Software Life-Cycle Management

Size: px
Start display at page:

Download "Software Life-Cycle Management"

Transcription

1 Ingo Arnold Department Computer Science University of Basel Introduction Software Life-Cycle Management Architecture Handbook View Model

2 Architecture View Models If this is real world s physical complexity.. Department of Computer Sciences University of Basel 2

3 Architecture View Models.. then architecture depictions reduce complexity to make it manageable Department of Computer Sciences University of Basel 3

4 Architecture View Models If this is real world s physical complexity.. Department of Computer Sciences University of Basel 4

5 Architecture View Models.. you want to avoid oversimplification of architecture depictions.. Department of Computer Sciences University of Basel 5

6 Architecture View Models.. as well as you want to avoid overcomplication Department of Computer Sciences University of Basel 6

7 Architecture View Models If this is adequate architectural representation of the physical complexity.. Department of Computer Sciences University of Basel 7

8 Architecture View Models then architecture View-Models make architecture representations navigable Department of Computer Sciences University of Basel 8

9 Architecture View Models.. and cross-cutting views high-light cross-cutting concerns Department of Computer Sciences University of Basel 9

10 Architecture View Models View Models in a Geo-Information Systems Context Aarau Reality Department of Computer Sciences University of Basel 10

11 Architecture View Models View Models in a Geo-Information Systems Context Aarau reality model Department of Computer Sciences University of Basel 11

12 Architecture View Models View Models in a Geo-Information Systems Context Aarau reality model public transport Department of Computer Sciences University of Basel 12

13 Architecture View Models View Models in a Geo-Information Systems Context Aarau reality model public population transport density Department of Computer Sciences University of Basel 13

14 Architecture View Models View Models in a Geo-Information Systems Context Aarau public reality transport model population density buffer zones Department of Computer Sciences University of Basel 14

15 Architecture View Models What are common characteristics of Architecture View Models? End User View Model Security Officer Data Analyst Compliance Officer Infrastructure Service Manager Business Analyst applied to End User Data Analyst View Model Adapted and Instantiated IT System Security Officer Department of Computer Sciences University of Basel 15

16 Architecture View Models What are common characteristics of Architecture View Models? Architecture View Models describe... all views that the architecture view model is comprised of diagrams, elements, nomenclature, etc. used to express and constitute a view who is interested in a view (i.e. stakeholders) and the concerns this group has who is responsible for creating and maintaining a view how a view is created and further evolved how a view relates to other views how a view is utilized in order to answer given questions when a view can be considered complete and adequate what the right level of detail is for a view and in a given context (e.g. early project phase) Department of Computer Sciences University of Basel 16

17 Architecture View Models What are common characteristics of Architecture View Models? Architecture View Models serve a to-be-determined context stakeholders have different concerns with regard to a system, or rather, its architecture based on their specific concerns, different stakeholders each adopt a specific viewpoint a specific architecture view (e.g., data view) is available to stakeholders from each respective viewpoint (different angles) it is defined by the viewpoint and refers to a set of specific concerns each architecture view has a reference to exactly one viewpoint architecture views essentially determine the content and structure of architecture documentation Department of Computer Sciences University of Basel 17

18 level of detail Architecture View Models What are common characteristics of Architecture View Models? Architecture View Models allow you to determine... What you see The level of detail you see All Architecture View Models span the following two dimensions perspective selection Functionality Information Technology Security... System Landscape Level System Level Sub-System Level Department of Computer Sciences University of Basel 18

19 The Architecture Handbook View Model enables the... positioning of an envisaged solution in its enterprise architecture context investigation of architecture-significant requirements capturing of alternative architectures which adequately solve a given problem understanding a solution s immediate context and respective interfaces holistic description of solution architecture including... - Application Architecture - Data Architecture - Technology Architecture - Cross-cutting Architecture Perspectives of key quality concerns capturing of key architecture assumptions as well as decisions adequate communication of a solution s architecture to various stakeholder groups The Architecture Handbook View Model is not explicit about the... level of detail a solution architect choses because this is determined by a given context Department of Computer Sciences University of Basel 19

20 Security Perspective Availability & Reliability Perspective Performance & Scalability Perspective Extensibility Perspective Architecture Handbook View Model Architecture View Model Overview Enterprise Architecture Landscapes & Views Requirements Principles & Constraints Application Architecture Technology Architecture Data Architecture External Viewpoint Architecture Alternatives Functional Requirements Application Infrastructure System Context Non-Functional Requirements IT-Infrastructure Architecture Vision Department of Computer Sciences University of Basel 20

21 Architecture View Model Overview Department of Computer Sciences University of Basel 21

22 The View Model is constituted of the following core viewpoints - Enterprise Architecture Viewpoint - Requirements Viewpoint - Solution Viewpoint - Solution Architecture Viewpoint Department of Computer Sciences University of Basel 22

23 Enterprise Architecture Viewpoint Provides access to envisaged solution architecture s broader enterprise context. Enables the solution architect to spot potentials for reuse, gaps in the enterprise s IT landscape as well as dependencies which need to be carefully handled. Department of Computer Sciences University of Basel 23

24 Requirements Viewpoint Enables a solution architect to focus and further elaborate requirements, which are identified as architecture-significant (i.e. which have an impact to architecture decisions). Department of Computer Sciences University of Basel 24

25 Solution Viewpoint Provides the architect with means to consciously reflect on alternative architecture approaches to solve a given problem. Also it provides black-box view onto the envisaged solution Department of Computer Sciences University of Basel 25

26 Solution Architecture Viewpoint This is the white-box architecture perspective which a solution architect elaborates mainly, once problem and context are well understood. Beyond the three core views (Application, Data, Technology Architect) cross-cutting architecture perspectives provide quality-concern specific entry points for elaborating and capturing key non-functional capabilities a solution is expected to provide Department of Computer Sciences University of Basel 26

27 Enterprise Business Architecture Context Provides an overview of business capabilities and processes of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 27

28 Enterprise Application Architecture Context Provides an overview of applications and application components of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 28

29 Enterprise Data Architecture Context Provides an overview of data entities and core data structures of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 29

30 Enterprise Technology Architecture Context Provides an overview of technologies and technology components (in the context of the EA Taxonomy Novartis calls these Technical Applications) of a whole Enterprise, or a specific domain. The overview includes information regarding... - strengths - white spots - overlaps - redundancies - deficiencies - potentials for reuse or adaptation - inter-dependencies thus needs for alignment - etc. Department of Computer Sciences University of Basel 30

31 Principles and Constraints Summary of all principles and constraining factors which a solution architect deems architecture-significant thus important and impactful from a solution architecture point of view. Department of Computer Sciences University of Basel 31

32 Functional Requirements These models support the capturing of overviews of a solutions key functional end-points thus an overview of key functions a solution provides to its outside (Use Case Overview Diagrams). Solution architects primarily elaborate those functions (Use Cases) which they deem architecture-significant. Models are used to discuss with Business stakeholders to confirm that the problem statement is functionally complete and correct. Department of Computer Sciences University of Basel 32

33 Non-functional Requirements These models support the elaboration of... - use case specific quality needs - system-wide quality needs... where the term quality need is used synonymously to nonfunctional requirement. Non-functional requirements usually have a significant impact on a solution s architecture. Therefore very often these qualify as architecture-significant. Typical types of non-functional requirements a Solution Architect will help elaborate are... - security requirements - performance & scalability requirements - Availabilty & reliability requirements - extensibility, adaptability & interoperability requirements Department of Computer Sciences University of Basel 33

34 Architecture Alternatives These models support elaboration and evaluation of alternative architecture approaches to solve a given problem. A solution architect pays special attention to prove that investigated architecture alternatives cover... - functional requirements - non-functional requirements - risk mitigation - optimization of cost (CAPEX and OPEX) - adherence to architecture standards and principles Department of Computer Sciences University of Basel 34

35 System Context These models support the elaboration of interfaces an envisaged solution has to its immediate surroundings (i.e. mainly to Computer Systems). System Context models provide a black-box perspective onto an envisaged solution. Department of Computer Sciences University of Basel 35

36 Architecture Vision These models support the creation of one glance architecture overviews. An Architecture Vision overview s aim is to distill complex holstic architecture descriptions into simplified architecture depictions which ease communicating to a broader set of non-architects stakeholder groups. An Architecture Vision model de-normalize architecture description for simplification purposes Department of Computer Sciences University of Basel 36

37 Application Architecture These models support the depiction of application components and how these cooperate in order to realize use cases (Function Behavior Model). Furthermore these models support the description of application components regarding their responsibilities and inter-relationships (Functional Structure Model). The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a solution s application components during a project s early stages, these same components are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 37

38 Data Architecture These models support the depiction of data entities as well as their inter-relationships. Also they support the capturing of information flows, data quality, ownership, and freshness attributes, etc. Further these models support the description of how data entities as well as data flows are placed on respective application components. The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a solution s data entities during a project s early stages, these same entities are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 38

39 Technology Architecture These models support the depiction of technology components (remember, that Novartis Enterprise Architecture Taxonomy calls these technical applications) as well as their inter-connections. They also support capturing connection-specific attributes like supported protocols, QoS-attributes, capacity and other volumetric indicators, etc. Furthermore these models support the description of how application components as well as interapplication relationships are placed onto respective technology components. The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a solution s technology components and operational node underpinnings during a project s early stages, these same components are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 39

40 Cross-Cutting Architecture Perspectives For any serious solution architecture description a solution architect develops several cross-cutting architecture perspectives: one for each key quality concern the solution has to actually meet. Very common examples of quality concerns include security, performance and scalability, reliability and availability, and extensibility. For each developed cross-cutting architecture perspective a solution architect creates a sub-set of application, data, and technology architecture models. The noteworthiness of cross-cutting architecture perspectives though is that, e.g. a security perspective viewpoint will highlight only those architecture components which contribute to the solution s security architecture. However, these architecture components my come from all respective core views: application, data, and technology architecture. The level of detail and abstraction of course significantly varies. Where a solution architect creates abstract approximations of a e.g. security components and operational node underpinnings during a project s early stages, these same components are evolved towards an increasing level of physical detail during a project s later stages. Department of Computer Sciences University of Basel 40

41 Understand which needs can already be met by existing business capabilities and processes Department of Computer Sciences University of Basel 41

42 Understand which applications and application components already exist, understand their deficiencies, how they can be re-used or adapted as well as which application components have been spotted as existing gaps in the application portfolio landscape. Department of Computer Sciences University of Basel 42

43 Understand which data entities already exist, understand their deficiencies, ownership, freshness attributes. Understand how they can be re-used or adapted as well as which data entities have been spotted as gaps in the data and information landscape. Department of Computer Sciences University of Basel 43

44 Understand which technology components (aka: Technical Applications) already exist, understand their deficiencies, how they can be re-used or adapted as well as which technology components have been spotted as existing gaps in the technology portfolio landscape. Department of Computer Sciences University of Basel 44

45 For each of the investigated Architecture Alternatives the Solution Architecture Viewpoint models explain *how* a respective architecture alternative is considered to be realized. Department of Computer Sciences University of Basel 45

46 Understand what aspects the System Context model introduces to Use Cases, and NFRs. Understand how solution components of all models of the Solution Architecture Viewpoint realize expected system context model interfaces. Department of Computer Sciences University of Basel 46

47 Understand most prominent solution components of all models of the Solution Architecture Viewpoint and pull them together for simplification and communication purposes. Department of Computer Sciences University of Basel 47

48 Department of Computer Sciences University of Basel 48 Understand how use cases are realized based on application components. Understand how applications cooperate and where there are intense cooperation relationships which exist among applications. Understand what information flows as part of respective interapplication cooperation. Understand the responsibilities that application components have in the context of use case realizations.

49 Understand how quality attributes and NFRs are realized by the overall solution architecture. For use case specific NFRs this is based on Function Behaviour Models. For system-wide NFRs the whole Solution Architecture Viewpoint explains how respective NFRs are addressed. Department of Computer Sciences University of Basel 49

50 Understand which functional and non-functional responsibilities application components need to fulfill. Understand inherent and natural tightness which exist between application components. Understand existing or to-be-created inter-connections between application components. Department of Computer Sciences University of Basel 50

51 Understand how data entities are placed onto application components. Understand how information flows are mapped onto inter-application relationships. Department of Computer Sciences University of Basel 51

52 Understand how application components are bundled as deployment units and how they are deployed into underpinning operational nodes. Understand how inter-application relationships are deployed to operational node inter-connections. Department of Computer Sciences University of Basel 52

53 Questions? Department of Computer Sciences University of Basel 53

54 The Solution Solution Architecture View Models in a Nutshell What are common characteristics of Architecture View Models? End User View Model Security Officer Data Analyst Compliance Officer Infrastructure Service Manager Business Analyst applied to End User Data Analyst View Model Adapted and Instantiated IT System Security Officer Department of Computer Sciences University of Basel 54

55 The Solution Solution Architecture View Models in a Nutshell Architecture View Models describe... all views that the architecture view model is comprised of diagrams, elements, nomenclature, etc. used to express and constitute a view who is interested in a view (i.e. stakeholders) and the concerns this group has who is responsible for creating and maintaining a view how a view is created and further evolved how a view relates to other views how a view is utilized in order to answer given questions when a view can be considered complete and adequate what the right level of detail is for a view and in a given context (e.g. early project phase) Department of Computer Sciences University of Basel 55

56 The Solution Solution Architecture View Models in a Nutshell Architecture View Models serve a to-be-determined context stakeholders have different concerns with regard to a system, or rather, its architecture based on their specific concerns, different stakeholders each adopt a specific viewpoint a specific architecture view (e.g., data view) is available to stakeholders from each respective viewpoint (different angles) it is defined by the viewpoint and refers to a set of specific concerns each architecture view has a reference to exactly one viewpoint architecture views essentially determine the content and structure of architecture documentation Department of Computer Sciences University of Basel 56

57 The Solution Solution Architecture View Models in a Nutshell Relevance of architecture views architecture views can be used to look at specific aspects of an IT system they make it easier to manage the complexity of all aspects of an IT system the aspects considered in architecture views depend on the respective stakeholder and his or her current activity in the creation of an IT system architecture views are specified using viewpoints an architecture viewpoint is the specification of an architecture view and covers stakeholders and their concerns, as well as artefacts the creation of an architecture view can also be specified following basic architecture views exist: requirements view, logical view, data view, implementation view, process view, and deployment view to ensure the quality of the architecture, it is important to create or describe an architecture on the basis of architecture views from the very beginning it is not necessary to define architecture viewpoints from scratch; you can use existing architecture view models the Architecture Handbook defines its own architecture viewmodel geared to the needs of Novartis Department of Computer Sciences University of Basel 57

58 level of detail The Solution Solution Architecture View Models in a Nutshell Architecture View Models allow you to determine... What you see The level of detail you see All Architecture View Models span the following two dimensions perspective selection Functionality Information Technology Security... System Landscape Level System Level Sub-System Level Department of Computer Sciences University of Basel 58

59 The Solution Solution Architecture View Models in a Nutshell Looking at systems through a telescope you can change the level of detail at which you look at a system using the zoom factor I will use the telescope metaphor again to develop the architecture levels imagine (throughout the next slides to come) you want to look at an IT system through a telescope Department of Computer Sciences University of Basel 59

60 The Solution Solution Architecture View Models in a Nutshell Organization before you can focus on a specific IT system, the telescope first shows you the external contexts of the IT system first you see different organizations and how they collaborate in their different roles (clients, suppliers, partners, etc.) with the next telescope setting, you look at a specific organization more closely you see the systems (employees, departments, IT systems, etc.) within the organization and how they are used and interact in the business processes of the organization System Level you increase the zoom factor of the telescope again and now you can look at a specific IT system of the organization in more detail you see interfaces of the system, its functionality, its quality attributes as they are perceived on the system s outside (e.g. security, performance, availability), and its users Department of Computer Sciences University of Basel 60

61 The Solution Solution Architecture View Models in a Nutshell Building Block Level then you zoom inside the system the telescope shows you the internal contexts of the system you recognize the building blocks that make up the system you see their interfaces, responsibilities, and interactions you then increase the zoom factor again and now you can see the internal workings of the system building blocks in detail Change of Level and while you zoom further into individual building blocks you discover that each of them is made up of system building blocks, yet again you realize that the indistinguishability makes the borders between what a system and what a system s building block (aka: sub-system) blur Department of Computer Sciences University of Basel 61

What s a BA to do with Data? Discover and define standard data elements in business terms

What s a BA to do with Data? Discover and define standard data elements in business terms What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data

More information

Building the User Interface: The Case for Continuous Development in an Iterative Project Environment

Building the User Interface: The Case for Continuous Development in an Iterative Project Environment Copyright Rational Software 2002 http://www.therationaledge.com/content/dec_02/m_uiiterativeenvironment_jc.jsp Building the User Interface: The Case for Continuous Development in an Iterative Project Environment

More information

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM) Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation

More information

BSIF. A Freeware Framework for. Integrated Business Solutions Modeling. Using. Sparx Systems. Enterprise Architect

BSIF. A Freeware Framework for. Integrated Business Solutions Modeling. Using. Sparx Systems. Enterprise Architect 33 Chester Rd Tawa 5028 Wellington New Zealand P: (+64) 4 232-2092 m: (+64) 21 322 091 e: info@parkconsulting.co.nz BSIF A Freeware Framework for Integrated Business Solutions Modeling Using Sparx Systems

More information

Software-defined Storage by Veritas

Software-defined Storage by Veritas ESG Technology Showcase Software-defined Storage by Veritas Date: August 2015 Author: Scott Sinclair, Analyst Abstract: The days of enterprise storage technology being predominantly constrained to specific

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

The Value of Data Modeling for the Data-Driven Enterprise

The Value of Data Modeling for the Data-Driven Enterprise Solution Brief: erwin Data Modeler (DM) The Value of Data Modeling for the Data-Driven Enterprise Designing, documenting, standardizing and aligning any data from anywhere produces an enterprise data model

More information

Module 7 TOGAF Content Metamodel

Module 7 TOGAF Content Metamodel Module 7 TOGAF Content Metamodel V9 Edition Copyright January 2009 All Slide rights reserved 1 of 45 Published by The Open Group, January 2009 TOGAF Content Metamodel TOGAF is a trademark of The Open Group

More information

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S. 10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Next Generation Privilege Identity Management

Next Generation Privilege Identity Management White Paper Next Generation Privilege Identity Management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

Efficiency Gains in Inbound Data Warehouse Feed Implementation

Efficiency Gains in Inbound Data Warehouse Feed Implementation Efficiency Gains in Inbound Data Warehouse Feed Implementation Simon Eligulashvili simon.e@gamma-sys.com Introduction The task of building a data warehouse with the objective of making it a long-term strategic

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

TOGAF 9.1 Class 6 Phase C & D

TOGAF 9.1 Class 6 Phase C & D TOGAF 9.1 Class 6 Phase C & D By: Samuel Mandebvu Sources: 1. Primary Slide Deck => Slide share @ https://www.slideshare.net/sammydhi01/learn-togaf-91-in-100-slides 1. D Truex s slide additions from the

More information

Security and Architecture SUZANNE GRAHAM

Security and Architecture SUZANNE GRAHAM Security and Architecture SUZANNE GRAHAM Why What How When Why Information Security Information Assurance has been more involved with assessing the overall risk of an organisation's technology and working

More information

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,

More information

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment

More information

STEP Data Governance: At a Glance

STEP Data Governance: At a Glance STEP Data Governance: At a Glance Master data is the heart of business optimization and refers to organizational data, such as product, asset, location, supplier and customer information. Companies today

More information

Software Engineering

Software Engineering Software Engineering chap 4. Software Reuse 1 SuJin Choi, PhD. Sogang University Email: sujinchoi@sogang.ac.kr Slides modified, based on original slides by Ian Sommerville (Software Engineering 10 th Edition)

More information

Demystifying GRC. Abstract

Demystifying GRC. Abstract White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over

More information

Requirements Validation and Negotiation

Requirements Validation and Negotiation REQUIREMENTS ENGINEERING LECTURE 2017/2018 Joerg Doerr Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects of

More information

Design and deliver cloud-based apps and data for flexible, on-demand IT

Design and deliver cloud-based apps and data for flexible, on-demand IT White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to

More information

Enterprise Architecture Views and Viewpoints in ArchiMate

Enterprise Architecture Views and Viewpoints in ArchiMate member of Enterprise Architecture Views and Viewpoints in ArchiMate ArchiMate 3 Chapter 14 The Core of Architecture Description http://www.iso-architecture.org/ieee-1471/cm/ Architecture Views and Viewpoints

More information

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide

More information

Alignment of Business and IT - ArchiMate. Dr. Barbara Re

Alignment of Business and IT - ArchiMate. Dr. Barbara Re Alignment of Business and IT - ArchiMate Dr. Barbara Re What is ArchiMate? ArchiMate is a modelling technique ("language") for describing enterprise architectures. It presents a clear set of concepts within

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

A metadata-driven process for handling statistical data end-to-end

A metadata-driven process for handling statistical data end-to-end A metadata-driven process for handling statistical data end-to-end Denis GROFILS Seconded National Expert Methodology and corporate architecture Content Context Approach Benefits Enablers Challenges Conclusions

More information

Evolution For Enterprises In A Cloud World

Evolution For Enterprises In A Cloud World Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing

More information

Seminar report Software reuse

Seminar report Software reuse A Seminar report On Software reuse Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.com SUBMITTED BY:

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Intelligent Programmatic Peering Summary Report

Intelligent Programmatic Peering Summary Report Intelligent Programmatic Peering Summary Report Alliance for Telecommunications Industry Solutions December 2016 i Abstract The TOPS Council s Intelligent Programmatic Peering Landscape Team (IPLT) completed

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Discover, Relate, Model, and Integrate Data Assets with Rational Data Architect

Discover, Relate, Model, and Integrate Data Assets with Rational Data Architect Discover, Relate, Model, and Integrate Data Assets with Rational Data Architect Niels C. Jacobsen (nielsj@dk.ibm.com) Associate IT Architect, IBM Software Group Rational IBM Software Group 2005 IBM Corporation

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

The South African EA Forum

The South African EA Forum The South African EA Forum Follow the EA Forum on Twitter Our upcoming events Twitter: @EAforumSA #ogza http://opengroup.co.za/ea-forum Leading the development of open, vendor-neutral IT standards and

More information

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial

More information

UNIT-I Introduction of Object Oriented Modeling

UNIT-I Introduction of Object Oriented Modeling UNIT-I Introduction of Object Oriented Modeling - Prasad Mahale Object Oriented Modeling and Reference Books: Design 1. Grady Booch, James Rumbaugh, Ivar Jacobson Unified Modeling Language User Guide,

More information

The Big Happy Family of System Architecture Approaches. Chris Phillips 14 Jun 2018

The Big Happy Family of System Architecture Approaches. Chris Phillips 14 Jun 2018 The Big Happy Family of System Architecture Approaches Chris Phillips 14 Jun 2018 Agenda Introduction Overview Key Definitions System Architecture Overview Architectural Approaches Integrating Architectural

More information

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

How to Evaluate a Next Generation Mobile Platform

How to Evaluate a Next Generation Mobile Platform How to Evaluate a Next Generation Mobile Platform appcelerator.com Introduction Enterprises know that mobility presents an unprecedented opportunity to transform businesses and build towards competitive

More information

The Transition to Networked Storage

The Transition to Networked Storage The Transition to Networked Storage Jim Metzler Ashton, Metzler & Associates Table of Contents 1.0 Executive Summary... 3 2.0 The Emergence of the Storage Area Network... 3 3.0 The Link Between Business

More information

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of

More information

The Open Group SOA Ontology Technical Standard. Clive Hatton

The Open Group SOA Ontology Technical Standard. Clive Hatton The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts

More information

Enterprise Architecture Views and Viewpoints in ArchiMate - Reference

Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Source: ArchiMate 2.0 Specification, chapter 8, http://pubs.opengroup.org/architecture/archimate2-doc/chap08.html Views and Viewpoints

More information

Part III: Evaluating the Business Value of the Hybrid Cloud

Part III: Evaluating the Business Value of the Hybrid Cloud Contents at a Glance Introduction... 1 Part I: Understanding Concepts and Construction... 7 Chapter 1: Discovering the Fundamentals of Your Computing Environment...9 Chapter 2: The Hybrid Cloud Continuum...25

More information

Technology for a Changing World

Technology for a Changing World Technology for a Changing World Cisco Expo 2009 Axel Clauberg Director, Solutions & Architectures, Emerging Markets, Cisco Systems November 10, 2009 1 VISION Changing the way the World Lives, Works, Plays

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Proposed Revisions to ebxml Technical Architecture Specification v ebxml Business Process Project Team

Proposed Revisions to ebxml Technical Architecture Specification v ebxml Business Process Project Team 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Proposed Revisions to ebxml Technical Architecture Specification v1.0.4 ebxml Business Process Project Team 11

More information

How Cisco Deploys Video Conferencing for Employee Collaboration

How Cisco Deploys Video Conferencing for Employee Collaboration How Cisco Deploys Video Conferencing for Employee Collaboration Cisco Unified Video Advantage brings video telephony to Cisco Unified IP phones. Cisco IT Case Study / Video / : This case study describes

More information

Government of Ontario IT Standard (GO ITS)

Government of Ontario IT Standard (GO ITS) Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

OG0-091 Q&As TOGAF 9 Part 1

OG0-091 Q&As TOGAF 9 Part 1 CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40

Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

COURSE BROCHURE. Professional Cloud Service Manager Training & Certification

COURSE BROCHURE. Professional Cloud Service Manager Training & Certification COURSE BROCHURE Professional Cloud Service Manager Training & Certification What is Professional Cloud Service Manager? What is Professional Cloud Service Manager In an increasingly interconnected and

More information

TOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:

TOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language: TOGAF Foundation (Level 1) 9 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (voucher included) Accredited By: The Open Group Mock Exam:

More information

Proposed Revisions to ebxml Technical. Architecture Specification v1.04

Proposed Revisions to ebxml Technical. Architecture Specification v1.04 Proposed Revisions to ebxml Technical Architecture Specification v1.04 Business Process Team 11 May 2001 (This document is the non-normative version formatted for printing, July 2001) Copyright UN/CEFACT

More information

Cisco Secure Ops Solution

Cisco Secure Ops Solution Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,

More information

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this

More information

UPDM PLUGIN. version user guide

UPDM PLUGIN. version user guide UPDM PLUGIN version 17.0 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any

More information

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,

More information

cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0

cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 No Magic, Inc. 2010 All material contained herein is considered proprietary information owned by No Magic,

More information

Architecture and Design Evolution

Architecture and Design Evolution Architecture and Design Evolution Pradyumn Sharma pradyumn.sharma@pragatisoftware.com www.twitter.com/pradyumnsharma 1 What is Software Architecture? Structure of a system, comprising software elements,

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

Human Error Taxonomy

Human Error Taxonomy Human Error Taxonomy The Human Error Taxonomy (HET) provides a structure for requirement errors made during the software development process. The HET can be employed during software inspection to help

More information

IT Service Quality amidst a World Gone Cloud. June 2012 V: 2.0

IT Service Quality amidst a World Gone Cloud. June 2012 V: 2.0 IT Service Quality amidst a World Gone Cloud June 2012 V: 2.0 Agenda A World Gone Cloud (federal perspective) Impacts to IT Infrastructures Impacts to ITIL-based Service/Quality Retooling ITIL Quality

More information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles

More information

Cloud Computing: Standardization Challenges EC/ETSI Workshop on Standards in the Cloud Emmanuel Darmois September 28, 2011

Cloud Computing: Standardization Challenges EC/ETSI Workshop on Standards in the Cloud Emmanuel Darmois September 28, 2011 Cloud Computing: Standardization Challenges EC/ETSI Workshop on Standards in the Cloud Emmanuel Darmois September 28, 2011 1 Cloud: Where we want to go Cloud (klaʊd) an elastic execution environment of

More information

An Integrated Model for Requirements Structuring and Architecture Design

An Integrated Model for Requirements Structuring and Architecture Design AWRE 2002 19 An Integrated Model for Requirements Structuring and Architecture Design Abstract Juha Savolainen, Tuomo Vehkomäki Nokia Research Center {Juha.Savolainen Tuomo.Vehkomäki}@nokia.com Mike Mannion

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information

Break the network innovation gridlock

Break the network innovation gridlock Break the network innovation gridlock HP Network Transformation Consulting Services Build next-generation networking You ve seen the demand for applications and services grow instantly. Your network is

More information

Top 5 Reasons to Consider

Top 5 Reasons to Consider Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center White Paper Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center Major transformations are occurring

More information

Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto

Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto www.thalesgroup.com Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto MBSE Symposium, Canberra Oct. 28 th, 2014 Olivier Flous, VP Engineering 2 / Thales: Company Profile Collective

More information

Lenovo Data Center Group. Define a different future

Lenovo Data Center Group. Define a different future Lenovo Data Center Group Define a different future Think change is hard? We don t. Concerned about the risks and complexities of transformation We see new ways to seize opportunity. Wrestling with inflexible

More information

Avancier Methods (AM) Software Architecture Diagrams

Avancier Methods (AM) Software Architecture Diagrams Methods (AM) Software Architecture Diagrams in the AM viewpoint library It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission

More information

ONUG SDN Federation/Operability

ONUG SDN Federation/Operability ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software

More information

The Economic Benefits of a Cooperative Control Wireless LAN Architecture

The Economic Benefits of a Cooperative Control Wireless LAN Architecture White Paper The Economic Benefits of a Cooperative Control Wireless LAN Architecture Aerohive Networks, Inc. 3150-C Coronado Avenue Santa Clara, California 95054 Phone: 408.988.9918 Toll Free: 1.866.918.9918

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

Object-Oriented Analysis and Design Using UML (OO-226)

Object-Oriented Analysis and Design Using UML (OO-226) Object-Oriented Analysis and Design Using UML (OO-226) The Object-Oriented Analysis and Design Using UML course effectively combines instruction on the software development processes, objectoriented technologies,

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator

The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator White Paper The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator Migrating from Cisco Tidal Horizon for SAP to Cisco Process Orchestrator can help you reduce total cost of ownership

More information

The TOGAF Architect s Guide to Cisco SONA

The TOGAF Architect s Guide to Cisco SONA The TOGAF Architect s Guide to Cisco SONA The increasing complexity of enterprise solutions requires a more disciplined approach to IT. Enterprise architecture (EA) provides such an approach to understanding

More information

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

More information

Introduction to software architecture Revision : 732

Introduction to software architecture Revision : 732 Introduction to software architecture Revision : 732 Denis Conan Septembre 2018 Foreword The content of these slides is extracted from the following references: L. Bass, P. Clements, and R. Kazman. Software

More information

IDERA ER/Studio Software Architect Evaluation Guide. Version 16.5/2016+ Published February 2017

IDERA ER/Studio Software Architect Evaluation Guide. Version 16.5/2016+ Published February 2017 IDERA ER/Studio Software Architect Evaluation Guide Version 16.5/2016+ Published February 2017 2017 IDERA, Inc. All rights reserved. IDERA and the IDERA logo are trademarks or registered trademarks of

More information

Improving the Practice of DoD Architecting with the Architecture Specification Model

Improving the Practice of DoD Architecting with the Architecture Specification Model Improving the Practice of DoD Architecting with the Architecture Specification Model Huei Wan Ang, Dave Nicholson, and Brad Mercer The MITRE Corporation Abstract As the Department of Defense (DoD) moves

More information

Maintaining & Increasing Stakeholder Confidence in IT Architecture

Maintaining & Increasing Stakeholder Confidence in IT Architecture Maintaining & Increasing Stakeholder Confidence in IT Architecture Eoin Woods eoin@artechra.com www.eoinwoods.info 1 Content Defining IT Architecture IT Architecture & Requirements Identifying Stakeholders

More information

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid Proven results Unsurpassed interoperability Fast, secure and adaptable network Only EnergyAxis brings it all together for the Smart Grid Outage management & restoration Elster global strength Demand response

More information

FERC Reliability Technical Conference -- Panel I State of Reliability and Emerging Issues

FERC Reliability Technical Conference -- Panel I State of Reliability and Emerging Issues -- State of Reliability and Emerging Issues Remarks of Thomas Burgess, Vice President and Director, Reliability Assessment and Performance Analysis Chairman Wellinghoff, Commissioners, Staff, and fellow

More information

Part I: Future Internet Foundations: Architectural Issues

Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication

More information

VANCOUVER Chapter Study Group. BABOK Chapter 9 Techniques

VANCOUVER Chapter Study Group. BABOK Chapter 9 Techniques VANCOUVER Chapter Study Group BABOK Chapter 9 Techniques May 27, 2015 David Ghotbi, CBAP Agenda Chapter 8 Review Pop Quiz Break Chapter 9 Review Pop Quiz Q & A 2 Chapter 9 Techniques Techniques: Alter

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

WHITE PAPER. Applying Software-Defined Security to the Branch Office

WHITE PAPER. Applying Software-Defined Security to the Branch Office Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry

More information