Software Life-Cycle Management
|
|
- Jessie Walton
- 6 years ago
- Views:
Transcription
1 Ingo Arnold Department Computer Science University of Basel Introduction Software Life-Cycle Management Architecture Handbook View Model
2 Architecture View Models If this is real world s physical complexity.. Department of Computer Sciences University of Basel 2
3 Architecture View Models.. then architecture depictions reduce complexity to make it manageable Department of Computer Sciences University of Basel 3
4 Architecture View Models If this is real world s physical complexity.. Department of Computer Sciences University of Basel 4
5 Architecture View Models.. you want to avoid oversimplification of architecture depictions.. Department of Computer Sciences University of Basel 5
6 Architecture View Models.. as well as you want to avoid overcomplication Department of Computer Sciences University of Basel 6
7 Architecture View Models If this is adequate architectural representation of the physical complexity.. Department of Computer Sciences University of Basel 7
8 Architecture View Models then architecture View-Models make architecture representations navigable Department of Computer Sciences University of Basel 8
9 Architecture View Models.. and cross-cutting views high-light cross-cutting concerns Department of Computer Sciences University of Basel 9
10 Architecture View Models View Models in a Geo-Information Systems Context Aarau Reality Department of Computer Sciences University of Basel 10
11 Architecture View Models View Models in a Geo-Information Systems Context Aarau reality model Department of Computer Sciences University of Basel 11
12 Architecture View Models View Models in a Geo-Information Systems Context Aarau reality model public transport Department of Computer Sciences University of Basel 12
13 Architecture View Models View Models in a Geo-Information Systems Context Aarau reality model public population transport density Department of Computer Sciences University of Basel 13
14 Architecture View Models View Models in a Geo-Information Systems Context Aarau public reality transport model population density buffer zones Department of Computer Sciences University of Basel 14
15 Architecture View Models What are common characteristics of Architecture View Models? End User View Model Security Officer Data Analyst Compliance Officer Infrastructure Service Manager Business Analyst applied to End User Data Analyst View Model Adapted and Instantiated IT System Security Officer Department of Computer Sciences University of Basel 15
16 Architecture View Models What are common characteristics of Architecture View Models? Architecture View Models describe... all views that the architecture view model is comprised of diagrams, elements, nomenclature, etc. used to express and constitute a view who is interested in a view (i.e. stakeholders) and the concerns this group has who is responsible for creating and maintaining a view how a view is created and further evolved how a view relates to other views how a view is utilized in order to answer given questions when a view can be considered complete and adequate what the right level of detail is for a view and in a given context (e.g. early project phase) Department of Computer Sciences University of Basel 16
17 Architecture View Models What are common characteristics of Architecture View Models? Architecture View Models serve a to-be-determined context stakeholders have different concerns with regard to a system, or rather, its architecture based on their specific concerns, different stakeholders each adopt a specific viewpoint a specific architecture view (e.g., data view) is available to stakeholders from each respective viewpoint (different angles) it is defined by the viewpoint and refers to a set of specific concerns each architecture view has a reference to exactly one viewpoint architecture views essentially determine the content and structure of architecture documentation Department of Computer Sciences University of Basel 17
18 level of detail Architecture View Models What are common characteristics of Architecture View Models? Architecture View Models allow you to determine... What you see The level of detail you see All Architecture View Models span the following two dimensions perspective selection Functionality Information Technology Security... System Landscape Level System Level Sub-System Level Department of Computer Sciences University of Basel 18
19 The Architecture Handbook View Model enables the... positioning of an envisaged solution in its enterprise architecture context investigation of architecture-significant requirements capturing of alternative architectures which adequately solve a given problem understanding a solution s immediate context and respective interfaces holistic description of solution architecture including... - Application Architecture - Data Architecture - Technology Architecture - Cross-cutting Architecture Perspectives of key quality concerns capturing of key architecture assumptions as well as decisions adequate communication of a solution s architecture to various stakeholder groups The Architecture Handbook View Model is not explicit about the... level of detail a solution architect choses because this is determined by a given context Department of Computer Sciences University of Basel 19
20 Security Perspective Availability & Reliability Perspective Performance & Scalability Perspective Extensibility Perspective Architecture Handbook View Model Architecture View Model Overview Enterprise Architecture Landscapes & Views Requirements Principles & Constraints Application Architecture Technology Architecture Data Architecture External Viewpoint Architecture Alternatives Functional Requirements Application Infrastructure System Context Non-Functional Requirements IT-Infrastructure Architecture Vision Department of Computer Sciences University of Basel 20
21 Architecture View Model Overview Department of Computer Sciences University of Basel 21
22 The View Model is constituted of the following core viewpoints - Enterprise Architecture Viewpoint - Requirements Viewpoint - Solution Viewpoint - Solution Architecture Viewpoint Department of Computer Sciences University of Basel 22
23 Enterprise Architecture Viewpoint Provides access to envisaged solution architecture s broader enterprise context. Enables the solution architect to spot potentials for reuse, gaps in the enterprise s IT landscape as well as dependencies which need to be carefully handled. Department of Computer Sciences University of Basel 23
24 Requirements Viewpoint Enables a solution architect to focus and further elaborate requirements, which are identified as architecture-significant (i.e. which have an impact to architecture decisions). Department of Computer Sciences University of Basel 24
25 Solution Viewpoint Provides the architect with means to consciously reflect on alternative architecture approaches to solve a given problem. Also it provides black-box view onto the envisaged solution Department of Computer Sciences University of Basel 25
26 Solution Architecture Viewpoint This is the white-box architecture perspective which a solution architect elaborates mainly, once problem and context are well understood. Beyond the three core views (Application, Data, Technology Architect) cross-cutting architecture perspectives provide quality-concern specific entry points for elaborating and capturing key non-functional capabilities a solution is expected to provide Department of Computer Sciences University of Basel 26
27 Enterprise Business Architecture Context Provides an overview of business capabilities and processes of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 27
28 Enterprise Application Architecture Context Provides an overview of applications and application components of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 28
29 Enterprise Data Architecture Context Provides an overview of data entities and core data structures of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 29
30 Enterprise Technology Architecture Context Provides an overview of technologies and technology components (in the context of the EA Taxonomy Novartis calls these Technical Applications) of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 30
31 Principles and Constraints Summary of all principles and constraining factors which a solution architect deems architecture-significant thus important and impactful from a solution architecture point of view. Department of Computer Sciences University of Basel 31
32 Functional Requirements These models support the capturing of overviews of a solutions key functional end-points thus an overview of key functions a solution provides to its outside (Use Case Overview Diagrams). Solution architects primarily elaborate those functions (Use Cases) which they deem architecture-significant. Models are used to discuss with Business stakeholders to confirm that the problem statement is functionally complete and correct. Department of Computer Sciences University of Basel 32
33 Non-functional Requirements These models support the elaboration of... - use case specific quality needs - system-wide quality needs... where the term quality need is used synonymously to nonfunctional requirement. Non-functional requirements usually have a significant impact on a solution s architecture. Therefore very often these qualify as architecture-significant. Typical types of non-functional requirements a Solution Architect will help elaborate are... - security requirements - performance & scalability requirements - Availabilty & reliability requirements - extensibility, adaptability & interoperability requirements Department of Computer Sciences University of Basel 33
34 Architecture Alternatives These models support elaboration and evaluation of alternative architecture approaches to solve a given problem. A solution architect pays special attention to prove that investigated architecture alternatives cover... - functional requirements - non-functional requirements - risk mitigation - optimization of cost (CAPEX and OPEX) - adherence to architecture standards and principles Department of Computer Sciences University of Basel 34
35 System Context These models support the elaboration of interfaces an envisaged solution has to its immediate surroundings (i.e. mainly to Computer Systems). System Context models provide a black-box perspective onto an envisaged solution. Department of Computer Sciences University of Basel 35
36 Architecture Vision These models support the creation of one glance architecture overviews. An Architecture Vision overview s aim is to distill complex holstic architecture descriptions into simplified architecture depictions which ease communicating to a broader set of non-architects stakeholder groups. An Architecture Vision model de-normalize architecture description for simplification purposes Department of Computer Sciences University of Basel 36
37 Application Architecture These models support the depiction of application components and how these cooperate in order to realize use cases (Function Behavior Model). Furthermore these models support the description of application components regarding their responsibilities and inter-relationships (Functional Structure Model). The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a solution s application components during a project s early stages, these same components are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 37
38 Data Architecture These models support the depiction of data entities as well as their inter-relationships. Also they support the capturing of information flows, data quality, ownership, and freshness attributes, etc. Further these models support the description of how data entities as well as data flows are placed on respective application components. The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a solution s data entities during a project s early stages, these same entities are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 38
39 Technology Architecture These models support the depiction of technology components (remember, that Novartis Enterprise Architecture Taxonomy calls these technical applications) as well as their inter-connections. They also support capturing connection-specific attributes like supported protocols, QoS-attributes, capacity and other volumetric indicators, etc. Furthermore these models support the description of how application components as well as interapplication relationships are placed onto respective technology components. The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a solution s technology components and operational node underpinnings during a project s early stages, these same components are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 39
40 Cross-Cutting Architecture Perspectives For any serious solution architecture description a solution architect develops several cross-cutting architecture perspectives: one for each key quality concern the solution has to actually meet. Very common examples of quality concerns include security, performance and scalability, reliability and availability, and extensibility. For each developed cross-cutting architecture perspective a solution architect creates a sub-set of application, data, and technology architecture models. The noteworthiness of cross-cutting architecture perspectives though is that, e.g. a security perspective viewpoint will highlight only those architecture components which contribute to the solution s security architecture. However, these architecture components my come from all respective core views: application, data, and technology architecture. The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a e.g. security components and operational node underpinnings during a project s early stages, these same components are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 40
41 Understand which needs can already be met by existing business capabilities and processes Department of Computer Sciences University of Basel 41
42 Understand which applications and application components already exist, understand their deficiencies, how they can be re-used or adapted as well as which application components have been spotted as existing gaps in the application portfolio landscape. Department of Computer Sciences University of Basel 42
43 Understand which data entities already exist, understand their deficiencies, ownership, freshness attributes. Understand how they can be re-used or adapted as well as which data entities have been spotted as gaps in the data and information landscape. Department of Computer Sciences University of Basel 43
44 Understand which technology components (aka: Technical Applications) already exist, understand their deficiencies, how they can be re-used or adapted as well as which technology components have been spotted as existing gaps in the technology portfolio landscape. Department of Computer Sciences University of Basel 44
45 For each of the investigated Architecture Alternatives the Solution Architecture Viewpoint models explain *how* a respective architecture alternative is considered to be realized. Department of Computer Sciences University of Basel 45
46 Understand what aspects the System Context model introduces to Use Cases, and NFRs. Understand how solution components of all models of the Solution Architecture Viewpoint realize expected system context model interfaces. Department of Computer Sciences University of Basel 46
47 Understand most prominent solution components of all models of the Solution Architecture Viewpoint and pull them together for simplification and communication purposes. Department of Computer Sciences University of Basel 47
48 Department of Computer Sciences University of Basel 48 Understand how use cases are realized based on application components. Understand how applications cooperate and where there are intense cooperation relationships which exist among applications. Understand what information flows as part of respective interapplication cooperation. Understand the responsibilities that application components have in the context of use case realizations.
49 Understand how quality attributes and NFRs are realized by the overall solution architecture. For use case specific NFRs this is based on Function Behaviour Models. For system-wide NFRs the whole Solution Architecture Viewpoint explains how respective NFRs are addressed. Department of Computer Sciences University of Basel 49
50 Understand which functional and non-functional responsibilities application components need to fulfill. Understand inherent and natural tightness which exist between application components. Understand existing or to-be-created inter-connections between application components. Department of Computer Sciences University of Basel 50
51 Understand how data entities are placed onto application components. Understand how information flows are mapped onto inter-application relationships. Department of Computer Sciences University of Basel 51
52 Understand how application components are bundled as deployment units and how they are deployed into underpinning operational nodes. Understand how inter-application relationships are deployed to operational node inter-connections. Department of Computer Sciences University of Basel 52
53 Questions? Department of Computer Sciences University of Basel 53
54 The Solution Solution Architecture View Models in a Nutshell What are common characteristics of Architecture View Models? End User View Model Security Officer Data Analyst Compliance Officer Infrastructure Service Manager Business Analyst applied to End User Data Analyst View Model Adapted and Instantiated IT System Security Officer Department of Computer Sciences University of Basel 54
55 The Solution Solution Architecture View Models in a Nutshell Architecture View Models describe... all views that the architecture view model is comprised of diagrams, elements, nomenclature, etc. used to express and constitute a view who is interested in a view (i.e. stakeholders) and the concerns this group has who is responsible for creating and maintaining a view how a view is created and further evolved how a view relates to other views how a view is utilized in order to answer given questions when a view can be considered complete and adequate what the right level of detail is for a view and in a given context (e.g. early project phase) Department of Computer Sciences University of Basel 55
56 The Solution Solution Architecture View Models in a Nutshell Architecture View Models serve a to-be-determined context stakeholders have different concerns with regard to a system, or rather, its architecture based on their specific concerns, different stakeholders each adopt a specific viewpoint a specific architecture view (e.g., data view) is available to stakeholders from each respective viewpoint (different angles) it is defined by the viewpoint and refers to a set of specific concerns each architecture view has a reference to exactly one viewpoint architecture views essentially determine the content and structure of architecture documentation Department of Computer Sciences University of Basel 56
57 The Solution Solution Architecture View Models in a Nutshell Relevance of architecture views architecture views can be used to look at specific aspects of an IT system they make it easier to manage the complexity of all aspects of an IT system the aspects considered in architecture views depend on the respective stakeholder and his or her current activity in the creation of an IT system architecture views are specified using viewpoints an architecture viewpoint is the specification of an architecture view and covers stakeholders and their concerns, as well as artefacts the creation of an architecture view can also be specified following basic architecture views exist: requirements view, logical view, data view, implementation view, process view, and deployment view to ensure the quality of the architecture, it is important to create or describe an architecture on the basis of architecture views from the very beginning it is not necessary to define architecture viewpoints from scratch; you can use existing architecture view models the Architecture Handbook defines its own architecture viewmodel geared to the needs of Novartis Department of Computer Sciences University of Basel 57
58 level of detail The Solution Solution Architecture View Models in a Nutshell Architecture View Models allow you to determine... What you see The level of detail you see All Architecture View Models span the following two dimensions perspective selection Functionality Information Technology Security... System Landscape Level System Level Sub-System Level Department of Computer Sciences University of Basel 58
59 The Solution Solution Architecture View Models in a Nutshell Looking at systems through a telescope you can change the level of detail at which you look at a system using the zoom factor I will use the telescope metaphor again to develop the architecture levels imagine (throughout the next slides to come) you want to look at an IT system through a telescope Department of Computer Sciences University of Basel 59
60 The Solution Solution Architecture View Models in a Nutshell Organization before you can focus on a specific IT system, the telescope first shows you the external contexts of the IT system first you see different organizations and how they collaborate in their different roles (clients, suppliers, partners, etc.) with the next telescope setting, you look at a specific organization more closely you see the systems (employees, departments, IT systems, etc.) within the organization and how they are used and interact in the business processes of the organization System Level you increase the zoom factor of the telescope again and now you can look at a specific IT system of the organization in more detail you see interfaces of the system, its functionality, its quality attributes as they are perceived on the system s outside (e.g. security, performance, availability), and its users Department of Computer Sciences University of Basel 60
61 The Solution Solution Architecture View Models in a Nutshell Building Block Level then you zoom inside the system the telescope shows you the internal contexts of the system you recognize the building blocks that make up the system you see their interfaces, responsibilities, and interactions you then increase the zoom factor again and now you can see the internal workings of the system building blocks in detail Change of Level and while you zoom further into individual building blocks you discover that each of them is made up of system building blocks, yet again you realize that the indistinguishability makes the borders between what a system and what a system s building block (aka: sub-system) blur Department of Computer Sciences University of Basel 61
What s a BA to do with Data? Discover and define standard data elements in business terms
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data
More informationBuilding the User Interface: The Case for Continuous Development in an Iterative Project Environment
Copyright Rational Software 2002 http://www.therationaledge.com/content/dec_02/m_uiiterativeenvironment_jc.jsp Building the User Interface: The Case for Continuous Development in an Iterative Project Environment
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationBSIF. A Freeware Framework for. Integrated Business Solutions Modeling. Using. Sparx Systems. Enterprise Architect
33 Chester Rd Tawa 5028 Wellington New Zealand P: (+64) 4 232-2092 m: (+64) 21 322 091 e: info@parkconsulting.co.nz BSIF A Freeware Framework for Integrated Business Solutions Modeling Using Sparx Systems
More informationSoftware-defined Storage by Veritas
ESG Technology Showcase Software-defined Storage by Veritas Date: August 2015 Author: Scott Sinclair, Analyst Abstract: The days of enterprise storage technology being predominantly constrained to specific
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationThe Value of Data Modeling for the Data-Driven Enterprise
Solution Brief: erwin Data Modeler (DM) The Value of Data Modeling for the Data-Driven Enterprise Designing, documenting, standardizing and aligning any data from anywhere produces an enterprise data model
More informationModule 7 TOGAF Content Metamodel
Module 7 TOGAF Content Metamodel V9 Edition Copyright January 2009 All Slide rights reserved 1 of 45 Published by The Open Group, January 2009 TOGAF Content Metamodel TOGAF is a trademark of The Open Group
More information10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.
10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationNext Generation Privilege Identity Management
White Paper Next Generation Privilege Identity Management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationEfficiency Gains in Inbound Data Warehouse Feed Implementation
Efficiency Gains in Inbound Data Warehouse Feed Implementation Simon Eligulashvili simon.e@gamma-sys.com Introduction The task of building a data warehouse with the objective of making it a long-term strategic
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationTOGAF 9.1 Class 6 Phase C & D
TOGAF 9.1 Class 6 Phase C & D By: Samuel Mandebvu Sources: 1. Primary Slide Deck => Slide share @ https://www.slideshare.net/sammydhi01/learn-togaf-91-in-100-slides 1. D Truex s slide additions from the
More informationSecurity and Architecture SUZANNE GRAHAM
Security and Architecture SUZANNE GRAHAM Why What How When Why Information Security Information Assurance has been more involved with assessing the overall risk of an organisation's technology and working
More informationSOFTWARE ARCHITECTURE & DESIGN INTRODUCTION
SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationSTEP Data Governance: At a Glance
STEP Data Governance: At a Glance Master data is the heart of business optimization and refers to organizational data, such as product, asset, location, supplier and customer information. Companies today
More informationSoftware Engineering
Software Engineering chap 4. Software Reuse 1 SuJin Choi, PhD. Sogang University Email: sujinchoi@sogang.ac.kr Slides modified, based on original slides by Ian Sommerville (Software Engineering 10 th Edition)
More informationDemystifying GRC. Abstract
White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over
More informationRequirements Validation and Negotiation
REQUIREMENTS ENGINEERING LECTURE 2017/2018 Joerg Doerr Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects of
More informationDesign and deliver cloud-based apps and data for flexible, on-demand IT
White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to
More informationEnterprise Architecture Views and Viewpoints in ArchiMate
member of Enterprise Architecture Views and Viewpoints in ArchiMate ArchiMate 3 Chapter 14 The Core of Architecture Description http://www.iso-architecture.org/ieee-1471/cm/ Architecture Views and Viewpoints
More informationBetter together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com
Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationAlignment of Business and IT - ArchiMate. Dr. Barbara Re
Alignment of Business and IT - ArchiMate Dr. Barbara Re What is ArchiMate? ArchiMate is a modelling technique ("language") for describing enterprise architectures. It presents a clear set of concepts within
More informationData Governance Quick Start
Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry
More informationA metadata-driven process for handling statistical data end-to-end
A metadata-driven process for handling statistical data end-to-end Denis GROFILS Seconded National Expert Methodology and corporate architecture Content Context Approach Benefits Enablers Challenges Conclusions
More informationEvolution For Enterprises In A Cloud World
Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing
More informationSeminar report Software reuse
A Seminar report On Software reuse Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.com SUBMITTED BY:
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationChapter 4. Fundamental Concepts and Models
Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas
More informationIntelligent Programmatic Peering Summary Report
Intelligent Programmatic Peering Summary Report Alliance for Telecommunications Industry Solutions December 2016 i Abstract The TOPS Council s Intelligent Programmatic Peering Landscape Team (IPLT) completed
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationDiscover, Relate, Model, and Integrate Data Assets with Rational Data Architect
Discover, Relate, Model, and Integrate Data Assets with Rational Data Architect Niels C. Jacobsen (nielsj@dk.ibm.com) Associate IT Architect, IBM Software Group Rational IBM Software Group 2005 IBM Corporation
More informationData Model Considerations for Radar Systems
WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,
More informationThe Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements
Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed
More informationThe South African EA Forum
The South African EA Forum Follow the EA Forum on Twitter Our upcoming events Twitter: @EAforumSA #ogza http://opengroup.co.za/ea-forum Leading the development of open, vendor-neutral IT standards and
More informationInformation Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure
Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial
More informationUNIT-I Introduction of Object Oriented Modeling
UNIT-I Introduction of Object Oriented Modeling - Prasad Mahale Object Oriented Modeling and Reference Books: Design 1. Grady Booch, James Rumbaugh, Ivar Jacobson Unified Modeling Language User Guide,
More informationThe Big Happy Family of System Architecture Approaches. Chris Phillips 14 Jun 2018
The Big Happy Family of System Architecture Approaches Chris Phillips 14 Jun 2018 Agenda Introduction Overview Key Definitions System Architecture Overview Architectural Approaches Integrating Architectural
More informationGovernment of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationHow to Evaluate a Next Generation Mobile Platform
How to Evaluate a Next Generation Mobile Platform appcelerator.com Introduction Enterprises know that mobility presents an unprecedented opportunity to transform businesses and build towards competitive
More informationThe Transition to Networked Storage
The Transition to Networked Storage Jim Metzler Ashton, Metzler & Associates Table of Contents 1.0 Executive Summary... 3 2.0 The Emergence of the Storage Area Network... 3 3.0 The Link Between Business
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationThe Open Group SOA Ontology Technical Standard. Clive Hatton
The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts
More informationEnterprise Architecture Views and Viewpoints in ArchiMate - Reference
Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Source: ArchiMate 2.0 Specification, chapter 8, http://pubs.opengroup.org/architecture/archimate2-doc/chap08.html Views and Viewpoints
More informationPart III: Evaluating the Business Value of the Hybrid Cloud
Contents at a Glance Introduction... 1 Part I: Understanding Concepts and Construction... 7 Chapter 1: Discovering the Fundamentals of Your Computing Environment...9 Chapter 2: The Hybrid Cloud Continuum...25
More informationTechnology for a Changing World
Technology for a Changing World Cisco Expo 2009 Axel Clauberg Director, Solutions & Architectures, Emerging Markets, Cisco Systems November 10, 2009 1 VISION Changing the way the World Lives, Works, Plays
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationProposed Revisions to ebxml Technical Architecture Specification v ebxml Business Process Project Team
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Proposed Revisions to ebxml Technical Architecture Specification v1.0.4 ebxml Business Process Project Team 11
More informationHow Cisco Deploys Video Conferencing for Employee Collaboration
How Cisco Deploys Video Conferencing for Employee Collaboration Cisco Unified Video Advantage brings video telephony to Cisco Unified IP phones. Cisco IT Case Study / Video / : This case study describes
More informationGovernment of Ontario IT Standard (GO ITS)
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationOG0-091 Q&As TOGAF 9 Part 1
CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationRaytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40
Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationCOURSE BROCHURE. Professional Cloud Service Manager Training & Certification
COURSE BROCHURE Professional Cloud Service Manager Training & Certification What is Professional Cloud Service Manager? What is Professional Cloud Service Manager In an increasingly interconnected and
More informationTOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:
TOGAF Foundation (Level 1) 9 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (voucher included) Accredited By: The Open Group Mock Exam:
More informationProposed Revisions to ebxml Technical. Architecture Specification v1.04
Proposed Revisions to ebxml Technical Architecture Specification v1.04 Business Process Team 11 May 2001 (This document is the non-normative version formatted for printing, July 2001) Copyright UN/CEFACT
More informationCisco Secure Ops Solution
Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,
More informationNick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture
Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this
More informationUPDM PLUGIN. version user guide
UPDM PLUGIN version 17.0 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationcameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0
cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 No Magic, Inc. 2010 All material contained herein is considered proprietary information owned by No Magic,
More informationArchitecture and Design Evolution
Architecture and Design Evolution Pradyumn Sharma pradyumn.sharma@pragatisoftware.com www.twitter.com/pradyumnsharma 1 What is Software Architecture? Structure of a system, comprising software elements,
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationHuman Error Taxonomy
Human Error Taxonomy The Human Error Taxonomy (HET) provides a structure for requirement errors made during the software development process. The HET can be employed during software inspection to help
More informationIT Service Quality amidst a World Gone Cloud. June 2012 V: 2.0
IT Service Quality amidst a World Gone Cloud June 2012 V: 2.0 Agenda A World Gone Cloud (federal perspective) Impacts to IT Infrastructures Impacts to ITIL-based Service/Quality Retooling ITIL Quality
More informationGOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI
GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles
More informationCloud Computing: Standardization Challenges EC/ETSI Workshop on Standards in the Cloud Emmanuel Darmois September 28, 2011
Cloud Computing: Standardization Challenges EC/ETSI Workshop on Standards in the Cloud Emmanuel Darmois September 28, 2011 1 Cloud: Where we want to go Cloud (klaʊd) an elastic execution environment of
More informationAn Integrated Model for Requirements Structuring and Architecture Design
AWRE 2002 19 An Integrated Model for Requirements Structuring and Architecture Design Abstract Juha Savolainen, Tuomo Vehkomäki Nokia Research Center {Juha.Savolainen Tuomo.Vehkomäki}@nokia.com Mike Mannion
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationBreak the network innovation gridlock
Break the network innovation gridlock HP Network Transformation Consulting Services Build next-generation networking You ve seen the demand for applications and services grow instantly. Your network is
More informationTop 5 Reasons to Consider
Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center White Paper Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center Major transformations are occurring
More informationModel-Based Systems Engineering Backbone of the Thales Engineering Manifesto
www.thalesgroup.com Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto MBSE Symposium, Canberra Oct. 28 th, 2014 Olivier Flous, VP Engineering 2 / Thales: Company Profile Collective
More informationLenovo Data Center Group. Define a different future
Lenovo Data Center Group Define a different future Think change is hard? We don t. Concerned about the risks and complexities of transformation We see new ways to seize opportunity. Wrestling with inflexible
More informationAvancier Methods (AM) Software Architecture Diagrams
Methods (AM) Software Architecture Diagrams in the AM viewpoint library It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission
More informationONUG SDN Federation/Operability
ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software
More informationThe Economic Benefits of a Cooperative Control Wireless LAN Architecture
White Paper The Economic Benefits of a Cooperative Control Wireless LAN Architecture Aerohive Networks, Inc. 3150-C Coronado Avenue Santa Clara, California 95054 Phone: 408.988.9918 Toll Free: 1.866.918.9918
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationObject-Oriented Analysis and Design Using UML (OO-226)
Object-Oriented Analysis and Design Using UML (OO-226) The Object-Oriented Analysis and Design Using UML course effectively combines instruction on the software development processes, objectoriented technologies,
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationThe Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator
White Paper The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator Migrating from Cisco Tidal Horizon for SAP to Cisco Process Orchestrator can help you reduce total cost of ownership
More informationThe TOGAF Architect s Guide to Cisco SONA
The TOGAF Architect s Guide to Cisco SONA The increasing complexity of enterprise solutions requires a more disciplined approach to IT. Enterprise architecture (EA) provides such an approach to understanding
More informationHow to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.
How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.
More informationIntroduction to software architecture Revision : 732
Introduction to software architecture Revision : 732 Denis Conan Septembre 2018 Foreword The content of these slides is extracted from the following references: L. Bass, P. Clements, and R. Kazman. Software
More informationIDERA ER/Studio Software Architect Evaluation Guide. Version 16.5/2016+ Published February 2017
IDERA ER/Studio Software Architect Evaluation Guide Version 16.5/2016+ Published February 2017 2017 IDERA, Inc. All rights reserved. IDERA and the IDERA logo are trademarks or registered trademarks of
More informationImproving the Practice of DoD Architecting with the Architecture Specification Model
Improving the Practice of DoD Architecting with the Architecture Specification Model Huei Wan Ang, Dave Nicholson, and Brad Mercer The MITRE Corporation Abstract As the Department of Defense (DoD) moves
More informationMaintaining & Increasing Stakeholder Confidence in IT Architecture
Maintaining & Increasing Stakeholder Confidence in IT Architecture Eoin Woods eoin@artechra.com www.eoinwoods.info 1 Content Defining IT Architecture IT Architecture & Requirements Identifying Stakeholders
More informationProven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid
Proven results Unsurpassed interoperability Fast, secure and adaptable network Only EnergyAxis brings it all together for the Smart Grid Outage management & restoration Elster global strength Demand response
More informationFERC Reliability Technical Conference -- Panel I State of Reliability and Emerging Issues
-- State of Reliability and Emerging Issues Remarks of Thomas Burgess, Vice President and Director, Reliability Assessment and Performance Analysis Chairman Wellinghoff, Commissioners, Staff, and fellow
More informationPart I: Future Internet Foundations: Architectural Issues
Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication
More informationVANCOUVER Chapter Study Group. BABOK Chapter 9 Techniques
VANCOUVER Chapter Study Group BABOK Chapter 9 Techniques May 27, 2015 David Ghotbi, CBAP Agenda Chapter 8 Review Pop Quiz Break Chapter 9 Review Pop Quiz Q & A 2 Chapter 9 Techniques Techniques: Alter
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationWHITE PAPER. Applying Software-Defined Security to the Branch Office
Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry
More information