with Business Analytics Describe the
Style Guide for Writing Online Custom Courses
Style Guide for Writing Online Custom Courses 2 Introduction Web-based learning has become an integral component of most training programs because it is scalable and provides an economic advantage over
Expense Planning and Control Performance Blueprint Powered by TM1
IBM Software Business Analytics Application Brief Cognos Software Expense Planning and Control Performance Blueprint Powered by TM1 2 Expense Planning and Control Performance Blueprint Powered by TM1 Executive
A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS
A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS Lise Urbaczewski, Eastern Michigan University, [email protected] Stevan Mrdalj, Eastern Michigan University, [email protected] ABSTRACT An Enterprise
Business Process Management In An Application Development Environment
Business Process Management In An Application Development Environment Overview Today, many core business processes are embedded within applications, such that it s no longer possible to make changes to
Microsoft Access 2010 handout
Microsoft Access 2010 handout Access 2010 is a relational database program you can use to create and manage large quantities of data. You can use Access to manage anything from a home inventory to a giant
The Perusal and Review of Different Aspects of the Architecture of Information Security
The Perusal and Review of Different Aspects of the Architecture of Information Security Vipin Kumar Research Scholar, CMJ University, Shillong, Meghalaya (India) Abstract The purpose of the security architecture
Interoperable Learning Leveraging Building Information Modeling (BIM) in Construction Management and Structural Engineering Education
Interoperable Learning Leveraging Building Information Modeling (BIM) in Construction Management and Structural Engineering Education Eric L. Richards and Caroline M. Clevenger, PhD Colorado State University
Enhanced Call Tracking System (ECaTS)
NASCIO 2013 State IT Recognition Awards Enhanced Call Tracking System (ECaTS) Category Data, Information and Knowledge Management Project Initiation Date: April 2009 Project Completion Date: July 2012
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
BIM.03. Leveraging the Power of 4D Models for Analyzing and Presenting CPM Schedule Delay Analyses
BIM.03 Leveraging the Power of 4D Models for Analyzing and Presenting CPM Schedule Delay Analyses Mr. Kevin Coyne, PE PSP T his paper explores the use of 4D models, which provide a virtual construction
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
Enterprise Architecture Development Based on Enterprise Ontology
Enterprise Architecture Development Based on Enterprise Ontology 1, 2, 3 1 Nooretouba University, E-Commerce Group, Tehran, Iran, [email protected] 2 Iran University of Science & Technology, School of
Toad for Data Analysts, Tips n Tricks
Toad for Data Analysts, Tips n Tricks or Things Everyone Should Know about TDA Just what is Toad for Data Analysts? Toad is a brand at Quest. We have several tools that have been built explicitly for developers
CDC UNIFIED PROCESS PRACTICES GUIDE
Purpose The purpose of this document is to provide guidance on the practice of Modeling and to describe the practice overview, requirements, best practices, activities, and key terms related to these requirements.
Model Simulation in Rational Software Architect: Business Process Simulation
Model Simulation in Rational Software Architect: Business Process Simulation Mattias Mohlin Senior Software Architect IBM The BPMN (Business Process Model and Notation) is the industry standard notation
Big Data Engineer Position Description
Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
Top 10 Business Intelligence (BI) Requirements Analysis Questions
Top 10 Business Intelligence (BI) Requirements Analysis Questions Business data is growing exponentially in volume, velocity and variety! Customer requirements, competition and innovation are driving rapid
SOA: The missing link between Enterprise Architecture and Solution Architecture
SOA: The missing link between Enterprise Architecture and Solution Architecture Jaidip Banerjee and Sohel Aziz Enterprise Architecture (EA) is increasingly being acknowledged as the way to maximize existing
DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES
APPENDIX 1 DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES March 2008 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS EXECUTIVE SUMMARY...1
Picturing Performance: IBM Cognos dashboards and scorecards for retail
IBM Software Group White Paper Retail Picturing Performance: IBM Cognos dashboards and scorecards for retail 2 Picturing Performance: IBM Cognos dashboards and scorecards for retail Abstract More and more,
A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB 76131 Karlsruhe,
DRIVER ATTRIBUTES AND REAR-END CRASH INVOLVEMENT PROPENSITY
U.S. Department of Transportation National Highway Traffic Safety Administration DOT HS 809 540 March 2003 Technical Report DRIVER ATTRIBUTES AND REAR-END CRASH INVOLVEMENT PROPENSITY Published By: National
PhonEX ONE Microsoft Sample Reports November 2010
PhonEX ONE Microsoft Sample Reports November 2010 MIND CTI Ltd. Table of Contents PhonEX ONE Call Management Solution... 1 PhonEX ONE Reports... 1 Standard Query Reports... 1 Availability Report by Departments
Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process
Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2
Exhibit F. VA-130620-CAI - Staff Aug Job Titles and Descriptions Effective 2015
Applications... 3 1. Programmer Analyst... 3 2. Programmer... 5 3. Software Test Analyst... 6 4. Technical Writer... 9 5. Business Analyst... 10 6. System Analyst... 12 7. Software Solutions Architect...
Improving Cognos Upgrades Methodology to Lower Costs & Improve Upgrade Management
White Paper Improving Cognos Upgrades Methodology to Lower Costs & Improve Upgrade Management by Edwin van Megesen Motio, Inc. Executive Summary BI platforms are continuously changing. New requirements
Overview. The Concept Of Managing Phases By Quality and Schedule
The Project Management Dashboard: A Management Tool For Controlling Complex Projects Project Management White Paper Series--#1001 John Aaron, Milestone Planning And Research, Inc. 5/14/01 Overview The
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
Diagram. Microsoft Dynamics Sure Step Methodology
Diagram Microsoft Dynamics Sure Step Methodology Designed to enable you to better serve your customers by helping reduce their Microsoft Dynamics total cost of ownership, the Sure Step Methodology can
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED BUSINESS INTEGRATION MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED BUSINESS INTEGRATION MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
Simulating Information Warfare Using the HLA Management Object Model
Simulating Information Warfare Using the HLA Management Object Model Roger Smith BTG Inc. Orlando, Florida 32765 [email protected] Keywords: Information Operations, High Level Architecture, Management
Business Process Discovery
Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process
Meeting the Challenges of Business Intelligence
SAP Thought Leadership Paper Business Intelligence Meeting the Challenges of Business Intelligence For Small Enterprises Table of Contents 4 Why Small Enterprises Need Business Intelligence 5 Overview
A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools
A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools Bobby Hartway AEgis Technologies Group 631 Discovery Drive Huntsville, AL 35806 256-922-0802 [email protected]
Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc.
Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc. May 2012 (Updated) About the Author Gregory G. Jackson is a senior cyber
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
Architecture Artifacts Vs Application Development Artifacts
Architecture Artifacts Vs Application Development Artifacts By John A. Zachman Copyright 2000 Zachman International All of a sudden, I have been encountering a lot of confusion between Enterprise Architecture
Intelligence Reporting Frequently Asked Questions
1. What is Sage 100 ERP Intelligence Reporting? Sage 100 ERP (formerly Sage ERP MAS 90 and 200) Intelligence Reporting empowers managers to quickly and easily obtain operations and strategic planning information
Vendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities
Vendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities April, 2013 gaddsoftware.com Table of content 1. Introduction... 3 2. Vendor briefings questions and answers... 3 2.1.
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Enterprise Architecture Review
Enterprise Architecture Review Arquitectura multivapa mediante Ajax y ORM Héctor Arturo Flórez Fernández * Fecha de recepción: octubre 29 de 2010 Fecha de aceptación: noviembre 23 de 2010 Abstract Enterprise
Successful Enterprise Architecture. Aligning Business and IT
Successful Enterprise Architecture Aligning Business and IT 1 Business process SOLUTIONS WHITE PAPER Executive Summary...3 An Integrated Business & IT Infrastructure...3 Benefits to Business and IT Go
A pragmatic approach to modeling large systems
Theodore Kahn Ian Sturken NASA Ames Research Center Moffett Field, CA NASA/Army Systems and Software Engineering Forum May 11 & 12, 2010 University of Alabama, Huntsville [email protected] [email protected]
Classification Appeal Decision Under Section 5112 of Title 5, United States Code
U.S. Office of Personnel Management Office of Merit Systems Oversight and Effectiveness Classification Appeals and FLSA Programs Washington Oversight Division 1900 E Street, NW Washington, DC 20415 Classification
Writing a Requirements Document For Multimedia and Software Projects
Writing a Requirements Document For Multimedia and Software Projects Rachel S. Smith, Senior Interface Designer, CSU Center for Distributed Learning Introduction This guide explains what a requirements
Pivot Charting in SharePoint with Nevron Chart for SharePoint
Pivot Charting in SharePoint Page 1 of 10 Pivot Charting in SharePoint with Nevron Chart for SharePoint The need for Pivot Charting in SharePoint... 1 Pivot Data Analysis... 2 Functional Division of Pivot
Making critical connections: predictive analytics in government
Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
Lands End implements customer-centric strategies
Lands End implements customer-centric strategies leader empowers marketing staff and develops more targeted campaigns with Unica Campaign Overview Business challenges Decouple interdependence of technical
BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4
International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.
U.S. Department of the Treasury. Treasury IT Performance Measures Guide
U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)
Fourth generation techniques (4GT)
Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some
Managing Change Using Enterprise Architecture
Managing Change Using Enterprise Architecture Abdallah El Kadi, PMP, CISSP, TOGAF Chief Executive Officer, Shift Technologies Managing Director, Open Group Arabia Email: [email protected] Website:
Integrated business intelligence solutions for your organization
Integrated business intelligence solutions for your organization In the business world, critical information influences individuals goals, affects how people work across teams and ultimately helps organizations
Data Warehouse and Business Intelligence Testing: Challenges, Best Practices & the Solution
Warehouse and Business Intelligence : Challenges, Best Practices & the Solution Prepared by datagaps http://www.datagaps.com http://www.youtube.com/datagaps http://www.twitter.com/datagaps Contact [email protected]
Agile Business Suite: a 4GL environment for.net developers DEVELOPMENT, MAINTENANCE AND DEPLOYMENT OF LARGE, COMPLEX BACK-OFFICE APPLICATIONS
Agile Business Suite: a 4GL environment for.net developers DEVELOPMENT, MAINTENANCE AND DEPLOYMENT OF LARGE, COMPLEX BACK-OFFICE APPLICATIONS In order to ease the burden of application lifecycle management,
MicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
Enterprise Architecture Modeling PowerDesigner 16.1
Enterprise Architecture Modeling PowerDesigner 16.1 Windows DOCUMENT ID: DC00816-01-1610-01 LAST REVISED: November 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This publication pertains to
Building Effective Dashboard Views Using OMEGAMON and the Tivoli Enterprise Portal
1 IBM Software Group Tivoli Software Building Effective Dashboard Views Using OMEGAMON and the Tivoli Enterprise Portal Ed Woods IBM Corporation 2011 IBM Corporation IBM s Integrated Service Management
Sage ERP MAS. Everything you want to know about Sage ERP MAS Intelligence. What is Sage ERP MAS Intelligence? benefits
Sage ERP MAS Everything you want to know about Sage ERP MAS Intelligence What is Sage ERP MAS Intelligence? Sage ERP MAS Intelligence (or Intelligence) empowers managers to quickly and easily obtain operations
Record-Level Access: Under the Hood
Record-Level Access: Under the Hood Salesforce, Summer 15 @salesforcedocs Last updated: May 20, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
IBM i2 Analyst s Notebook Social Network Analysis
IBM i2 Analyst s Notebook Social Network Analysis Contents 1 Introduction 2 Who should read this white paper 2 The Background of Social Network Analysis 2 Why use Social Network Analysis? 2 Social Network
