SlideShare uma empresa Scribd logo
1 de 27
Enterprise Archaeology	

Archaeology, or archeology is the study of
human activity in the past, primarily through
the recovery and analysis of the material
culture and environmental data that they
have left behind, which includes artifacts,
architecture, biofacts and cultural landscapes
(the archaeological record).	

Date & Time	

www.conexiam.com
The Purpose of Enterprise
Archaeology	

!   Learn about the past development of the enterprise	

!   Important developments in the history of the enterprise are not
written down	

!   When they are written down, they are often incomplete and
inconsistent	

!   Understanding the past is important to success in the future	

!   What are the forces that shaped the enterprise?	

!   Where is the core value in the enterprise?	

!   Are there hidden liabilities?	

Date & Time	

www.conexiam.com
What are We Looking For?	

!   Technologies	

!   Operational and Governance Structures	

!   Behaviours	

!   Relationships	

!   Purpose	

!   Culture	

!   Forces and Pressures	

Date & Time	

www.conexiam.com
Unearthing the Enterprise – Techniques	

!   Field Survey 	

!   Consultation with current and past employees	

!   Excavation 	

!   Forensic Analysis	

!   Lexical analysis	

!   Noun analysis to identify business objects and actors	

!   Other phrase analysis to identify other enterprise objects	

!   Surveillance – Remote Sensing	

!   E.g. network scanning	

!   Analysis and Reverse engineering 	

Date & Time	

www.conexiam.com
Unearthing the Enterprise - Sources	

!   Formal Policy and Plans	

!   The view of the ruling class	

!   Describes the enterprise as planned and promised	

!   Formal Records	

!   The view intended for regulators	

!   Technology	

!   Artefacts of the enterprise	

!   Commentary	

!   News, inquiries, audits, etc	

!   Oral History	

Date & Time	

www.conexiam.com
Enterprise Anthropology	

Anthropology is the study of humans, past and present.To
understand the full sweep and complexity of cultures across all of
human history, anthropology draws and builds upon knowledge
from the social and biological sciences as well as the humanities and
physical sciences.A central concern of anthropologists is the
application of knowledge to the solution of human problems.
Historically, anthropologists in the United States have been trained
in one of four areas: sociocultural anthropology, biological/physical
anthropology, archaeology, and linguistics.Anthropologists often
integrate the perspectives of several of these areas into their
research, teaching, and professional lives. 	

American Anthropological Association (http://www.aaanet.org/about/WhatisAnthropology.cfm)	

Date & Time	

www.conexiam.com
The Purpose of Enterprise
Anthropology	

!   Culture	

!   Successful architecture is design that the enterprise can live with	

!   Enterprise culture influences the change that is possible and the
speed with which change can occur	

!   Culture is foundational to stakeholder management	

!   Language	

!   Metaphor and idiom are critical to design	

!   Design must be articulated in the language of the enterprise	

!   Evolution	

!   How does the enterprise evolve in response to its environment	

Date & Time	

www.conexiam.com
Techniques for Enterprise
Anthropology	

!   Architecture Meta-models – codifying the language of the
enterprise	

!   Stakeholder management – documenting the culture of the
enterprise	

!   Environment Scans – understanding the evolutionary pressures	

Date & Time	

www.conexiam.com
Architecture Content Meta-Models	

Date & Time	

Defines the (formal)
language of the
enterprise
Language affects
design
Some Common
Biases
Functional
Service Orientation
Process Orientation
www.conexiam.com
Stakeholders	

Enterprise
Security
QA/Standards
Groups
Product
Specialists
Technical
Specialists
Programme
Management Office
Procurement
HR
Executive
Line
Management
Business
Domain
Experts
IT Service
Management
Application
Management
Management
Data /Voice
Communications
Line
Management
Executive
Functional /
Business
Process
Experts
CxO
Stakeholder Types
Corporate End - UserSystem Project
Infrastructure
Stakeholders are people who have
key roles in, or concerns about, the
enterprise architecture. Stakeholders
can be individuals, teams,
organizations, etc.
Date & Time	

www.conexiam.com
Stakeholder Management	

Enterprise
Security
QA/Standards
Groups
Product
Specialists
Technical
Specialists
Programme
Management Office
Procurement
HR
Executive
Line
Management
Business
Domain
Experts
IT Service
Management
Application
Management
Management
Data /Voice
Communications
Line
Management
Executive
Functional /
Business
Process
Experts
CxO
Stakeholder Types
Corporate End - UserSystem Project
Infrastructure
TOGAF provides a step by step approach:
Step 1: Identify Stakeholders
Step 2: Classify Stakeholder
Positions
Step 3: Determine Stakeholder
Management Approach
Step 4: Tailor Engagement
Deliverables
Date & Time	

www.conexiam.com
Apollo example	

Date & Time	

www.conexiam.com
Step 1: Identify Stakeholders	

!   Identify the key stakeholders of the enterprise architecture. 	

!   Look at who is impacted by the enterprise architecture project:	

!   Who gains and who loses from this change? 	

!   Who controls change management of processes? 	

!   Who designs new systems? 	

!   Who will make the decisions? 	

!   Who procures IT systems and who decides what to buy? 	

!   Who controls resources? 	

!   Who has specialist skills the project needs? 	

!   Who has influence? 	

Date & Time	

www.conexiam.com
Step 2: Classify Stakeholder
Positions	

!   Classify and record positions in a Stakeholder Analysis Matrix	

Stakeholder
Group
Stakeholder Ability to
Disrupt
the
change
Current
Understanding
Required
understanding
Current
commitment
Required
commitment
Required
support
CIO John
Smith
H M H L M H
CFO Jeff
Brown
M M M L M M
Date & Time	

www.conexiam.com
Step 3: Determine Stakeholder
Management Approach 	

!   Work out stakeholder power, influence and interest, so as to
focus the engagement on the key individuals. 	

!   These can then be mapped onto a power/interest matrix, which
is used to determine the strategy for engaging with them.	

Date & Time	

www.conexiam.com
Step 3: Determine Stakeholder
Management Approach 	

!   Develop a Power/Interest Matrix and place Stakeholder groups
within it	

Date & Time	

www.conexiam.com
Step 4:Tailor Engagement
Deliverables	

!   For each Stakeholder Group:	

!   Identify the viewpoints that the architecture engagement needs
to produce and validate with each stakeholder group	

!   Define specific viewpoints, matrices, and views of the enterprise
architecture model.. 	

Date & Time	

www.conexiam.com
Example: Stakeholder Map	

STAKEHOLDER
GROUP
CLASS EXAMPLE ROLES KEY CONCERNS CLASS Catalogs, Matrices and
Diagrams
Corporate
Functions
CxO CEO, CFO, CIO, COO The high level drivers, goals and
objectives of the organization, and how
these are translated into an effective
process and IT architecture to advance
the business.
KEEP
SATISFIED
Business Footprint diagram
Goal/Objective/Service
diagram
Organization Decomposition
diagram
Corporate
Functions
Program
Management
Office
Project Portfolio
Managers
Prioritizing, funding and aligning
change activity. An understanding of
project content and technical
dependencies between projects adds a
further dimension of richness to
portfolio management decision making.
KEEP
SATISFIED
Requirements Catalog
Business Footprint diagram
Application
Communication diagram
Functional
Decomposition diagram
Corporate
Functions
Procurement Acquirers Understanding what building blocks
of the architecture can be bought, and
what constraints (or rules) exist that are
relevant to the purchase. The acquirer
will shop with multiple vendors looking
for the best cost solution while adhering
to the constraints (or rules) applied by
the architecture, such as standards. The
key concern is to make purchasing
decisions that fit the architecture, and
thereby to reduce the risk of added costs
arising from non-compliant components.
KEY
PLAYERS
Technology Portfolio catalog
Technology Standards
Catalog
www.conexiam.com
Environmental Scans	

!   Identify factors that influence the evolution of the enterprise	

!   External factors	

!   Threats	

!   Opportunities	

!   Internal Factors	

!   Weaknesses	

!   Strengths	

Date & Time	

www.conexiam.com
Enterprise Analytics	

Date & Time	

!   Data needs context to become information	

!   The key to exploiting data is knowing what questions to ask	

!   Design analyses:	

!   Problem Analysis	

!   Opportunity Discovery	

!   Options Analysis	

www.conexiam.com
Problem Analysis	

!   Business Problems are Stakeholder Needs that are not being
addressed	

!   If no-one cares it is not a problem	

!   Analytics allow us to confirm the problem exists	

!   Analytics allow us to confirm interactions between problems	

!   Analytics can help us discover root-causes	

!   Problem Analysis is more than the answer	

!   Its also about building consensus that my problem is our problem	

Date & Time	

www.conexiam.com
Options Analysis	

!   I know the choices – which is optimal	

!   Architecture descriptions enable you to precisely define the
options and identify the questions that need to be asked	

!   Analytics provide the data to make a choice	

Date & Time	

www.conexiam.com
Enterprise Architecture
Design for the Enterprise	

Date  Time	

www.conexiam.com	

Descriptions
• Structure
• Components and
their
relationships
• Behaviour
• Value
Designs
•  Rules governing
the evolution of
the enterprise
• Road maps
• Analyses
• Specifications
Why does Enterprise
Architecture Produce?	

Date  Time	

www.conexiam.com	

Design
ArchitectureDescription
Unintentional Intentional
Implicit
Explicit
Compliance
Risk Management
Transparency and Accountability
Communications
Mission Fulfilment
Agility
Sustainability
Competitive Advantage
Characteristics of the
Enterprise Architecture	

Date  Time	

www.conexiam.com	

Described
Leader’s
Vision
Designed
Evolved
Design
ArchitectureDescription
Unintentional Intentional
Implicit
Explicit
Characteristics of the
Enterprise Culture	

Date  Time	

www.conexiam.com	

Operational
Entrepre-
neurial
Mission
Oriented
Political
Design
ArchitectureDescription
Unintentional Intentional
Implicit
Explicit
Complex
business
Complex
problems	

Date  Time	

www.conexiam.com

Mais conteúdo relacionado

Semelhante a The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis and Architecture: From Design to Discovery

My First Day Of Technical Writing Class
My First Day Of Technical Writing ClassMy First Day Of Technical Writing Class
My First Day Of Technical Writing ClassAshley Jean
 
[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...
[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...
[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...Scott Abel
 
Physician Know Thy Customers
Physician Know Thy CustomersPhysician Know Thy Customers
Physician Know Thy Customerssundong
 
2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-final2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-finalHallie Wilfert
 
Make the Technology-to-Theory Connection in Your Career Sessions
Make the Technology-to-Theory Connection in Your Career SessionsMake the Technology-to-Theory Connection in Your Career Sessions
Make the Technology-to-Theory Connection in Your Career SessionsMelissa A. Venable
 
Large language models in higher education
Large language models in higher educationLarge language models in higher education
Large language models in higher educationPeter Trkman
 
Making Intelligent Virtual Assistants a Reality
Making Intelligent Virtual Assistants a RealityMaking Intelligent Virtual Assistants a Reality
Making Intelligent Virtual Assistants a RealityEarley Information Science
 
How do social technologies change knowledge worker business processes km me...
How do social technologies change knowledge worker business processes   km me...How do social technologies change knowledge worker business processes   km me...
How do social technologies change knowledge worker business processes km me...Martin Sumner-Smith
 
1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docx
1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docx1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docx
1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docxmoggdede
 
Ergonomist 544-October 2015 Information Security Leadership
Ergonomist 544-October 2015 Information Security LeadershipErgonomist 544-October 2015 Information Security Leadership
Ergonomist 544-October 2015 Information Security LeadershipDr. Ann Bicknell
 
Converting Research Findings in to Business Speak
Converting Research Findings in to Business SpeakConverting Research Findings in to Business Speak
Converting Research Findings in to Business Speakjackiem
 
Testing Taxonomies: Beyond Card Sorting
Testing Taxonomies: Beyond Card SortingTesting Taxonomies: Beyond Card Sorting
Testing Taxonomies: Beyond Card SortingAlberta Soranzo
 
HCD 660 – Foundations of Human Capital DevelopmentDefi
HCD 660 – Foundations of Human Capital DevelopmentDefiHCD 660 – Foundations of Human Capital DevelopmentDefi
HCD 660 – Foundations of Human Capital DevelopmentDefiJeanmarieColbert3
 
How to create best-in-class workplace experiences in 2017
How to create best-in-class workplace experiences in 2017How to create best-in-class workplace experiences in 2017
How to create best-in-class workplace experiences in 2017ISS Group
 
Tactics and Decision Making for Successful Museum Digital Projects
Tactics and Decision Making for Successful Museum Digital ProjectsTactics and Decision Making for Successful Museum Digital Projects
Tactics and Decision Making for Successful Museum Digital ProjectsAndrew Lewis
 
Iasa Five Pillars Presentation
Iasa Five Pillars PresentationIasa Five Pillars Presentation
Iasa Five Pillars Presentationiasaglobal
 
From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product BacklogLuiz C. Parzianello
 
Component content 101 - Noz Urbina
Component content 101 - Noz UrbinaComponent content 101 - Noz Urbina
Component content 101 - Noz UrbinaNoz Urbina
 

Semelhante a The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis and Architecture: From Design to Discovery (20)

My First Day Of Technical Writing Class
My First Day Of Technical Writing ClassMy First Day Of Technical Writing Class
My First Day Of Technical Writing Class
 
[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...
[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...
[Case Study] Physician, Know Thy User: Using Personas to Target Content and U...
 
Physician Know Thy Customers
Physician Know Thy CustomersPhysician Know Thy Customers
Physician Know Thy Customers
 
2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-final2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-final
 
Make the Technology-to-Theory Connection in Your Career Sessions
Make the Technology-to-Theory Connection in Your Career SessionsMake the Technology-to-Theory Connection in Your Career Sessions
Make the Technology-to-Theory Connection in Your Career Sessions
 
Large language models in higher education
Large language models in higher educationLarge language models in higher education
Large language models in higher education
 
Making Intelligent Virtual Assistants a Reality
Making Intelligent Virtual Assistants a RealityMaking Intelligent Virtual Assistants a Reality
Making Intelligent Virtual Assistants a Reality
 
How do social technologies change knowledge worker business processes km me...
How do social technologies change knowledge worker business processes   km me...How do social technologies change knowledge worker business processes   km me...
How do social technologies change knowledge worker business processes km me...
 
1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docx
1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docx1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docx
1308 226 PMDESIGNING QUALITATIVE RESEARCH PROPOSALSPage.docx
 
Ergonomist 544-October 2015 Information Security Leadership
Ergonomist 544-October 2015 Information Security LeadershipErgonomist 544-October 2015 Information Security Leadership
Ergonomist 544-October 2015 Information Security Leadership
 
Converting Research Findings in to Business Speak
Converting Research Findings in to Business SpeakConverting Research Findings in to Business Speak
Converting Research Findings in to Business Speak
 
Testing Taxonomies: Beyond Card Sorting
Testing Taxonomies: Beyond Card SortingTesting Taxonomies: Beyond Card Sorting
Testing Taxonomies: Beyond Card Sorting
 
HCD 660 – Foundations of Human Capital DevelopmentDefi
HCD 660 – Foundations of Human Capital DevelopmentDefiHCD 660 – Foundations of Human Capital DevelopmentDefi
HCD 660 – Foundations of Human Capital DevelopmentDefi
 
How to create best-in-class workplace experiences in 2017
How to create best-in-class workplace experiences in 2017How to create best-in-class workplace experiences in 2017
How to create best-in-class workplace experiences in 2017
 
Tactics and Decision Making for Successful Museum Digital Projects
Tactics and Decision Making for Successful Museum Digital ProjectsTactics and Decision Making for Successful Museum Digital Projects
Tactics and Decision Making for Successful Museum Digital Projects
 
Iasa Five Pillars Presentation
Iasa Five Pillars PresentationIasa Five Pillars Presentation
Iasa Five Pillars Presentation
 
Iasa5 pillars
Iasa5 pillarsIasa5 pillars
Iasa5 pillars
 
From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product Backlog
 
Component content 101 - Noz Urbina
Component content 101 - Noz UrbinaComponent content 101 - Noz Urbina
Component content 101 - Noz Urbina
 
Euroia 2011-f inal
Euroia 2011-f inalEuroia 2011-f inal
Euroia 2011-f inal
 

Mais de CTE Solutions Inc.

Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?CTE Solutions Inc.
 
Exchange @ The Core with CTE Solutions
Exchange @ The Core with CTE SolutionsExchange @ The Core with CTE Solutions
Exchange @ The Core with CTE SolutionsCTE Solutions Inc.
 
Microsoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceMicrosoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceCTE Solutions Inc.
 
Ba why development projects fail
Ba   why development projects failBa   why development projects fail
Ba why development projects failCTE Solutions Inc.
 
Prince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison DemystifiedPrince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison DemystifiedCTE Solutions Inc.
 
Development Projects Failing? What can the Business Analyst Do?
Development Projects Failing?  What can the Business Analyst Do?Development Projects Failing?  What can the Business Analyst Do?
Development Projects Failing? What can the Business Analyst Do?CTE Solutions Inc.
 
Project Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder ManagementProject Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder ManagementCTE Solutions Inc.
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCTE Solutions Inc.
 
Top 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsTop 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsCTE Solutions Inc.
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...CTE Solutions Inc.
 
What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013CTE Solutions Inc.
 
What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013CTE Solutions Inc.
 
Hyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationHyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationCTE Solutions Inc.
 
The future of agile in organizations
The future of agile in organizationsThe future of agile in organizations
The future of agile in organizationsCTE Solutions Inc.
 
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee VincentIIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee VincentCTE Solutions Inc.
 
Session 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared ThibodeauSession 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared ThibodeauCTE Solutions Inc.
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 

Mais de CTE Solutions Inc. (20)

Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?
 
Understanding Lean IT
Understanding Lean ITUnderstanding Lean IT
Understanding Lean IT
 
Understanding Lean IT
Understanding Lean IT Understanding Lean IT
Understanding Lean IT
 
Exchange @ The Core with CTE Solutions
Exchange @ The Core with CTE SolutionsExchange @ The Core with CTE Solutions
Exchange @ The Core with CTE Solutions
 
Microsoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceMicrosoft SharePoint in the Workplace
Microsoft SharePoint in the Workplace
 
Ba why development projects fail
Ba   why development projects failBa   why development projects fail
Ba why development projects fail
 
Prince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison DemystifiedPrince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison Demystified
 
Development Projects Failing? What can the Business Analyst Do?
Development Projects Failing?  What can the Business Analyst Do?Development Projects Failing?  What can the Business Analyst Do?
Development Projects Failing? What can the Business Analyst Do?
 
Risk Management using ITSG-33
Risk Management using ITSG-33Risk Management using ITSG-33
Risk Management using ITSG-33
 
Project Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder ManagementProject Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder Management
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
 
Top 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsTop 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE Solutions
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
 
What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013
 
What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013
 
Hyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationHyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live Migration
 
The future of agile in organizations
The future of agile in organizationsThe future of agile in organizations
The future of agile in organizations
 
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee VincentIIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
 
Session 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared ThibodeauSession 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared Thibodeau
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis and Architecture: From Design to Discovery

  • 1. Enterprise Archaeology Archaeology, or archeology is the study of human activity in the past, primarily through the recovery and analysis of the material culture and environmental data that they have left behind, which includes artifacts, architecture, biofacts and cultural landscapes (the archaeological record). Date & Time www.conexiam.com
  • 2. The Purpose of Enterprise Archaeology !   Learn about the past development of the enterprise !   Important developments in the history of the enterprise are not written down !   When they are written down, they are often incomplete and inconsistent !   Understanding the past is important to success in the future !   What are the forces that shaped the enterprise? !   Where is the core value in the enterprise? !   Are there hidden liabilities? Date & Time www.conexiam.com
  • 3. What are We Looking For? !   Technologies !   Operational and Governance Structures !   Behaviours !   Relationships !   Purpose !   Culture !   Forces and Pressures Date & Time www.conexiam.com
  • 4. Unearthing the Enterprise – Techniques !   Field Survey !   Consultation with current and past employees !   Excavation !   Forensic Analysis !   Lexical analysis !   Noun analysis to identify business objects and actors !   Other phrase analysis to identify other enterprise objects !   Surveillance – Remote Sensing !   E.g. network scanning !   Analysis and Reverse engineering Date & Time www.conexiam.com
  • 5. Unearthing the Enterprise - Sources !   Formal Policy and Plans !   The view of the ruling class !   Describes the enterprise as planned and promised !   Formal Records !   The view intended for regulators !   Technology !   Artefacts of the enterprise !   Commentary !   News, inquiries, audits, etc !   Oral History Date & Time www.conexiam.com
  • 6. Enterprise Anthropology Anthropology is the study of humans, past and present.To understand the full sweep and complexity of cultures across all of human history, anthropology draws and builds upon knowledge from the social and biological sciences as well as the humanities and physical sciences.A central concern of anthropologists is the application of knowledge to the solution of human problems. Historically, anthropologists in the United States have been trained in one of four areas: sociocultural anthropology, biological/physical anthropology, archaeology, and linguistics.Anthropologists often integrate the perspectives of several of these areas into their research, teaching, and professional lives. American Anthropological Association (http://www.aaanet.org/about/WhatisAnthropology.cfm) Date & Time www.conexiam.com
  • 7. The Purpose of Enterprise Anthropology !   Culture !   Successful architecture is design that the enterprise can live with !   Enterprise culture influences the change that is possible and the speed with which change can occur !   Culture is foundational to stakeholder management !   Language !   Metaphor and idiom are critical to design !   Design must be articulated in the language of the enterprise !   Evolution !   How does the enterprise evolve in response to its environment Date & Time www.conexiam.com
  • 8. Techniques for Enterprise Anthropology !   Architecture Meta-models – codifying the language of the enterprise !   Stakeholder management – documenting the culture of the enterprise !   Environment Scans – understanding the evolutionary pressures Date & Time www.conexiam.com
  • 9. Architecture Content Meta-Models Date & Time Defines the (formal) language of the enterprise Language affects design Some Common Biases Functional Service Orientation Process Orientation www.conexiam.com
  • 10. Stakeholders Enterprise Security QA/Standards Groups Product Specialists Technical Specialists Programme Management Office Procurement HR Executive Line Management Business Domain Experts IT Service Management Application Management Management Data /Voice Communications Line Management Executive Functional / Business Process Experts CxO Stakeholder Types Corporate End - UserSystem Project Infrastructure Stakeholders are people who have key roles in, or concerns about, the enterprise architecture. Stakeholders can be individuals, teams, organizations, etc. Date & Time www.conexiam.com
  • 11. Stakeholder Management Enterprise Security QA/Standards Groups Product Specialists Technical Specialists Programme Management Office Procurement HR Executive Line Management Business Domain Experts IT Service Management Application Management Management Data /Voice Communications Line Management Executive Functional / Business Process Experts CxO Stakeholder Types Corporate End - UserSystem Project Infrastructure TOGAF provides a step by step approach: Step 1: Identify Stakeholders Step 2: Classify Stakeholder Positions Step 3: Determine Stakeholder Management Approach Step 4: Tailor Engagement Deliverables Date & Time www.conexiam.com
  • 12. Apollo example Date & Time www.conexiam.com
  • 13. Step 1: Identify Stakeholders !   Identify the key stakeholders of the enterprise architecture. !   Look at who is impacted by the enterprise architecture project: !   Who gains and who loses from this change? !   Who controls change management of processes? !   Who designs new systems? !   Who will make the decisions? !   Who procures IT systems and who decides what to buy? !   Who controls resources? !   Who has specialist skills the project needs? !   Who has influence? Date & Time www.conexiam.com
  • 14. Step 2: Classify Stakeholder Positions !   Classify and record positions in a Stakeholder Analysis Matrix Stakeholder Group Stakeholder Ability to Disrupt the change Current Understanding Required understanding Current commitment Required commitment Required support CIO John Smith H M H L M H CFO Jeff Brown M M M L M M Date & Time www.conexiam.com
  • 15. Step 3: Determine Stakeholder Management Approach !   Work out stakeholder power, influence and interest, so as to focus the engagement on the key individuals. !   These can then be mapped onto a power/interest matrix, which is used to determine the strategy for engaging with them. Date & Time www.conexiam.com
  • 16. Step 3: Determine Stakeholder Management Approach !   Develop a Power/Interest Matrix and place Stakeholder groups within it Date & Time www.conexiam.com
  • 17. Step 4:Tailor Engagement Deliverables !   For each Stakeholder Group: !   Identify the viewpoints that the architecture engagement needs to produce and validate with each stakeholder group !   Define specific viewpoints, matrices, and views of the enterprise architecture model.. Date & Time www.conexiam.com
  • 18. Example: Stakeholder Map STAKEHOLDER GROUP CLASS EXAMPLE ROLES KEY CONCERNS CLASS Catalogs, Matrices and Diagrams Corporate Functions CxO CEO, CFO, CIO, COO The high level drivers, goals and objectives of the organization, and how these are translated into an effective process and IT architecture to advance the business. KEEP SATISFIED Business Footprint diagram Goal/Objective/Service diagram Organization Decomposition diagram Corporate Functions Program Management Office Project Portfolio Managers Prioritizing, funding and aligning change activity. An understanding of project content and technical dependencies between projects adds a further dimension of richness to portfolio management decision making. KEEP SATISFIED Requirements Catalog Business Footprint diagram Application Communication diagram Functional Decomposition diagram Corporate Functions Procurement Acquirers Understanding what building blocks of the architecture can be bought, and what constraints (or rules) exist that are relevant to the purchase. The acquirer will shop with multiple vendors looking for the best cost solution while adhering to the constraints (or rules) applied by the architecture, such as standards. The key concern is to make purchasing decisions that fit the architecture, and thereby to reduce the risk of added costs arising from non-compliant components. KEY PLAYERS Technology Portfolio catalog Technology Standards Catalog www.conexiam.com
  • 19. Environmental Scans !   Identify factors that influence the evolution of the enterprise !   External factors !   Threats !   Opportunities !   Internal Factors !   Weaknesses !   Strengths Date & Time www.conexiam.com
  • 20. Enterprise Analytics Date & Time !   Data needs context to become information !   The key to exploiting data is knowing what questions to ask !   Design analyses: !   Problem Analysis !   Opportunity Discovery !   Options Analysis www.conexiam.com
  • 21. Problem Analysis !   Business Problems are Stakeholder Needs that are not being addressed !   If no-one cares it is not a problem !   Analytics allow us to confirm the problem exists !   Analytics allow us to confirm interactions between problems !   Analytics can help us discover root-causes !   Problem Analysis is more than the answer !   Its also about building consensus that my problem is our problem Date & Time www.conexiam.com
  • 22. Options Analysis !   I know the choices – which is optimal !   Architecture descriptions enable you to precisely define the options and identify the questions that need to be asked !   Analytics provide the data to make a choice Date & Time www.conexiam.com
  • 23. Enterprise Architecture Design for the Enterprise Date Time www.conexiam.com Descriptions • Structure • Components and their relationships • Behaviour • Value Designs •  Rules governing the evolution of the enterprise • Road maps • Analyses • Specifications
  • 24. Why does Enterprise Architecture Produce? Date Time www.conexiam.com Design ArchitectureDescription Unintentional Intentional Implicit Explicit Compliance Risk Management Transparency and Accountability Communications Mission Fulfilment Agility Sustainability Competitive Advantage
  • 25. Characteristics of the Enterprise Architecture Date Time www.conexiam.com Described Leader’s Vision Designed Evolved Design ArchitectureDescription Unintentional Intentional Implicit Explicit
  • 26. Characteristics of the Enterprise Culture Date Time www.conexiam.com Operational Entrepre- neurial Mission Oriented Political Design ArchitectureDescription Unintentional Intentional Implicit Explicit