Documente Academic
Documente Profesional
Documente Cultură
An overview
Contents
1 Introduction 1
1.1 Enterprise architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.2 Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.3 Benets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.4 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.5 Relationship to other disciplines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.6 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.7 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.8 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.10 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2 Enterprise Architect 7
2.1 Enterprise architect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1 Role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.2 Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.3 Skills and knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3 Enterprise Architecture 9
3.1 Enterprise Architecture Assessment Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1.2 Performance Improvement Lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1.3 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.1.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2 Enterprise architecture planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2.2 EAP topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2.3 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
i
ii CONTENTS
3.2.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2.6 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3 Enterprise Architecture Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.2 Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.3 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.4 Architecture Patterns ( EA Reference Architecture) . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.4.1 Denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.4.2 Architectural style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.4.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.4.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.4.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.4.6 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4 Frameworks 15
4.1 Enterprise Architecture framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.1.3 EA framework topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.1.4 Components of enterprise architecture framework . . . . . . . . . . . . . . . . . . . . . . 18
4.1.5 Types of enterprise architecture framework . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.1.6 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.1.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.1.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.1.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6 Commercial frameworks 39
6.1 Integrated Architecture Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.1.1 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.2 OBASHI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.2.1 Core Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.2.2 The Origins of OBASHI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
6.2.3 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
6.2.4 Fields of use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
6.2.5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
6.2.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
6.2.7 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
6.3 Information Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
6.3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
6.3.2 Industry Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
6.3.3 Banking and nancial markets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
6.3.4 Insurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
6.3.5 Other industries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
iv CONTENTS
6.3.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
6.3.7 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
6.4 Zachman Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
6.4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
6.4.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
6.4.3 Zachman Framework topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
6.4.4 Applications and inuences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
6.4.5 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
6.4.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
6.4.7 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
6.4.8 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
8 Government frameworks 73
8.1 Government Enterprise Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
8.1.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
8.1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
8.1.3 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.1.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.1.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.2 FDIC Enterprise Architecture Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.2.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.2.3 EA framework topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.2.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.2.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.2.6 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.2.7 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.3 Federal Enterprise Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.3.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.3.3 Collaborative planning methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
8.3.4 Version 2 reference models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
8.3.5 Version 1 reference models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
8.3.6 Architecture levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
8.3.7 Program results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
8.3.8 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
8.3.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
8.3.10 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
8.4 NIST Enterprise Architecture Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
8.4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
8.4.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
8.4.3 NIST Enterprise Architecture Model topics . . . . . . . . . . . . . . . . . . . . . . . . . 85
8.4.4 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
vi CONTENTS
9 Lifecycles 92
9.1 Enterprise life cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
9.1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
9.1.2 Enterprise life cycle topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
9.1.3 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
9.1.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
9.1.5 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
9.1.6 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
9.2 ISO 12207 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
9.2.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
9.2.2 Primary lifecycle processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
9.2.3 Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
9.2.4 Deliverables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
9.2.5 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
9.2.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
9.2.7 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
9.3 Systems Development Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
9.3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
9.3.2 History and details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
9.3.3 Phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
9.3.4 Systems analysis and design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
9.3.5 Object-oriented analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
9.3.6 Life cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
9.3.7 Strengths and weaknesses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
9.3.8 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
9.3.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
9.3.10 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
9.3.11 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
9.4 Technology Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
9.4.1 The four phases of the technology life-cycle . . . . . . . . . . . . . . . . . . . . . . . . . 105
9.4.2 Technology perception dynamics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
CONTENTS vii
10 Modelling 111
10.1 Enterprise modelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
10.1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
10.1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
10.1.3 Enterprise modelling basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
10.1.4 Enterprise modelling techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
10.1.5 Enterprise engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
10.1.6 Related elds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
10.1.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
10.1.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
10.1.9 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
10.1.10 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
11 Collaboration 118
11.1 Business analyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
11.1.1 Areas of business analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
11.1.2 Typical deliverables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
11.1.3 Industries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
11.1.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
11.1.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
11.2 Systems analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
11.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
11.2.2 Information technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
11.2.3 Policy analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
11.2.4 Practitioners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
11.2.5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
11.2.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
viii CONTENTS
Introduction
Enterprise architecture (EA) is a well-dened prac- analyzes areas of common activity within or
tice for conducting enterprise analysis, design, planning, between organizations, where information and
and implementation, using a holistic approach at all times, other resources are exchanged to guide future
for the successful development and execution of strat- states from an integrated viewpoint of strategy,
egy. Enterprise architecture applies architecture princi- business, and technology.[5]
ples and practices to guide organizations through the busi-
ness, information, process, and technology changes nec- IT analysis rm Gartner denes the term as a discipline
essary to execute their strategies. These practices utilize where an enterprise is led through change. According to
the various aspects of an enterprise to identify, motivate, their glossary,
and achieve these changes.[1]
Practitioners of enterprise architecture, enterprise archi- Enterprise architecture (EA) is a discipline
tects, are responsible for performing the analysis of busi- for proactively and holistically leading enter-
ness structure and processes and are often called upon to prise responses to disruptive forces by identi-
draw conclusions from the information collected to ad- fying and analyzing the execution of change
dress the goals of enterprise architecture: eectiveness, toward desired business vision and outcomes.
eciency, agility, and durability.[2] EA delivers value by presenting business and
IT leaders with signature-ready recommenda-
tions for adjusting policies and projects to
1.1.1 Overview achieve target business outcomes that capital-
ize on relevant business disruptions. EA is used
In the enterprise architecture literature and community, to steer decision making toward the evolution
there are various perspectives in regards to the meaning of the future state architecture.[6]
of the term enterprise architecture. As of 2012, no ocial
denition exists; rather, various organizations (public and
Each of the denitions above underplays the historical
private) promote their understanding of the term. Conse-
reality that enterprise architecture emerged from meth-
quently, the enterprise architecture literature oers many
ods for documenting and planning information systems
denitions for the term enterprise architecture; some of
architectures, and the current reality that most enterprise
which are complementary, others are nuances, and others
architecture practitioners report to a CIO or other IT de-
yet are in opposition.[3]
partment manager. In a business organization structure
The MIT Center for Information Systems Research (MIT today, the enterprise architecture team performs an ongo-
CISR) in 2007 dened enterprise architecture as the spe- ing business function that helps business and IT managers
cic aspects of a business that are under examination: to gure out the best strategies to support and enable busi-
ness development and business change in relation to the
Enterprise architecture is the organizing logic business information systems that the business depends
for business processes and IT infrastructure re- on.
ecting the integration and standardization re-
quirements of the companys operating model.
The operating model is the desired state of busi- 1.1.2 Topics
ness process integration and business process
standardization for delivering goods and ser- The terms enterprise and architecture
vices to customers.[4]
The term enterprise can be dened as describing an
The Enterprise Architecture Body of Knowledge denes organizational unit, organization, or collection of organi-
1
2 CHAPTER 1. INTRODUCTION
zations that share a set of common goals and collaborate Architectural description of an enterprise
to provide specic products or services to customers.[7]
[9]
In that sense, the term enterprise covers various types According to the standard ISO/IEC/IEEE 42010, the
of organizations, regardless of their size, ownership product used to describe the architecture of a system is
model, operational model, or geographical distribution. called an architectural description. In practice, an archi-
It includes those organizations complete socio-technical tectural description contains a variety of lists, tables, and
systems,[8] including people, information, processes, and diagrams. These are models known as views. In the case
technologies. of Enterprise Architecture, these models describe the
logical business functions or capabilities, business pro-
The term architecture refers to fundamental concepts or cesses, human roles and actors, the physical organization
properties of a system in its environment, embodied in its structure, data ows and data stores, business applica-
elements, relationships, and in the principles of its design tions and platform applications, hardware, and commu-
and evolution.[9] nications infrastructure.
Understood as a socio-technical system, the term enter- The UK National Computing Centre EA best practice
prise denes the scope of the enterprise architecture. guidance[11] states:
2. Enterprise integrating According to this school of innovations in the structure or processes of an orga-
thought, the purpose of EA is to achieve greater nization
coherency between the various concerns of an en-
terprise (HR, IT, Operations, etc.) including the innovations in the use of information systems or
linking between strategy formulation and execution. technologies
Typically, architecture proposals and decisions en-
compass all the aspects of the enterprise. the integration and/or standardization of business
processes, and
3. Enterprise ecological adaptation the purpose of improving the quality and timeliness of business in-
EA is to foster and maintain the learning capabil- formation.
ities of enterprises so that they may be sustainable.
Consequently, a great deal of emphasis is put on im-
A methodology for developing and using architecture to
proving the capabilities of the enterprise to improve
guide the transformation of a business from a baseline
itself, to innovate and to coevolve with its environ-
state to a target state, sometimes through several transi-
ment. Typically, proposals and decisions encompass
tion states, is usually known as an enterprise architecture
both the enterprise and its environment.
framework. A framework provides a structured collec-
tion of processes, techniques, artifact descriptions, refer-
Ones belief with regards to the meaning of enterprise ar- ence models and guidance for the production and use of
chitecture will impact how one sees its purpose, its scope, an enterprise-specic architecture description.
the means of achieving it, the skills needed to conduct it, See also: architecture domain
and the locus of responsibility for conducting it[10]
1.1. ENTERPRISE ARCHITECTURE 3
Organizational design - Enterprise architecture pro- Documenting the architecture of enterprises is done
vides support in the areas related to design and re- within the U.S. Federal Government[23] in the context of
design of the organizational structures during merg- the Capital Planning and Investment Control (CPIC) pro-
ers, acquisitions or during general organizational cess.
change.[13][14][15][16] The Federal Enterprise Architecture (FEA) reference
Organizational processes and process standards - model guides [24] federal agencies in the development of their
Enterprise architecture helps enforce discipline and architectures.
standardization of business processes, and enable Companies such as Independence Blue Cross, Intel,
process consolidation, reuse, and integration.[17][18] Volkswagen AG[25] and InterContinental Hotels Group
use enterprise architecture to improve their business ar-
Project portfolio management - Enterprise architec-
chitectures as well as to improve business performance
ture supports investment decision-making and work
and productivity.
prioritization.[14][15]
For various understandable reasons, commercial organi-
Project management - Enterprise architecture en- zations rarely publish substantial enterprise architecture
hances the collaboration and communication be- descriptions. However, government agencies have begun
tween project stakeholders. Enterprise architec- to publish architectural descriptions they have developed.
ture contributes to ecient project scoping, and Examples include:
to dening more complete and consistent project
deliverables.[16][17]
US Department of the Interior
Requirements Engineering - Enterprise architec-
ture increases the speed of requirement elicita- US Department of Defense Business Enterprise
tion and the accuracy of requirement denitions, Architecture,[26] or the 2008 BEAv5.0 version
through publishing of the enterprise architecture
documentation.[19] Treasury Enterprise Architecture Framework
As Enterprise Architecture has emerged in various or- and it is not over. I have been working with such
ganizations, the broad reach has resulted in this business companies and helped some of them to avoid mak-
role being included in the information technology gover- ing the worst mistakes. Most EA initiatives failed.
nance processes of many organizations. While this may My guess is that more than 90% never really resulted
imply that enterprise architecture is closely tied to IT, in anything useful.[39]
it should be viewed in the broader context of business
optimization in that it addresses business architecture, In a 2007 report, on enterprise architecture, Gartner
performance management, and process architecture, as predicted that "... by 2012 40% of [2007s] enter-
well as more technical subjects. prise architecture programs will be stopped.[40]
Discussions of the intersection of Enterprise Architecture A 2008 study, by performed by Erasmus Univer-
and various IT practices have been published by various sity Rotterdam and software company IDS Scheer
IT analysis rms. Gartner and Forrester have stressed the concluded that two-thirds of enterprise architec-
important relationship of Enterprise Architecture with ture projects failed to improve business and IT
emerging holistic design practices such as Design Think- alignment.[41]
ing and User Experience Design.[27][28][29] Analyst rm
Real Story Group suggested that Enterprise Architecture In a 2009 article, industry commentator Dion
and the emerging concept of the Digital workplace were Hinchclie wrote that traditional enterprise archi-
two sides to the same coin.[30] The Cutter Consortium tecture might be broken": At its very best, en-
describes Enterprise Architecture as an information and terprise architecture provides the bright lines that
knowledge-based discipline.[31] articulate the full range of possibilities for a busi-
The enterprise architecture of an organization is too ness, even describing how to go about getting there.
complex and extensive to document in its entirety, so ... Recently theres a growing realization that tra-
knowledge management techniques provide a way to ex- ditional enterprise architecture as its often prac-
plore and analyze these hidden, tacit, or implicit areas. ticed today might be broken in some important way.
In return, enterprise architecture provides a way of docu- What might be wrong and how to x it are the ques-
menting the components of an organization and their in- tions du jour.[42]
teraction, in a systemic and holistic way that complements
In 2011, federal enterprise architecture consultant
knowledge management.[32]
Stanley Gaver released a report that examined prob-
In various venues[33] , enterprise architecture has been lems within the United States federal governments
discussed as having a relationship with Service Oriented enterprise architecture program. Mr. Gaver con-
Architecture, a particular style of application integra- cluded that the federal enterprise architecture pro-
tion. Research points to enterprise architecture promot- gram had mostly failed; this conclusion was corrob-
ing the use of SOA as an enterprise-wide integration orated by a similar one made by the federal gov-
pattern.[34][35] ernment at an October 2010 meeting that was held
to determine why the federal enterprise architecture
program was not as inuential and successful as in
1.1.6 Tools the past.[43]
The following table lists some enterprise architecture
tools listed by Gartner and Forrester Research in their A key concern about EA has been the diculty in arriv-
2013 and 2014 reports.[36][37][38] ing at metrics of success, because of the broad-brush and
often opaque nature of EA projects.[44]
1.1.7 Criticism
1.1.8 See also
Despite the benets that enterprise architecture claims to
provide, for more than a decade, writers and organiza- Architectural pattern (computer science)
tions raised concerns about enterprise architecture as an Architecture of Integrated Information Systems,
eective practice. Here is a partial list of those objec- Architecture of Interoperable Information Systems
tions:
Enterprise Architect
In 2007, computer scientist Ivar Jacobson (a ma-
jor contributor to UML and pioneer in OO software Enterprise Architecture Assessment Framework
development) gave his assessment of enterprise ar-
chitecture: Around the world introducing an En- Enterprise Architecture framework
terprise Architecture EA has been an initiative for Enterprise Architecture Planning
most nancial institutions (banks, insurance compa-
nies, government, etc.) for the last ve years or so, Enterprise Architecture Management
1.1. ENTERPRISE ARCHITECTURE 5
[27] Clay Richardson, Forrester Blogs Design Thinking Re- 1.1.10 External links
shapes EA For Dynamic Business, (2013)
Media related to Enterprise architecture at Wikime-
[28] Joe McKendrick, ZDNet Gartner urges more 'design dia Commons
thinking' to break enterprise architecture out of its silo,
(2010) Quotations related to Enterprise architecture at
Wikiquote
[29] Leslie Owens, Forrester Blogs Who Owns Information
Architecture? All Of Us., (2010), blogs.forrester.com The dictionary denition of enterprise architecture
at Wiktionary
[30] Tony Byrne, Real Story Group Blog Digital work-
place and enterprise architecture: two sides to same coin,
(2012),
Enterprise Architect
7
8 CHAPTER 2. ENTERPRISE ARCHITECT
2.1.4 References
[1] Worthen, Ben (2005-03-01). Wanted: Enterprise Archi-
tects. CIO: 4750. Retrieved 2015-09-25.
[4] Rosen, Mike Ten Key Skills Architects Must Have to Deliver
Value, November 2008
Enterprise Architecture
The OMB Enterprise Architecture Assessment Frame- Government agencies are continually assessing current
work (the Framework) helps OMB and the agencies as- performance, identifying opportunities for improvement,
sess the capability of enterprise architecture programs to and translating them into specic actions. Enterprise
guide IT investments.[4] It also helps to better understand architecture is an integrated management practice that
the current state of an agencys EA, and assists them in maximizes the use of an agencys resources to achieve
integrating it into their decision-making processes. By their goals. Architecture describes the pathway from
applying the assessment themselves, agencies can iden- strategic goals and objectives, through investments, to
tify strengths and weaknesses within their programs and measurable performance improvements for the entire en-
adjust them accordingly. terprise or a portion.[5]
9
10 CHAPTER 3. ENTERPRISE ARCHITECTURE
identify and prioritize enterprise segments and op- Measure, assess and improve
portunities to improve mission performance, linked
to agency goals and objectives;
Capability Maturity Model Integration (CMMI) that taken by DOE in that the business mission is the pri-
mary driver. That is followed by the data required to sat-
Modeling Maturity Levels isfy the mission, followed by the applications that are built
using that data, and nally by the technology to imple-
ment the applications.[1]
3.1.4 References
This hierarchy of activity is represented in the gure
[1] Enterprise Architecture Assessment Framework, Oce above, in which the layers are implemented in order, from
of Management and Budget, USA. top to bottom. Based on the Business Systems Planning
(BSP) approach developed by John Zachman, EAP takes
[2] Pallab Saha (2009) Advances in Government Enterprise a data-centric approach to architecture planning to pro-
Architecture. Idea Group Inc (IGI). p.133 vide data quality, access to data, adaptability to chang-
ing requirements, data interoperability and sharing, and
[3] OMB (july 2007) Federal Enterprise Architecture Program
cost containment. This view counters the more traditional
EA Assessment Framework 2.2. (Online copy here)
view that applications should be dened before data needs
[1]
[4] Federal Enterprise Architecture, Oce of Management are determined orx provided for.
and Budget, USA.
[5] US OBM (2009). Improving Agency Performance Using 3.2.2 EAP topics
Information and Information Technology : Enterprise Ar-
chitecture Assessment Framework v3.1 June 2009 Zachman framework
Enterprise architecture planning (EAP) in enterprise Enterprise Architecture Planning model consists of four
architecture is the planning process of dening levels:
architectures for the use of information in support
of the business and the plan for implementing those Level 1 - getting started : This layer leads to produc-
architectures.[2] ing an EAP workplan and stresses the necessity of
high-level management commitment to support and
resource the subsequent six components (or steps) of
3.2.1 Overview the process. It consists of Planning Initiation, which
covers in general, decisions on which methodology
One of the earlier professional practitioners in the eld to use, who should be involved, what other support
of system architecture Steven H. Spewak in 1992 dened is required, and what toolset will be used.[2]
Enterprise Architecture Planning (EAP) as the process
of dening architectures for the use of information in sup- Level 2 - where we are today : This layer provides
port of the business and the plan for implementing those a baseline for dening the eventual architecture and
architectures.[3] Spewaks approach to EAP is similar to the long-range migration plan. It consists of:[2]
12 CHAPTER 3. ENTERPRISE ARCHITECTURE
Business process modeling, the compilation of Federal Enterprise Architecture (FEA) program
a knowledge base about the business functions based on the EAP methodology has largely failed:
and the information used in conducting and Enterprise Architecture within the federal govern-
supporting the various business processes, and ment hasnt been working, and far more often than
Current Systems and Technology, the deni- not hasnt delivered useful results. Moreover, sig-
tion of current application systems and sup- nicant parts of the federal EA program have been
porting technology platforms. complete and utter failures.[8]
Level 3 - the vision of where we want to be : Even Steven Spewak and Steven Hill (1992) admit
The arrows delineate the basic denition process that the vast majority of enterprises that undertake
ow: data architecture, applications architecture, Enterprise Architecture Planning are not successful
and technology architecture. It consists of:[2] (page 19).[3]
Data Architecture - Denition of the major
kinds of data needed to support the business. 3.2.4 See also
Applications Architecture - Denition of the
major kinds of applications needed to manage Enterprise Architecture Framework
that data and support the business functions.
Technology Architecture - Denition of the Enterprise Architecture Process
technology platforms needed to support the
Enterprise Life Cycle
applications that manage the data and support
the business functions.
Level 4 - how we plan to get there : This consists 3.2.5 References
of the Implementation / Migration Plans - Deni-
tion of the sequence for implementing applications, [1] FAA (1998). Federal Information Architecture Initiatives.
a schedule for implementation, a cost/benet analy- Federal Aviation Administration, February 1998.
[2]
sis, and a clear path for migration.
[2] The Chief Information Ocers Council (1999). Federal
Enterprise Architecture Framework Version 1.1 September
EAP methodology 1999.
3.3 Enterprise Architecture Man- process. In this way EAM supports sustainable business
strategy realization.
agement
Enterprise Architecture Management (or EAM) is
a management practice that establishes, maintains and 3.3.3 See also
uses a coherent set of guidelines, architecture principles
and governance regimes that provide direction and prac- Application Architecture
tical help in the design and development of an enterprises
architecture to achieve its vision and strategy.[1] Service-Oriented Architecture
Following traditional building architecture, a 'software List of software architecture styles and patterns
architectural style' is a specic method of construc-
Process Driven Messaging Service
tion, characterized by the features that make it notable
(Architectural style). An architectural style denes: a Enterprise architecture
family of systems in terms of a pattern of structural or-
ganization; a vocabulary of components and connectors, Common layers in an information system logical ar-
with constraints on how they can be combined.[4] chitecture
An architectural style is a named collection of architec-
tural design decisions that (1) are applicable in a given 3.4.5 References
development context, (2) constrain architectural design
decisions that are specic to a particular system within [1] R. N. Taylor, N. Medvidovi and E. M. Dashofy, Software
that context, and (3) elicit benecial qualities in each re- architecture: Foundations, Theory and Practice. Wiley,
sulting system.[1] 2009.
Some treat architectural patterns and architectural styles [2] Chang, Chih-Hung; Lu, Chih-Wei; Lin, Chih-Hao; Yang,
as the same,[5] some treat styles as specializations of pat- Ming-Feng; Tsai, Ching-Fu (June 2008). An Experience
terns. What they have in common is both patterns and of Applying Pattern-based Software Framework to Im-
styles are idioms for architects to use, they provide a prove the Quality of Software Development: 4. The De-
common language[5] or vocabulary[4] with which to sign and Implementation of OS2F. Journal of Software
describe classes of systems. Engineering Studies, Vol. 2, No. 6. the Third Taiwan Con-
ference on Software Engineering (TCSE07). pp. 185
The main dierence is that a pattern can be seen as a so- 194. Retrieved 2012-05-16. Furthermore, patterns are
lution to a problem, while a style is more general and does often dened as something strictly described and com-
not require a problem to solve for its appearance. monly available. For example, layered architecture is a
call-and-return style, when it denes an overall style to in-
teract.
3.4.3 Examples [3] Architectural Patterns: Denition. AAHN IN-
FOTECH (INDIA) PVT. LTD. Retrieved 2012-05-16.
Here is a list of architecture patterns, and corresponding Even though an architectural pattern conveys an image of
design patterns and solution patterns. a system, it is not an architecture as such. An architec-
Some additional examples of architectural patterns: tural pattern is rather a concept that solves and delineates
some essential cohesive elements of a software architec-
ture. Countless dierent architectures may implement the
Blackboard system same pattern and thereby share the related characteris-
tics. Furthermore, patterns are often dened as something
Broker pattern strictly described and commonly available.
Service-oriented architecture
Chapter 4
Frameworks
4.1 Enterprise Architecture frame- the scale and complexity of this system, an architectural
framework provides tools and approaches that help ar-
work chitects abstract from the level of detail at which builders
work, to bring enterprise design tasks into focus and pro-
duce valuable architecture description documentation.
The components of an architecture framework pro-
vide structured guidance that is divided into three main
areas:[4]
15
16 CHAPTER 4. FRAMEWORKS
of a sound and integrated IT architecture for the execu- ness principles, business goals, and strategic drivers of the
tive agency. organization are dened elsewhere.[7] In other words, En-
By 1997, Zachman had renamed and refocused his ISA terprise Architecture is not a business strategy, planning
framework as an EA framework; it remained a classi- or management methodology. Enterprise Architecture
cation scheme for descriptive artifacts, not a process for strives to align business information systems technology
planning systems or changes to systems. with given business strategy, goals and drivers. The TO-
GAF 9.1 specication claried, that, A complete enter-
In 1998, The Federal CIO Council began developing prise architecture description should contain all four ar-
the Federal Enterprise Architecture Framework (FEAF) chitecture domains (business, data, application, technol-
in accordance with the priorities enunciated in Clinger- ogy), but the realities of resource and time constraints of-
Cohen and issued it in 1999. FEAF was a process much ten mean there is not enough time, funding, or resources
like TOGAFs ADM, in which The architecture team to build a top-down, all-inclusive architecture description
generates a sequencing plan for the transition of systems, encompassing all four architecture domains, even if the
applications, and associated business practices predicated enterprise scope is [...] less than the full extent of the
upon a detailed gap analysis [between baseline and target overall enterprise.[16]
architectures].
In 2013, TOGAF[17] is the most popular Architecture
In 2001, the US Chief CIO council published A practical framework (judged by published certication numbers)
guide to Federal Enterprise Architecture, which starts, An that some assume it denes EA.[7] However, some still
enterprise architecture (EA) establishes the Agency-wide use the term Enterprise Architecture as a synonym for
roadmap to achieve an Agencys mission through optimal Business Architecture, rather than covering all four archi-
performance of its core business processes within an e- tecture domains - business, data, applications and tech-
cient information technology (IT) environment. At that nology.
point, the processes in TOGAF, FEAF, EAP and BSP
were clearly related.
In 2002/3, in its Enterprise Edition, TOGAF 8 shifted fo-
4.1.3 EA framework topics
cus from the technology architecture layer to the higher
business, data and application layers. It introduced struc-
tured analysis, after Information Engineering, which fea-
tures, for example, mappings of organization units to
business functions and data entities to business functions.
Today, business functions are often called business ca-
pabilities. And many enterprise architects regard their
business function/capability hierarchy/map as the funda-
mental Enterprise Architecture artifact. They relate data
entities, use cases, applications and technologies to the
functions/capabilities.
In 2006, the popular book Enterprise Architecture As
Strategy[14] reported the results of work by MITs Center
for Information System Research. This book emphasises
the need for enterprise architects to focus on core busi-
ness processes (Companies excel because they've [de-
cided] which processes they must execute well, and have
implemented the IT systems to digitise those processes.) Artist impression.[18]
and to engage business managers with the benets that
strategic cross-organisational process integration and/or
standardisation could provide.
Architecture and building governance
A 2008 research project for the development of profes-
sional certicates in enterprise and solution architecture People who remodel a home are aware that the architect
by the British Computer Society (BCS) showed that en- produces detailed drawings that specify plumbing, elec-
terprise architecture has always been inseparable from trical, and building construction information for the en-
information system architecture, which is natural, since tire structure. The architect responsible for the design
business people need information to make decisions and produces (or oversees others who produce) blueprints for
carry out business processes.[7] each phase of the projectfrom structural changes to size
In 2011, the TOGAF 9.1. specication says: Business and layout of rooms. Moreover, to successfully complete
planning at the strategy level provides the initial direc- the project, the architect operates within a framework of
tion to enterprise architecture.[15] Normally, the busi- building codes. City or county inspections ensure the
work complies with building codes.
18 CHAPTER 4. FRAMEWORKS
Data architecture, Each layer delegates work to the layer below. In each
layer, the components, the processes and the services can
Applications architecture, be dened at a coarse-grained level and decomposed into
ner-grained components, processes and services. The
Technology architecture. graphic shows a variation on this theme.
Scenarios
System
& environment
Process Physical
view view
AGATE the France DGA Architecture Frame- SABSA[29] is an open framework and methodol-
work ogy for Enterprise Security Architecture and Ser-
vice Management, that is risk based and focuses on
DNDAF[24] the DND/CF Architecture Frame- integrating security into business and IT manage-
work (CAN) ment.
DoDAF the US Department of Defense Architec-
ture Framework Proprietary frameworks
MODAF the UK Ministry of Defence Architec-
ture Framework ASSIMPLER Framework an architecture frame-
work, based on the work of Mandar Vanarse at
NAF the NATO Architecture Framework Wipro in 2002
4.1. ENTERPRISE ARCHITECTURE FRAMEWORK 21
Avancier Methods (AM)[30] Processes and docu- Historical analysis of EA publications shows that
mentation advice for enterprise and solution archi- EA frameworks are nothing more than typical
tects, supported by training and certication. management fads aggressively promoted by consult-
ing companies and gurus.[34]
BRM (Build-Run-Manage) Framework - an ar-
chitecture framework created by Sanjeev Sunny Research shows that EA frameworks appear theo-
Mishra during his early days at IBM in 2000. retical and impossible to implement.[35]
Capgemini Integrated Architecture Framework Vivek Kundra, the federal CIO of the United
(IAF) from Capgemini company in 1993 States, argued that EA frameworks are worse than
useless.[36]
Dragon1 - An open Visual Enterprise Architecture
Jason Bloomberg reports that EA frameworks only
Method recently recognized by The Open Group as
waste architects time instead of solving real prob-
Architecture Framework
lems. Frameworks are cocaine for executives - they
DYA framework developed by Sogeti since 2004. give them a huge rush and then they move to the next
framework.[37]
Dynamic Enterprise Enterprise architecture concept
based on Web 2.0 technology
4.1.7 See also
Extended Enterprise Architecture Framework -
from Institute For Enterprise Architecture Develop- Architecture patterns (EA reference architecture)
ments in 2003
EABOK (The Guide to the Enterprise Architecture
EACOE Framework an Enterprise Architecture Body of Knowledge)
framework, as an elaboration of the work of John Enterprise architecture
Zachman
Enterprise architecture planning
IBM Information FrameWork (IFW) conceived by
Roger Evernden in 1996 Enterprise engineering
Solution Architecting Mechanism (SAM)[32] A [5] Jaap Schekkerman (2004) How to Survive in the Jungle of
coherent architecture framework consisting of a set Enterprise Architecture Frameworks. p.89 gives a similar
of integral modules.[33] scheme.
[9] John A. Zachman (1987). A Framework for Information [26] Gianni, D., Lindman, N., Fuchs, J., & Suzic, R.
Systems Architecture. In: IBM Systems Journal, vol 26, no (2012). Introducing the european space agency architec-
3. IBM Publication G321-5298. tural framework for space-based systems of systems en-
gineering. In Complex Systems Design & Management
[10] Zachman and Sowa (1992) Extending and formalising the (pp. 335-346). Springer Berlin Heidelberg.
framework of information systems architecture IBM Sys-
tems Journal, Vol 31, No 3 [27] US Department of the Treasury Chief Information Of-
cer Council (2000). Treasury Enterprise Architecture
[11] Svyatoslav Kotusev (2016). The History of Enterprise Ar- Framework. Version 1, July 2000.
chitecture: An Evidence-Based Review. In: Journal of En-
terprise Architecture, vol. 12, no. 1, pp. 29-37. [28] MEGAF
[12] W.B. Rigdon (1989). Architectures and Standards. In In- [29] SABSA
formation Management Directions: The Integration Chal-
lenge (NIST Special Publication 500-167), E.N. Fong, [30] Avancier Methods (AM)
A.H. Goldne (Eds.), Gaithersburg, MD: National Insti-
tute of Standards and Technology (NIST), pp.135-150. [31] Pragmatic EA
[13] Richardson, G.L.; Jackson, B.M.; Dickson, G.W. (1990). [32] Solution Architecting Mechanism (SAM)
A Principles-Based Enterprise Architecture: Lessons [33] Tony Shan and Winnie Hua (2006). Solution Architecting
from Texaco and Star Enterprise. MIS Quarterly. 14 (4): Mechanism. Proceedings of the 10th IEEE International
385403. doi:10.2307/249787. EDOC Enterprise Computing Conference (EDOC 2006),
[14] Jeanne W. Ross, Peter Weill, and David C. Robertson October 2006, p23-32.
( (2006) Enterprise Architecture As Strategy: Creating a
[34] Enterprise Architecture Frameworks: The Fad of the
Foundation for Business Execution. Harvard Business Re-
Century, Svyatoslav Kotusev, British Computer Society
view Press
(BCS), July 2016
[15] The Open Group (2011) TOGAF 9.1 > Part II: Archi-
[35] Sabine Buckl, Alexander Ernst, Josef Lankes and Chris-
tecture Development Method (ADM) > Preliminary Phase.
tian Schweda (2009). State of the Art in Enterprise Archi-
Accessed July 16, 2013
tecture Management. Software Engineering for Business
[16] The Open Group (2011) TOGAF 9.1 > Part II: Archi- Information Systems (SEBIS), Munich, Germany, pp. 1-
tecture Development Method (ADM) > Introduction to the 31.
ADM. Accessed July 16, 2013
[36] Two IT Gurus Face O on Value of Enterprise Architec-
[17] TOGAF 9.1 White Paper An Introduction to TOGAF ture Frameworks, Linda Tucci, visited 3 August 2016
Version 9.1 http://www.opengroup.org/togaf/
[37] Is Enterprise Architecture Completely Broken?", Jason
[18] Rob Thomas and Phil Cullen (2001). Building an En- Bloomberg, visited 3 August 2016
terprise Architecture framework. In: US Customs Today
April 2001.
4.1.9 External links
[19] Niles E Hewlett (2006) , The USDA Enterprise Architec-
ture Program. PMP CEA, Enterprise Architecture Team, Enterprise Architecture Frameworks: The Fad of
USDA-OCIO. January 25, 2006.
the Century (July 2016)
[20] FEA Consolidated Reference Model Document. white-
house.gov May 2005.
[24] DNDAF
5.1 Enterprise Architecture Body Enterprise architecture practitioners should be aware that
the discipline has evolved since the most recent publica-
of Knowledge tion: perhaps the most notable being the extensions of
DODAF, including MODAF, and the work at the Object
The Enterprise Architecture Body of Knowledge Management Group to create a model that satises both
(EABOK) is a guide to Enterprise Architecture pro- frameworks.
duced by MITRE's Center for Innovative Computing
and Informatics, and is substantially funded by US
government agencies. It provides a critical review 5.1.2 Perspective
of enterprise architecture issues in the context of the
needs of an organization. Because it provides a "big EABOK (and the discipline it describes) is evolving (and
[1][2]
picture" view of needs and methods, some enterprise partially incomplete). It places enterprise architec-
architecture practitioners recommend it as starting point ture in context. Because there are so many dierent
for a business establishing an enterprise architecture frameworks and viewpoints about enterprise architecture,
unit. it provides a critique of alternatives (such as between the
original Zachman Framework, TOGAF and DODAF).
The bibliographies are particularly useful.
23
24 CHAPTER 5. OPEN SOURCE OR CONSORTIA-DEVELOPED FRAMEWORKS
Generalised Enterprise Reference Architecture and The building blocks where designed to support the mod-
Methodology (GERAM) is a generalised enterprise elling process by providing means for more ecient
architecture framework for enterprise integration and modelling.[1]
business process engineering. It identies the set of com-
ponents recommended for use in enterprise engineer- The resulting enterprise model (EM) represents all or part
ing.[1] of the enterprise operation. These models will allow sim-
ulation of operational alternatives and thereby their evalu-
This framework was developed in the 1990s by a joint ation leading. GERAM provides a generic description of
task force of both the International Federation of Au- all the elements recommended in enterprise engineering
tomatic Control (IFAC) and the International Federa- and integration.
tion of Information Processing (FIP]) on enterprise ar-
chitectures for enterprise integration. The development Generalised Enterprise Reference Architecture and
started with the evaluation of then-existing frameworks Methodology (GERAM) is an enterprise-reference archi-
for enterprise application integration, which was devel- tecture that models the whole life history of an enterprise
oped into an overall denition of a so-called generalised integration project from its initial concept in the eyes of
architecture.[2] the entrepreneurs who initially developed it, through its
denition, functional design or specication, detailed de-
sign, physical implementation or construction, and nally
5.2.1 Overview operation to obsolescence. The architecture aims to be
a relatively simple framework upon which all the func-
One of the basics of GERAM is that enterprise modelling tions and activities involved in the aforementioned phases
was seen as the major issue in enterprise engineering of the life of the enterprise-integration project can be
5.2. GENERALISED ENTERPRISE REFERENCE ARCHITECTURE AND METHODOLOGY 25
mapped. It also will permit the tools used by the investi- enterprise modeling adapted to the dierent needs
gators or practitioners at each phase to be indicated. The of people creating and using enterprise models.
architecture dened will apply to projects, products, and
processes; as well as to enterprises.[3] Generic Enterprise Modeling Tools (GEMT): De-
ne the generic implementation of enterprise-
integration methodologies and modeling languages
5.2.2 History and other support for creation and use of enterprise
models.
Generalised Enterprise Reference Architecture and
Enterprise Models (EM): Represents the enterprise
Methodology (GERAM) was developed in the 1990s by
operation. These models will be represented using
an IFAC/IFIP Task Force on Architectures for Enterprise
generic modeling language constructs.
Integration, which consisted of Peter Bernus, James G.
Nell and others. The IFAC/IFIP Task Force on Archi- Ontological Theories (OT): Formalise the most
tectures for Enterprise Integration was establishment in generic aspects of enterprise-related concepts in
1990 and had studied enterprise-reference architectures terms of essential properties and axioms.
ever since.[3]
Generic Enterprise Models (GEMs): Identify refer-
The task force established the requirements to be satised
ence models (partial models) which capture con-
by candidate enterprise-reference architectures and their
cepts common to many enterprises. GEMs will be
associated methodologies to fulll the needs of industry
used in enterprise modeling to increase modeling
for such aids to enterprise integration. The result has been
process eciency.
called GERAM, for Generalized Enterprise-Reference
Architecture and Methodology, by the Task Force. The Generic Modules (GMs): Identify generally applica-
Task Force has shown that such an architecture is feasi- ble products to be employed in enterprise integra-
ble and that several architectures presently available in tion (e.g. tools, integrating infrastructures, others.).
the literature can already or potentially can full such
requirements.[3]
Generic Enterprise Reference Architecture
The development of enterprise-reference architecture has
evolved from the development of Design Methodology
Generic Enterprise Reference Architecture (GERA) de-
for Advanced Manufacturing Systems in the 1980s,[4]
nes the enterprise related generic concepts recom-
such as CIMOSA, the Open System Architecture for
mended for use in enterprise integration projects. These
CIM.[5][6] The GERAM framework was rst published
concepts include life cycle; enterprise entity types,
by Peter Bernus and Laszlo Nemes in 1994.[2]
enterprise modelling with business process modelling; in-
tegrated model representation in dierent model views
and modelling languages for dierent users of the
5.2.3 Topics
enterprise architecture (business users, system designers,
IT modelling specialists, among others).[1]
Components
The eight main components, as shown in gure 1 are: Life-Cycle Concept Provides for the identication of
the life-cycle phases for any enterprise entity from entity
Generic Enterprise Reference Architecture (GERA): conception to its nal end. The Figure 2: GERA Life-
Denes the enterprise related generic concepts rec- Cycle Concept, shows the GERA life cycle phases of en-
ommended for use in enterprise integration projects. terprise entities. A total of 9 life cycle phases has been
These concepts include enterprise systems life cycle; dened.
business process modeling; modeling languages for
dierent users of the architecture (business users, Identication phase allows the identication of the
system designers, IT modeling specialists, others); enterprise business or any part of it in terms of its re-
integrated model representation in dierent model lation to both its internal and external environment.
views. This includes the denition general commitments of
the integration or engineering activities to be carried
Generic Enterprise Engineering Methodologies out in relevant projects.
(GEEM): Describe the generic processes of enter-
prise integration. These methodologies may be Concept phase provides for the presentation of the
described in terms of process models with detailed management visions, missions, values, operational
instruction for each step of the integration process. concepts (build/buy, etc.), policies, plus others.
Generic Enterprise Modeling Languages (GEML): Requirement phase allows the description of opera-
Dene the generic constructs (building blocks) for tional processes and collection of all their functional,
26 CHAPTER 5. OPEN SOURCE OR CONSORTIA-DEVELOPED FRAMEWORKS
Fig 2. GERA Life-Cycle Concept. Enterprise Entity Type Concept Identies entity
types to be used in enterprise engineering and enterprise
integration. Adopting a recursive view of integration al-
behavioural, informational and capability require- together ve entity types with their associated life-cycles
ments. can be identied. The recursiveness of the rst four en-
Design phase is the specication of operational sys- tity types can be demonstrated by identifying the role of
tem with all its components satisfying the above re- the dierent entities, their products and the relations be-
quirements. Process and resources alternatives may tween them. Figure 3: GERA Enterprise Entity Concept,
be specied which provide operational alternatives shows the GERA life cycle phases of enterprise entities.
to be used during the operation. A total of 9 life cycle phases has been dened.
Implementation phase describes the real operational Strategic Enterprise Management Entity (type 1):
system which may deviate from the designed system denes the necessity and the starting of any enter-
due to enterprise preferences or availability of com- prise engineering eort.
ponents.
Enterprise Engineering/Integration Entity (type 2):
Build phase supports the system manifestation,
provides the means to carry out the enterprise entity
physical implementation of resources, testing and
type 1. It employs methodologies (type 5 entity) to
validation for the designed processes and the sub-
dene, design, implement and build the operation of
sequent release for operation.
the enterprise entity (type 3 entity).
Operation phase employs the released operational
processes and the provided resources to support the Enterprise Entity (type 3): is the result of the oper-
life cycle phases of the enterprise products. ation of entity type 2. It uses methodologies (entity
type 5) and the operational system provided by en-
System Change/Re-Engineering phase allows to tity type 2 to dene, design, implement and build the
modify or re-engineer the operational processes ac- products (services) of the enterprise (type 4 entity).
5.2. GENERALISED ENTERPRISE REFERENCE ARCHITECTURE AND METHODOLOGY 27
Enterprise Modelling concept Enterprise Modelling Modelling Language concept Modelling languages
concept provides process models of enterprise opera- increase the eciency of enterprise modelling. In ad-
tions. Process oriented modelling allows to represent dition they allow a common representation of the enter-
28 CHAPTER 5. OPEN SOURCE OR CONSORTIA-DEVELOPED FRAMEWORKS
prise operation. Modelling languages have to accommo- and should support the dierent life cycle phases shown
date dierent users of enterprise models; for example, in Figure 2. The enterprise integration process itself
business users, system designers, and IT-modelling spe- is usually directed towards the enterprise entity type 3
cialists. (see above) operation and carried out as an enterprise
Modelling languages have to support the modelling of all engineering task by an enterprise entity type 2 (Figures
entity types across all phases of their respective life cy- 2 and 4). The integration task may start at any relevant
cles. In addition, modelling languages have to provide engineering phase (indicated in Figure 6: Enterprise
generic constructs as well as macro constructs (GEMs) Engineering and the Life-Cycle Concept.) of the entity
life cycle and may employ any of those phases. There-
built from generic ones. The latter will further enhance
modelling productivity. fore, the processes relating to the dierent phases of
enterprise engineering should be independent of each
Figure 5 shows the reference architecture for those enter- other to support dierent sequences of engineering
prise entity life cycle phases which require generic con- tasks.
structs. The partial level shows the place of the GEMs in
the reference architecture. The particular level indicates Enterprise engineering methodologies may be described
the life cycle phases of the enterprise entity itself. in terms of process models with detailed instruction for
each step of the integration process. This allows not only
a very good representation of the methodology for its un-
Generic Enterprise Engineering Methodologies derstanding, but provides for identication of informa-
tion to be used and produced, resources needed and rel-
evant responsibilities to be assigned for the integration
process. Process representation of methodologies should
employ the relevant modelling language discussed below.
Ontological theories (OT) formalise the most generic as- [6] AMICE Consortium (1991), Open System Architecture,
CIMOSA, AD 1.0, Architecture Description, ESPRIT Con-
pects of enterprise related concepts in terms of essen-
sortium AMICE, Brussels, Belgium.
tial properties and axioms. Ontological theories may be
considered as 'meta-models' since they consider facts and
rules about the facts and rules of the enterprise and its 5.2.6 Further reading
models.[1]
F.B. Vernadat (1996). Enterprise Modeling and In-
Generic Enterprise Models tegration: Principles and Applications, Chapman
& Hall, London. ISBN 0-412-60550-3
Generic enterprise models (GEMs) identify reference T.J. Williams and Hong Li, A Specication
models (partial models) which capture concepts common and Statement of Requirements for GERAM (The
to many enterprises. GEMs will be used in enterprise Generalised Enterprise Reference Architecture and
modelling to increase modelling process eciency.[1] Methodology) with all Requirements illustrated by
Examples from the Purdue Enterprise Reference Ar-
Generic Modules chitecture and Methodology PERA, REPORT NUM-
BER 159 Purdue Laboratory for Applied Industrial
Generic Modules (GMs) identify generally applicable Control November 1995, Version 1.1
products to be employed in enterprise integration (e.g.
D. Shorter, Editor, An evaluation of CIM mod-
tools, integrating infrastructures, others.).[1]
elling constructs - Evaluation report of constructs for
views according to ENV 40 003, In: Computers in
5.2.4 See also Industry - Vol. 24, Nrs 2-3
ENV 40 003 Computer Integrated Manufacturing - 5.3.1 The Need for Architecture Interop-
Systems Architecture - Framework for Enterprise erability
Modelling CEN/CENELEC, 1990
The need for IDEAS was identied in 2005 by the Aus-
ENV 12 204 Advanced Manufacturing Technology tralian, Canadian, UK & US defence departments. The
- Systems Architecture - Constructs for Enterprise main purpose of IDEAS is to support coalition military
Modelling CEN TC 310/WG1, 1995 operations planning. The ability to exchange architec-
tures between countries enables better understanding of
Charles J. Petrie, Jr (1992). Enterprise Integration each others capabilities, communications mechanisms
Modelling; ICEIMT Conference Proceedings, The and standard procedures.
MIT Press. ISBN 0-262-66080-6
5.3.4 Implementation
5.4 RM-ODP
To date, there have been three IDEAS implementations:
Reference Model of Open Distributed Processing
IDEAS Ontology Development Plug-in for Sparx (RM-ODP) is a reference model in computer science,
Systems - Enterprise Architect. The Beta test which provides a co-ordinating framework for the stan-
version can be downloaded from http://www. dardization of open distributed processing (ODP). It
modelfutures.com/software/ supports distribution, interworking, platform and tech-
nology independence, and portability, together with an
An OV-5 export interface for Telelogic System Ar-
enterprise architecture framework for the specication of
chitect. The interface was developed by Silver Bul-
ODP systems.
let inc. under contract to the DoD
An OV-5 import/export interface for Sparx En-
terprise Architect developed by Model Futures for
MOD (under sub-contract to Serco Consulting)
The MOD Ontology Demonstrator - used
the IDEAS model to demonstrate a sim-
ple geopolitical ontology. It can be down-
loaded from http://www.modaf.com/News/69/
mod-ontology-demonstrator-released
The UK MOD AV-2 demonstrator - implemented
a shared ontology based on IDEAS that is used to
populate AV-2 in MODAF
The RM-ODP view model, which provides ve generic and com-
plementary viewpoints on the system and its environment.
5.3.5 IDEAS Publications & Presentations
RM-ODP, also named ITU-T Rec. X.901-X.904
The IDEAS work has been presented at a number of and ISO/IEC 10746, is a joint eort by the
conferences.[1][2]
It has also been cited in a Cutter Con- International Organization for Standardization (ISO), the
[3]
sortium white paper and in a book on Systems Engi- International Electrotechnical Commission (IEC) and
neering from Springer Verlag[4] the Telecommunication Standardization Sector (ITU-T)
.[1]
5.3.6 Notes
5.4.1 Overview
[1] Bailey, Ian; Partridge, Chris. Working with Extensional
Ontology for Defence Applications. Ontology in Intelli- The RM-ODP is a reference model based on precise
gence Conference, 2009, GMU, Fairfax, VA concepts derived from current distributed processing
32 CHAPTER 5. OPEN SOURCE OR CONSORTIA-DEVELOPED FRAMEWORKS
developments and, as far as possible, on the use of 2. Foundations:[7] Contains the denition of the con-
formal description techniques for specication of the cepts and analytical framework for normalized de-
architecture. Many RM-ODP concepts, possibly under scription of (arbitrary) distributed processing sys-
dierent names, have been around for a long time and tems. It introduces the principles of conformance
have been rigorously described and explained in exact to ODP standards and the way in which they are ap-
philosophy (for example, in the works of Mario Bunge) plied. In only 18 pages, this standard sets the basics
and in systems thinking (for example, in the works of of the whole model in a clear, precise and concise
Friedrich Hayek). Some of these conceptssuch as way.
abstraction, composition, and emergencehave recently
3. Architecture:[8] Contains the specication of the re-
been provided with a solid mathematical foundation in
quired characteristics that qualify distributed pro-
category theory.
cessing as open. These are the constraints to which
RM-ODP has four fundamental elements: ODP standards must conform. This recommenda-
tion also denes RM-ODP viewpoints, subdivisions
an object modelling approach to system specica- of the specication of a whole system, established to
tion; bring together those particular pieces of information
the specication of a system in terms of separate but relevant to some particular area of concern.
interrelated viewpoint specications; 4. Architectural Semantics:[9] Contains a formalization
the denition of a system infrastructure providing of the ODP modeling concepts by interpreting many
distribution transparencies for system applications; concepts in terms of the constructs of the dierent
and standardized formal description techniques.
sistency among the viewpoints is ensured by the architec- exibility. However, this makes more dicult, among
ture dened by RM-ODP, and the use of a common ob- other things, the development of industrial tools for mod-
ject model provides the glue that binds them all together. eling the viewpoint specications, the formal analysis of
More specically, the RM-ODP framework provides ve the specications produced, and the possible derivation
generic and complementary viewpoints on the system and of implementations from the system specications.
its environment: In order to address these issues, ISO/IEC and the
ITU-T started a joint project in 2004: ITU-T Rec.
The enterprise viewpoint, which focuses on the pur- X.906|ISO/IEC 19793: Information technology - Open
pose, scope and policies for the system. It describes distributed processing - Use of UML for ODP system
the business requirements and how to meet them. specications. This document (usually referred to as
UML4ODP) denes use of the Unied Modeling Lan-
The information viewpoint, which focuses on the guage 2 (UML 2; ISO/IEC 19505), for expressing the
semantics of the information and the information specications of open distributed systems in terms of the
processing performed. It describes the information viewpoint specications dened by the RM-ODP.
managed by the system and the structure and content
It denes a set of UML Proles, one for each viewpoint
type of the supporting data.
language and one to express the correspondences be-
The computational viewpoint, which enables distri- tween viewpoints, and an approach for structuring them
bution through functional decomposition on the sys- according to the RM-ODP principles. The purpose of
tem into objects which interact at interfaces. It de- UML4ODP to allow ODP modelers to use the UML
scribes the functionality provided by the system and notation for expressing their ODP specications in a stan-
its functional decomposition. dard graphical way; to allow UML modelers to use the
RM-ODP concepts and mechanisms to structure their
The engineering viewpoint, which focuses on the large UML system specications according to a mature
mechanisms and functions required to support dis- and standard proposal; and to allow UML tools to be used
tributed interactions between objects in the system. to process viewpoint specications, thus facilitating the
It describes the distribution of processing performed software design process and the enterprise architecture
by the system to manage the information and pro- specication of large software systems.
vide the functionality.
In addition, ITU-T Rec. X.906 | ISO/IEC 19793 en-
The technology viewpoint, which focuses on the ables the seamless integration of the RM-ODP enterprise
choice of technology of the system. It describes the architecture framework with the Model-Driven Archi-
technologies chosen to provide the processing, func- tecture (MDA) initiative from the OMG, and with the
tionality and presentation of information. service-oriented architecture (SOA).
Currently there is growing interest in the use of UML for In addition, there are several projects that have used or
system modelling. However, there is no widely agreed currently use RM-ODP for eectively structuring their
approach to the structuring of such specications. This systems specications:
adds to the cost of adopting the use of UML for system
specication, hampers communication between system The COMBINE project[10]
developers and makes it dicult to relate or merge sys-
tem specications where there is a need to integrate IT The ENVRI and ENVRIplus projects for common
systems. operations of environmental research infrastructures
are developing the ENVRI Reference Model[11]
Although the ODP reference model provides abstract lan-
guages for the relevant concepts, it does not prescribe par- The Reference Architecture for Space Data Systems
ticular notations to be used in the individual viewpoints. (RASDS)[12] From the Consultative Committee for
The viewpoint languages dened in the reference model Space Data Systems.
are abstract languages in the sense that they dene what
concepts should be used, not how they should be repre- Interoperability Technology Association for Infor-
sented. This lack of precise notations for expressing the mation Processing (INTAP), Japan.[13]
dierent models involved in a multi-viewpoint specica-
tion of a system is a common feature for most enterprise The Synapses European project.[14]
architectural approaches, including the Zachman Frame-
work, the "4+1" model, or the RM-ODP. These ap- A 239-item reference list covering RM-ODP standards as
proaches were consciously dened in a notation- and well as related research, applications and case studies was
representation-neutral manner to increase their use and included in [15]
34 CHAPTER 5. OPEN SOURCE OR CONSORTIA-DEVELOPED FRAMEWORKS
5.4.6 See also [5] Some resources related to the current version of | ITU-T
X.906 | ISO/IEC 19793 Use of UML for ODP systems
Enterprise Architecture framework specications are also available from the RM-ODP re-
source site. They include the UML Proles of the ve
Enterprise Collaboration Architecture ODP viewpoints, the viewpoint metamodels, the GIF les
for the ODP-specic icons, etc.
Enterprise Modelling Methodology/Open Dis-
tributed Processing (EMM/ODP) [6] ISO/IEC 10746-1 | ITU-T Rec. X.901
Reference model
[7] ISO/IEC 10746-2 | ITU-T Rec. X.902
Triune Continuum Paradigm
[8] ISO/IEC 10746-3 | ITU-T Rec. X.903
View model
[9] ISO/IEC 10746-4 | ITU-T Rec. X.904
ISO/IEC JTC 1/SC 7
[10] COMBINE
5.4.7 Notes and references
[11] ENVRI Reference Model
[1] A complete and updated list of references to publications
related to RM-ODP (books, journal articles, conference [12] Reference Architecture for Space Data Systems (RASDS)
papers, etc.) is available at the RM-ODP resource site.
[13] Interoperability Technology Association for Information
[2] In the same series as the RM-ODP are a number of other Processing (INTAP)
standards and recommendations for the specication and
development of open and distributed system, for which
[14] The Synapses Project: a three-year project funded under
RM-ODP provides a standardization framework:
the EU 4th Framework Health Telematics Programme
ITU-T Rec. X.950 | ISO/IEC 13235-1:1998, Trad-
ing function: Specication. [15] Kilov, H., Linington, P.F., Romero, J.R., Tanaka, A., Val-
lecillo, A.: The reference model of open distributed pro-
ITU-T Rec. X.952 | ISO/IEC 13235-3:1998, Pro-
cessing: foundations, experience and applications. Com-
vision of Trading Function using OSI directory ser-
put. Stand. Interfaces 35, 247256 (2013)
vice.
ITU-T Rec. X.920 | ISO/IEC 14750:1999, Inter-
face Denition Language.
5.4.8 External links
ITU-T Rec. X.931 | ISO/IEC 14752:2000, Proto-
col support for computational interactions.
RM-ODP Resource site
ITU-T Rec. X.930 | ISO/IEC 14753:1999, Inter-
face references and binding.
Open Distributed Processing - Reference Model
ITU-T Rec. X.960 | ISO/IEC 14769:2001, Type
repository function.
RM-ODP information at LAMS, Swiss Federal In-
ITU-T Rec. X.910 | ISO/IEC 14771:1999, Naming stitute of Technology, Lausanne (EPFL), Switzer-
framework. land.
ITU-T Rec. X.911 | ISO/IEC 15414:2002,
Reference model - Enterprise language. Ocial Record of the ANSA project
ISO/IEC 19500-2:2003, General Inter-ORB Proto-
col (GIOP)/Internet Inter-ORB Protocol (IIOP). Computing Laboratory, University of Kent, Canter-
bury UK.
[3] Copies of the RM-ODP family of standards can be ob-
tained either from ISO or from ITU-T. Parts 1 to 4 of
the RM-ODP are available for from free download from FORMOSA (Formalisation of ODP Systems Archi-
ISO. All ODP-related ITU-T Recommendations, includ- tecture), University of Stirling, UK.
ing X.9xx series, are freely available from the ITU-T.
Distributed and Cooperative Systems, UMPC,
[4] There is also a very useful hyperlinked version of Parts Paris, France.
2 and 3 of the RM-ODP, together with an index to the
Reference Model, made available in keeping with a res-
olution of the ISO council. The Table of Contents and ILR, Networks and ComputerScience Department
Index were prepared by Lovelace Computing and are be- of ENST, Paris France.
ing made available by Lovelace Computing as a service to
the standards community. Distributed Systems Technology Center, Australia.
5.5. THE OPEN GROUP ARCHITECTURE FRAMEWORK 35
The Open Group Architecture Framework (TOGAF) Business architecture which denes the business
is a framework for enterprise architecture that pro- strategy, governance, organization, and key business
vides an approach for designing, planning, implement- processes of the organization
ing, and governing an enterprise information technology
architecture.[2] TOGAF is a high level approach to design. Applications architecture which provides a blueprint
It is typically modeled at four levels: Business, Applica- for the individual systems to be deployed, the inter-
tion, Data, and Technology. It relies heavily on modu- actions between the application systems, and their
larization, standardization, and already existing, proven relationships to the core business processes of the
technologies and products. organization with the frameworks for services to be
TOGAF has been developed starting 1995 by The exposed as business functions for integration
Open Group, based on DoD's TAFIM. As of 2016, Data architecture which describes the structure of
The Open Group reports that TOGAF is employed by an organizations logical and physical data assets and
80% of Global 50 companies and 60% of Fortune 500 the associated data management resources
companies.[3]
Technical architecture, or technology architecture,
which describes the hardware, software, and net-
5.5.1 Overview work infrastructure needed to support the deploy-
ment of core, mission-critical applications
An architecture framework is a set of tools which
can be used for developing a broad range of dierent
architectures.[4] It should: Architecture Development Method
The process is iterative and cyclic. Each step checks with Gaining TOGAF Certied status automatically confers
Requirements. Phase C involves some combination of free membership of the Association of Enterprise Archi-
both Data Architecture and Applications Architecture. tects.[9]
Additional clarity can be added between steps B and C
in order to provide a complete information architecture.
History
Performance engineering working practices are applied
to the Requirements phase, and to the Business Architec-
ture, Information System Architecture, and Technology
architecture phases. Within Information System Archi-
tecture, it is applied to both the Data Architecture and
Application Architecture.
Enterprise Continuum
The Open Group has a certication program for TOGAF In December 2001 [12]
TOGAF 7, the Technical Edition,
9 Tools. For the latest register of certied tools see The was published. TOGAF 8 (Enterprise Edition) was
Open Group register.[7] rst published in December 2002 and republished in up-
dated form as TOGAF 8.1 in December 2003. Around
2005 TOGAFTM became a registered trademark of The
Qualications Open Group.[13] In November 2006 the Open Group re-
leased TOGAF 8.1.1. According to The Open Group, as
of February 2011, over 15,000 individuals are TOGAF
The Open Group oversees formal qualications in TO-
Certied.[14] As of September 2012 the ocial register
GAF at two levels, which can be taken following formal
has over 20,000 certied individuals.
training or self-study.[8]
An evolutionary development from TOGAF 8, TOGAF
9 includes many new features including:[15][16]
Foundation (Level I) Ensures that an individual under-
stands Enterprise Architecture along with core concepts Increased rigor, including a formal Content Meta-
and terminology of TOGAF.[8] model that links the artifacts of TOGAF to-
gether (although there are some problems with the
Metamodel)[17]
Certied (Level II) Further to the Foundation quali-
cation, this establishes that the candidate is able to analyse Architecture repository and the Enterprise Contin-
and apply their knowledge to business problems.[8] uum
5.5. THE OPEN GROUP ARCHITECTURE FRAMEWORK 37
Elimination of unnecessary dierences, and many [2] Dirk Draheim, Gerald Weber eds. (2007) Trends in Enter-
more examples and templates prise Application Architecture: 2nd International Confer-
ence, TEAA 2006, Berlin, Germany, November 29 - De-
Additional guidelines and techniques include: cember 1, 2006, Revised Selected Papers. p. 260
Guidance on how to use TOGAF to develop Security [5] The process ow can be seen as an image located here:
Architectures and SOA Architecture Development Cycle
Real examples demonstrating the actual practical [15] Whats New in TOGAF 9?". The Open Group. 2009.
Retrieved 13 January 2017.
usage of TOGAFs recommendations are missing.
There is a pressing need for some detailed worked [16] Veryard, Richard (2009). TOGAF 9. Retrieved 13 Jan-
examples and use cases. Although these were re- uary 2017.
quested, they were not forthcoming from TOGAF
[17] Gerber A; Van der Merwe, A; Kotze, P: 2010. Towards
trainers or The Open Group[22]
the Formalisation of the TOGAF Content Metamodel us-
EA practitioners report that TOGAF can hardly ing Ontologies. To appear in: Proceedings of The 12th
be followed step-by-step. Our initial assumptions International Conference on Enterprise Information Sys-
about TOGAF were that it would be a sort of tems (ICEIS 2010). INSTICC
'methodology' that we could follow to produce our [18] TOGAF 9.1 White Paper An Introduction to TOGAF
EA, however this turned out not to be the case[22] Version 9.1 http://www.opengroup.org/togaf/
TOGAFs prescriptions are vague and inarticulate [19] The Open Group (2011). TOGAF Version 9 - Down-
since it only states that the ADM should be adapted load. Architecture Forum. Retrieved on 2011-11-
without specifying how[23] 17 from http://www.opengroup.org/architecture/togaf9/
downloads.htm.
Jason Bloomberg argues that for many organiza-
tions, TOGAF has gained traction simply because [20] Enterprise architecture is not TOGAF, Kotusev, S., Jan-
its better than doing nothing[24] uary 2016
Commercial frameworks
39
40 CHAPTER 6. COMMERCIAL FRAMEWORKS
6.2.2 The Origins of OBASHI of the plant. These models derive real-time input from
digital sensors attached to physical equipment through-
The OBASHI framework was invented by Fergus out the manufacturing process and are built to understand
Cloughley and Paul Wallis of Stroma Software Ltd. dur- the contextual relationship between the assets and process
ing late 2001, following their collaboration on a project ow.
to help plant managers visualise and understand how and By linking the model to the commodities markets the
why IT assets supported business services within British real costs/values of ow can be displayed, monitored and
Petroleum, Grangemouth, Scotland. trended as dollars per second, enabling the transposition
The subsequent OBASHI methodology was born out of from tonnes per hour. In turn, this enables business pro-
the need for business professionals to easily understand cesses to be optimised around value, and each assets con-
the dollar per second value of dataow that supports their tribution to the cost/value of the ow be evaluated in -
business services in a simple and meaningful way so ac- nancial terms.
curate and better informed operational and strategic de-
cisions could be made.
Data ows in the modern business
Cloughley and Wallis recognized that by developing a
methodology around the OBASHI framework, the exist- The contextual understanding of the relationships be-
ing methods for costing and valuing the ow of data in tween physical assets and ows is used within OBASHI
the Oil & Gas / Process Control industry could be made to model the ow of data between business services and
universally applicable to ows of data in all sectors. IT equipment.
The methodology entails capturing, documenting, model- Within the OBASHI methodology, business resources
ing, analysing, simulating and optimizing the cost / value and IT assets are regarded as either providers of data, con-
of the ow of data between assets and business resources. sumers of data, or provide the conduit through which the
data can ow.
DCS - CAD in Process control People provide and consume data daily, as do applica-
tions and systems. Hardware and cables act as conduits
The Oil & Gas, Chemical, Pharmaceutical, Power Gener- through which data ows: between desks, through oce
ation, Water, Food and Beverage, Cement, Steelmaking and corporate networks, across the internet, through deep
and Paper industries have relied on Distributed Control sea cables and via satellites.
Systems (DCS) to manage and control their Manufactur- Across all businesses, the equivalents of the pipes, valves,
ing and Process Control systems. pumps, meters and sensors of the oil and gas industry are
The ow of data for I/O control purposes is fundamen- the people, hubs, cables, routers, servers, and desktops
tal to the safe and ecient function of plant operations. through which data ows.
A clear and concise understanding of the cause and ef- By utilising comparable contextual relationships the
fect of this data ow is a prerequisite to plant operations, OBASHI methodology enables dataow to be analysed in
business optimization and Health and Safety governance. a similar manner to that of process ow within the man-
This clear and concise understanding is supported by a ufacturing industry, which is central to business perfor-
rigorous approach to documentation, namely: Computer mance optimisation.
Aided Design (CAD) diagrams & models; Piping and
Instrumentation diagrams (P&IDs); Process Flow Dia-
grams (PFDs); and Cause and Eect diagrams.
6.2.3 Characteristics
Many other add-on technologies can be linked to the The OBASHI Methodology models the enterprise/an
ows of plant data to support and optimise the plant run- organisation in six horizontal layers. The layers provide
ning conditions, for example: Chemical Process model- a framework (the OBASHI framework) for organising
ing, Computer simulation, Process optimization and plant individual elements that represent individual Business or
maintenance management systems. IT assets and resources. The layers are:
The OBASHI Framework and methodology were de-
veloped to mimic this rigorous approach and provide con- Ownership
textual documentation to support safe and ecient IT & Business Process
Business operational practices.
Application
Placing the elements above or below each other within the Ownership Layer The Ownership Layer contains ele-
framework signies a relationship between the elements. ments representing the person(s) or group(s) that owns,
For example, placing an Owner element above a Business or is responsible for, business processes portrayed in the
Process element signies that the business processes be- Business Layer. Ownership elements can be positioned
longs to that owner. Placing a business function above an beneath other ownership elements to create a hierarchy of
application signies that the process uses that application owners. Example owners could be: Accountancy, Plan-
etc... ning Manager, Logistics, New York, Purchasing Ocer
Elements can be connected on the diagram to denote a and Environmental Health.
physical relationship, such as the connection between a
hardware element and an infrastructure element. De-
pendencies can also be documented on the diagram
to show explicit non-obvious relationships between ele-
ments, such as the reliance of a business process on a third
party resource.
Each element can be referenced to supporting documen-
tation to provide a supporting context for that element.
The ow of data (dataows) can be superimposed on the
diagrams to depict a sequence of elements required to
support a business service.
The combination of one or more OBASHI diagrams form
a contextual model for analysis. Business Layer The Business Layer contains elements
representing the business processes or functions that are
being used by the Owner(s). These elements are posi-
The OBASHI Framework tioned under their appropriate Owner. Examples could
be: Monthly Balance, Sales Transactions, Tank Stock
These Layers provide the framework for organising the Management, Production Data and Capture Budgeting.
elements that represent individual Business or IT assets /
resources.
The six layers are:
Ownership
Business Process
Application
System
Hardware
Application Layer The Application Layer contains el-
ements representing software applications. These are po-
Infrastructure
sitioned beneath the business processes that utilise them.
Examples could include: Excel, Oracle, Sage, SAP and
They are collectively known as OBASHI PeopleSoft.
42 CHAPTER 6. COMMERCIAL FRAMEWORKS
System Layer The System Layer contains elements resources and dataows in an easy-to-understand visual
representing the operating systems on which the appli- format.
cations run. These elements are positioned beneath the Through the use of a tool which supports the OBASHI
appropriate applications. Examples could be: Windows Framework a repository of elements and relationships can
XP, Unix, Solaris, Linux and Vista. be established. By using a graphical interface to create the
B&IT diagrams the tool can build an interactive model of
these relationships, with the B&IT diagram acting as a
dynamic interface.
B&IT Diagrams Behind each element information can be stored within the
repository: business, nancial and/or technical. This data
The OBASHI framework is used to create Business and may be captured manually, or automatically from data
IT (B&IT) diagrams. A B&IT diagram is a diagrammatic held within existing systems. This information can then
representation of the logical and physical relationships be viewed, manipulated and analysed within its business
(connectivity) between an organisations IT assets and re- context.
sources and the business operations which they support.
A B&IT diagram is made up of elements. Individual el-
ements represent individual business and IT assets and Rules
resources.
By employing the OBASHI framework, B&IT dia- The OBASHI Framework comprises the following rules
grams are able to accurately depict the complex inter- which govern the implicit and explicit relationships be-
relationships and dependencies of business processes, IT tween elements.
6.2. OBASHI 43
10. A dataow may span multiple Business and IT dia- CHAZOP (Computer Hazardous Operation Analy-
grams. sis)
COBIT
The Dataow Analysis View (DAV) Data Center Management
The OBASHI Dataow Analysis View (DAV) is a Enterprise Architecture (EA)
graphical and statistical representation of all the business
and IT resources, and attributed nancial values, that sup- Governance & Auditing
port an individual data ow. A DAV illustrates to busi- Grid Computing
ness professionals how and why IT systems interact with
day-to-day business processes. Information Architecture (IA)
All of the physical assets required for the logical data ow Enterprise Information Security Architecture
to exist are documented as a sequence. A sequence shows (EISA)
all of the IT and Business assets and resources involved
in the data ow. Infrastructure Management
44 CHAPTER 6. COMMERCIAL FRAMEWORKS
John M A Burns, Seeing a new bigger picture, The In- Focus on achieving competitive dierentiation
stitute of Scientic and Technical Communicators,
Identify and leverage best practice behaviors across
Feature Article, (Summer 2016)
the organization
6.2.7 External links In its conception, the IFW was an enterprise architec-
ture framework created as an alternative to the Zachman
The ocial OBASHI Website Framework.[1] In 1987 John Zachman proposed the
Zachman Framework to describe Information Architec-
The ocial OBASHI community Forum ture with the six concepts: The what related to data, how
The ocial OBASHI Mind Map related to process, where related to network and location,
who related to actors and people, when related to time,
The APMG-International OBASHI Webpage and at last why related to motivation.
industry-specic version of IBMs data, process and ser- The third challenge is addressing the requirements of ef-
vice models, allowing them to represent areas that are ciency, growth and resiliency to provide more relevant,
unique to their business and constitute competitive advan- robust, timely, and cost eective information to business
tage. In addition, the models can be easily augmented to decision makers. Customer retention is important in a
embrace industry extensions, jurisdiction and company- volatile market so attention must also be paid to enhanc-
specic extensions easily. ing the customer experience.
The Industry Models(IFW) has products for the following
industries: IBM Banking Data Warehouse (BDW)
Banking and Financial Markets (Data, Process, Ser- The BDW is a derivative of the BFMDW and contains
vices), content only relevant to the banking industry.
Insurance (Data, Process, Services),
Healthcare (Data), IBM Financial Markets Data Warehouse (FMDW)
Telecommunications (Data), The FMDW is a derivative of the BFMDW and contains
Retail (Data). only content relevant to the nancial markets industry.
tially releasing capital to provide additional lending LOB Policy Administration / Claim (Group), Financial
and investment capacity Transaction / Investment, Reinsurance Management, In-
termediary Management, Provider Management, Human
Designed to be understood by both business and IT,
Resource Management, Customer Relationship Manage-
and acts as a communication bridge between com-
ment, Marketing Management, Product Development,
munities.
Risk Policy Management, Risk Mitigation and Assess-
Provides an environment in which reuse possibilities ment, and Risk Reporting and Review.
can be identied and veried.
Provides a rm basis on which integration or SOA 6.3.5 Other industries
solutions can be built.
Allows you to construct services within a formalized Healthcare : Contains products containing data
model. models primarily focused on the Data Warehouse
domain.
Provides traceability from service denitions back to
business requirements. Telecommunications : Contains products containing
data models primarily focused on the Data Ware-
The BPS models have coverage in the following areas: house domain.
Sales & Relationship Management; KYC/Account Open-
ing; Lending; Card Products Administration; Commer- Retail : Contains products containing data models
cial / Syndicated Lending; Mortgages; Trade Finance; primarily focused on the Data Warehouse domain.
Savings, Investments & Term Deposits; Transfer Ser-
vices; Payments -Direct Debit / Credit Transfer / Deposit
/ Withdrawal; Cash Management; Wealth Management; 6.3.6 References
Product & Marketing Management; Regulatory & Com-
pliance; Best Execution/MiFID; Trade Processing; Cor- [1] Information FrameWork, Systems Journal article, Roger
Evernden
porate Actions; Asset & Liability Management; and Hu-
man Resource Administration. [2] Rik Maes. A generic framework for information manage-
ment. Universiteit van Amsterdam, Department of Ac-
countancy & Information Management, 1999.
6.3.4 Insurance
[3] Greefhorst, Danny, Henk Koning, and Hans van Vliet.
Contains products containing data, process and ser- The many faces of architectural descriptions. Informa-
vices models primarily focused on Data Warehouse and tion Systems Frontiers 8.2 (2006): 103-113.
Services Oriented Architecture domains.
[4] Industry Models
The Insurance Application Architecture (IAA) is a com- [6] Single Euro Payments Area (SEPA)
prehensive set of insurance specic models that repre- [7] Mortgage Industry Standards Maintenance Organization
sents best practices in insurance and is a natural extension (MISMO)
to the Component Business Model. The IAA models pro-
vide the insurance specic business content to accelerate [8] (IFRS)
the projects that result from moving to an On Demand
Business and pick up the denition of the components
that take you there. IAA describes the business of the in- 6.3.7 Further reading
surer and is an ecient communication bridge between
business and technology communities. It is designed to Evernden, Roger. Information FrameWork
be readily accessible to business users and by focusing (IFW)". IBM Systems Journal, Volume 35, Num-
on industry issues such as Sales and Customer Services, ber 1, Page 37 (1996)
Marketing and Analytics, Customer Relationship Man-
agement, Policy Administration, Product Development, Evernden, Roger and Evernden, Elaine, Information
Insurance Claims and Risk and Compliance. First: Integrating Knowledge and Information Ar-
chitecture for Business Advantage, Kindle Edition,
The IAA models have coverage in the following areas: Routledge 25 June 2012
LOB Customer Acquisition (Individual Insurance), LOB
Underwriting (Individual Insurance), LOB Customer Ac- Capital Adequacy Directive
quisition (Group Insurance), LOB Policy Administra-
tion (Individual), LOB Claim Management (Individual), Industry Models at IBM.com
6.4. ZACHMAN FRAMEWORK 47
In the 1997 paper Concepts of the Framework for En- Views of rows
terprise Architecture Zachman said that the framework
should be referred to as a Framework for Enterprise Each row represents a total view of the solution from a
Architecture, and should have from the beginning. In particular perspective. An upper row or perspective does
the early 1980s however, according to Zachman, there not necessarily have a more comprehensive understand-
was little interest in the idea of Enterprise Reengineer- ing of the whole than a lower perspective. Each row rep-
ing or Enterprise Modeling and the use of formalisms resents a distinct, unique perspective; however, the de-
and models was generally limited to some aspects of ap- liverables from each perspective must provide sucient
plication development within the Information Systems detail to dene the solution at the level of perspective and
community.[20] must translate to the next lower row explicitly.[26]
In 2008 Zachman Enterprise introduced the Zachman Each perspective must take into account the requirements
Framework: The Ocial Concise Denition as a new of the other perspectives and the restraint those perspec-
Zachman Framework standard. tives impose. The constraints of each perspective are ad-
ditive. For example, the constraints of higher rows aect
the rows below. The constraints of lower rows can, but
Extended and modied frameworks do not necessarily aect the higher rows. Understanding
the requirements and constraints necessitates communi-
Since the 1990s several extended frameworks have been cation of knowledge and understanding from perspective
proposed, such as: to perspective. The Framework points the vertical direc-
tion for that communication between perspectives.[26]
Matthew & McGee (1990)[21] extended the three
initial perspectives what, how and where, to
event (the when), reason (the why) and organi-
zation (the who).[16]
6.4.3 Zachman Framework topics Executive Perspective (Scope Contents) - The rst ar-
chitectural sketch is a "bubble chart" or Venn dia-
50 CHAPTER 6. COMMERCIAL FRAMEWORKS
gram, which depicts in gross terms the size, shape, sic model of each column is uniquely dened, yet re-
partial relationships, and basic purpose of the nal lated across and down the matrix.[26] In addition, the
structure. It corresponds to an executive summary six categories of enterprise architecture components, and
for a planner or investor who wants an overview or the underlying interrogatives that they answer, form the
estimate of the scope of the system, what it would columns of the Zachman Framework and these are:[24]
cost, and how it would relate to the general environ-
ment in which it will operate. 1. Inventory Sets What
Business Management Perspective (Business Con- 2. Process Flows How
cepts) - Next are the architects drawings that de-
pict the nal building from the perspective of the 3. Distribution Networks Where
owner, who will have to live with it in the daily rou-
tines of business. They correspond to the enterprise 4. Responsibility Assignments Who
(business) models, which constitute the designs of 5. Timing Cycles When
the business and show the business entities and pro-
cesses and how they relate. 6. Motivation Intentions Why
3. (Where) Distribution Denition Since the product development (i.e., architectural arti-
fact) in each cell or the problem solution embodied by
4. (Who) Responsibility Denition the cell is the answer to a question from a perspective,
5. (When) Timing Denition typically, the models or descriptions are higher-level de-
pictions or the surface answers of the cell. The rened
6. (Why) Motivation Denition models or designs supporting that answer are the detailed
descriptions within the cell. Decomposition (i.e., drill
Architect Perspective down to greater levels of detail) takes place within each
cell. If a cell is not made explicit (dened), it is implicit
(undened). If it is implicit, the risk of making assump-
1. (What) Inventory Representation tions about these cells exists. If the assumptions are valid,
2. (How) Process Representation then time and money are saved. If, however, the assump-
tions are invalid, it is likely to increase costs and exceed
3. (Where) Distribution Representation the schedule for implementation.[26]
Engineer Perspective
6. (Why) Motivation Specication Rule 1 The columns have no order : The columns are
interchangeable but cannot be reduced or created
Technician Perspective
Rule 2 Each column has a simple generic model : Ev-
ery column can have its own meta-model
1. (What) Inventory Conguration
Rule 3 The basic model of each column must be
2. (How) Process Conguration unique : The basic model of each column, the re-
lationship objects and the structure of it is unique.
3. (Where) Distribution Conguration
Each relationship object is interdependent but the
4. (Who) Responsibility Conguration representation objective is unique.
5. (When) Timing Conguration Rule 4 Each row describes a distinct, unique perspec-
tive : Each row describes the view of a particular
6. (Why) Motivation Conguration business group and is unique to it. All rows are usu-
ally present in most hierarchical organizations.
Enterprise Perspective Rule 5 Each cell is unique : The combination of 2,3
& 4 must produce unique cells where each cell rep-
1. (What) Inventory Instantiations resents a particular case. Example: A2 represents
business outputs as they represent what are to be
2. (How) Process Instantiations eventually constructed.
3. (Where) Distribution Instantiations Rule 6 The composite or integration of all cell mod-
els in one row constitutes a complete model from the
4. (Who) Responsibility Instantiations perspective of that row : For the same reason as for
5. (When) Timing Instantiations not adding rows and columns, changing the names
may change the fundamental logical structure of the
6. (Why) Motivation Instantiations Framework.
52 CHAPTER 6. COMMERCIAL FRAMEWORKS
Planner
Work
Perspectives
Owner
products
The framework is generic in that it can be used to classify
Designer
Builder
the descriptive representations of any physical object as TEAF Matrix of Views and
well as conceptual objects such as enterprises. It is also Perspectives.
recursive in that it can be used to analyze the architec-
tural composition of itself. Although the framework will
carry the relation from one column to the other, it is still a
fundamentally structural representation of the enterprise
and not a ow representation.
Framework for EA Direc-
tion, Description, and Accomplishment Overview.
Flexibility in level of detail
Customization
DODAF, 2003.
Mapping a part of the
DoDAF, 2007.
The Federal Enterprise Architecture Framework
(FEAF) is based on the Zachman Framework but
Other examples: only addresses the rst three columns of Zachman,
using slightly dierent names, and focuses in the top
Analysis of the Rational Unied Process as a of the three rows.[37] (see here)
Process,[34]
How the Model-driven architecture (MDA) models Example: One-VA Enterprise Architecture The
used in software development map to the Zachman Zachman Framework methodology has for example been
Framework.[35] used by the United States Department of Veterans Af-
fairs (VA) to develop and maintain its One-VA Enter-
Mapping the IEC 62264 models onto the Zach- prise Architecture in 2001. This methodology required
man framework for analysing products information dening all aspects of the VA enterprise from a business
traceability.[36] process, data, technical, location, personnel, and require-
Mapping the TOGAF Architecture Development ments perspective. The next step in implementing the
Method (e.g. the methodology) to the Zachman methodology has been to dene all functions related to
Framework.[6] each business process and identify associated data ele-
ments. Once identied, duplication of function and in-
consistency in data denition can be identied and re-
Base for other enterprise architecture frameworks solved, .[38]
The Zachman Framework was used as a reference 2. The diagram emphasizes the importance of the
model to initiate enterprise architecture planning in often-neglected Zachman Row-Six (the Integrated,
2001. Operational Enterprise View). Representations in
Mr. Zuechs interpretation of Zachman row-six con-
Somewhere in between the VA Zachman Frame- sist, largely, of measurable service improvements
work Portal was constructed. and cost savings/avoidance that result from the busi-
ness process and technology innovations that were
This VA Zachman Framework Portal is still in use as developed across rows two through ve.
a reference model for example in the determination
of EA information collected from various business
Row-six provides measured return on investment for
and project source documents.
Individual Projects and, potentially, for the entire
investment portfolio. Without row-six the Framework
Eventually an enterprise architecture repository was cre- only identies sunk-cost, but the row-six ROI permits it
ated at the macro level by the Zachman framework and to measure benets and to be used in a continuous im-
at a cell level by the meta-model outlined below.[39] provement process, capturing best practices and applying
them back through row-two.
6.4.5 Criticism
While the Zachman Framework is widely discussed, its
practical value has been questioned:
mented: If you ask who is successfully implement- [9] Kathleen B. Hass (2007). The Business Analyst as Strate-
ing the whole framework, the answer is nobody that gist: Translating Business Strategies Into Valuable Solu-
we know of yet[42] tions. page 58.
There are no detailed examples demonstrating the [10] Harold F. Tipton, Micki Krause (2008). Information Se-
successful practical application of the framework[43] curity Management Handbook, Sixth Edition, Volume 2.
page 263.
EA practitioner Stanley Gaver argues that the anal-
[11] O'Rourke, Fishman, Selkow (2003). Enterprise Architec-
ogy to classical architecture rst made by John
ture Using the Zachman Framework. page 9.
Zachman is faulty and incomplete[44]
[12] James McGovern et al. (2003). A Practical Guide to En-
Jason Bloomberg argues that enterprise isnt an or- terprise Architecture. p. 127-129.
dinary system like a machine or a building, and cant
be architected or engineered as such[45] [13] Marc Lankhorst et al. (2005). Enterprise Architecture at
Work. p. 24.
This criticism suggests that the Zachman Framework can [14] Business Systems Planning and Business Information
hardly reect actual best practice in EA. Control Study: A comparisment. In: IBM Systems Jour-
nal, vol 21, no 3, 1982. p. 31-53.
6.4.6 See also [15] John A. Zachman (1987). " A Framework for Information
Systems Architecture. In: IBM Systems Journal, vol 26,
Conceptual schema no 3. IBM Publication G321-5298.
[1] John Zachmans Concise Denition of the Zachman [18] John F. Sowa and John Zachman (1992). Extending and
Framework, 2008 Formalizing the Framework for Information Systems Ar-
chitecture In: IBM Systems Journal, Vol 31, no.3, 1992.
[2] The Zachman Framework: The Ocial Concise Deni- p. 590-616.
tion. Zachman International. 2008.
[19] Stan Locke (2008). Enterprise Convergence in Our Life-
[3] A Comparison of the Top Four Enterprise Architecture time In: THE ENTERPRISE NEWSLETTER, TEN42
Methodologies, Roger Sessions, Microsoft Developer Net- September 16, 2008
work Architecture Center,
[20] John A. Zachman (1997). "Concepts of the Framework
[4] The Zachman Framework Evolution. Zachman Inter- for Enterprise Architecture: Background, Description and
national. April 2009. Utility". Zachman International. Accessed 19 Jan 2009.
[5] A framework for information systems architecture [21] R.W. Matthews. &. W.C. McGee (1990). Data Model-
(PDF). IBM Systems Journal, Vol. 26. No. 3,. 1987. ing for Software Development. in: IBM Systems Journal
29(2). pp. 228234
[6] The Open Group (19992006). ADM and the Zachman
Framework in: TOGAF 8.1.1 Online. Accessed 25 Jan [22] Jaap Schekkerman (2003). How to Survive in the Jungle
2009. of Enterprise Architecture Frameworks. page 139-144.
[7] William H. Inmon, John A. Zachman, Jonathan G. Geiger [23] Vladan Jovanovic, Stevan Mrdalj & Adrian Gardiner
(1997). Data Stores, Data Warehousing, and the Zachman (2006). A Zachman Cube. In: Issues in Information Sys-
Framework: Managing Enterprise Knowledge. McGraw- tems. Vol VII, No. 2, 2006 p. 257-262.
Hill, 1997. ISBN 0-07-031429-2.
[24] VA Enterprise Architecture Innovation Team (2001).
[8] Pete Sawyer, Barbara Paech, Patrick Heymans (2007). Enterprise Architecture: Strategy, Governance, & Imple-
Requirements Engineering: Foundation for Software Qual- mentation report Department of Veterans Aairs, August,
ity. page 191. 2001.
56 CHAPTER 6. COMMERCIAL FRAMEWORKS
[25] The government information factory and the Zachman [41] Kim, Y.G. and Everest, G.C. (1994). Building an IS archi-
Framework by W. H. Inmon, 2003. p. 4. Accessed July tecture: Collective wisdom from the eld. In: Information
14, 2009. & Management, vol. 26, no. 1, pp. 1-11.
[26] The Chief Information Ocers Council (1999). Federal [42] Erecting the Framework, Part III, Interview with John
Enterprise Architecture Framework Version 1.1. Zachman by Dan Ruby, visited 19 May 2016
September 1999
[43] Ylimaki, T. and Halttunen, V. (2006). Method Engineer-
[27] US Department of Veterans Aairs (2002) A Tutorial on ing in Practice: A Case of Applying the Zachman Frame-
the Zachman Architecture Framework. Accessed 06 Dec work in the Context of Small Enterprise Architecture Ori-
2008. ented Projects. In: Information, Knowledge, Systems
Management, vol. 5, no. 3, pp. 189-209.
[28] Bill Inmon called this image A simple example of The
Zachman Framework in the article John Zachman - One [44] Why Doesnt the Federal Enterprise Architecture
of the Best Architects I Know Originally published 17 Work?", Stanley B. Gaver, visited 19 May 2016
November 2005.
[45] Is Enterprise Architecture Completely Broken?", Jason
[29] Zachman, John A. Ocial Home of The Zachman Bloomberg, visited 19 May 2016
Framework". Zachman International. Retrieved 14
February 2015.
6.4.8 External links
[30] Adapted from: Sowa, J.F. & J.A. Zachman, 1992,
and Inmon, W.H, J.A. Zachman, & J.G. Geiger, 1997. The Zachman Framework: The Ocial Concise
University of Omaha Denition by John A. Zachman at Zachman Inter-
national, 2009.
[31] Ian Graham (1995). Migrating to Object Technology: the
semantic object modelling approach. Addison-Wesley, The Zachman Framework Evolution: overview of
ISBN 0-201-59389-0. p. 322.
the evolution of the Zachman Framework by John
[32] Jay D. White (2007). Managing Information in the Public P. Zachman at Zachman International, April 2009.
Sector. p. 254.
UML, RUP, and the Zachman Framework: Better
[33] ZACHMAN ISA FRAMEWORK FOR HEALTHCARE together, by Vitalie Temnenco, IBM, 15 Nov 2006.
INFORMATICS STANDARDS, 1997.
7.1.1 Overview
The DoDAF provides a foundational framework for de-
veloping and representing architecture descriptions that
ensure a common denominator for understanding, com-
paring, and integrating architectures across organiza-
tional, joint, and multinational boundaries. It establishes
data element denitions, rules, and relationships and a
DoD Architecture Framework v1.5.[1] baseline set of products for consistent development of
systems, integrated, or federated architectures. These ar-
chitecture descriptions may include families of systems
(FoS), systems of systems (SoS), and net-centric capabil-
ities for interoperating and interacting in the non-combat
environment.[1]
All major U.S. DoD weapons and information technol-
ogy system acquisitions are required to develop and docu-
ment an enterprise architecture (EA) using the views pre-
scribed in the DoDAF. While it is clearly aimed at mil-
itary systems, DoDAF has broad applicability across the
private, public and voluntary sectors around the world,
and represents one of a large number of systems archi-
tecture frameworks.[4][5]
57
58 CHAPTER 7. DEFENSE INDUSTRY FRAMEWORKS
6. Capability Portfolio Management (CPM) 2.02 [8] DoDAF V2.0 is published on a public website.[9]
In addition, DoDAF 2.0s specic goals were to:[6] Other derivative frameworks based on DoDAF include
the NATO Architecture Framework (NAF) and Ministry
1. Establish guidance for architecture content as of Defence Architecture Framework. Like other EA
a function of purpose t for purpose approaches, for example The Open Group Architecture
2. Increase utility and eectiveness of architec- Framework (TOGAF), DoDAF is organized around a
tures via a rigorous data model the DoDAF shared repository to hold work products. The reposi-
Meta Model (DM2) -- so the architectures can tory is dened by the common database schema Core
be integrated, analyzed, and evaluated to with Architecture Data Model 2.0 and the DoD Architecture
more precision. Registry System (DARS). A key feature of DoDAF is
interoperability, which is organized as a series of lev-
els, called Levels of Information System Interoperability
7.1.2 History (LISI). The developing system must not only meet its in-
ternal data needs but also those of the operational frame-
work into which it is set.
On May 28, 2009 DoDAF v2.0 was approved by the De- What is our current set of capabilities that we are
partment of Defense.[7] The current version is DoDAF managing as part of a portfolio?
7.1. DEPARTMENT OF DEFENSE ARCHITECTURE FRAMEWORK 59
[10]
Each view depicts certain perspectives of an architecture
The Mission or Course of Action is described by a Con- as described below. Only a subset of the full DoDAF
cept of Operations (CONOPS), and is organized by Ca- viewset is usually created for each system development.
pabilities. The gure represents the information that links the op-
erational view, systems and services view, and technical
standards view. The three views and their interrelation-
Capabilities are described by Threads. ships driven by common architecture data elements
Threads are described by Activities executed in se- provide the basis for deriving measures such as interop-
rial or parallel. erability or performance, and for measuring the impact
of the values of these metrics on operational mission and
Activities are grouped into Mission Areas. Activities task eectiveness.[1]
dene operations for an Architecture.
Operational view
OV-5 Operational Activity Model Activities, relation- SV-4a/SV-4b Systems/Services Functionality Description
ships among activities, inputs and outputs. In addi- The SV-4a documents system functional hierarchies
tion, overlays can show cost, performing nodes, or and system functions, and the system data ows
other pertinent information. between them. The SV-4 from DoDAF v1.0 is des-
ignated as 'SV-4a' in DoDAF v1.5. Although there
OV-6a Operational Rules Model One of the three is a correlation between OV-5 or business-process
products used to describe operational activity se- hierarchies and the system functional hierarchy
quence and timing that identies the business rules of SV-4a, it need not be a one-to-one mapping,
that constrain the operation. hence, the need for the Operational Activity to
Systems Function Traceability Matrix (SV-5a),
OV-6b Operational State Transition Description which provides that mapping.
One of the three products used to describe opera-
tional activity sequence and timing that identies SV-5a, SV-5b, SV-5c Operational Activity to Systems
responses of a business process to events. Function, Operational Activity to Systems and Ser-
vices Traceability Matrices
OV-6c Operational Event-Trace Description One of Operational Activity to SV-5a and SV-5b is a spec-
the three products used to describe operational ac- ication of the relationships between the set of
tivity sequence and timing that traces the actions in operational activities applicable to an architecture
a scenario or critical sequence of events. and the set of system functions applicable to that
architecture. The SV-5 and extension to the SV-5
OV-7 Logical Data Model Documentation of the data from DoDAF v1.0 is designated as 'SV-5a' and
requirements and structural business process rules SV-5b in DoDAF v1.5 respectively.
of the Operational View. (In DoDAF V1.5. This
SV-6 Systems/Services Data Exchange Matrix
corresponds to DIV-2 in DoDAF V2.0.)
Species the characteristics of the system data
exchanged between systems. This product focuses
Systems and services view on automated information exchanges (from OV-3)
that are implemented in systems. Non-automated
Systems and services view (SV) is a set of graphical and information exchanges, such as verbal orders, are
textual products that describe systems and services and captured in the OV products only.
interconnections providing for, or supporting, DoD func- SV-7 Systems/Services Performance Parameters Matrix
tions. SV products focus on specic physical systems with Species the quantitative characteristics of sys-
specic physical (geographical) locations. The relation- tems and system hardware/software items, their
ship between architecture data elements across the SV to interfaces (system data carried by the interface as
the OV can be exemplied as systems are procured and well as communications link details that implement
elded to support organizations and their operations. The the interface), and their functions. It species the
DoDAF V1.5 SV products are: current performance parameters of each system,
interface, or system function, and the expected or
SV-1 Systems/Services Interface Description required performance parameters at specied times
Depicts systems nodes and the systems resident at in the future. Performance parameters include all
these nodes to support organizations/human roles technical performance characteristics of systems
represented by operational nodes of the OV-2. for which requirements can be developed and spec-
SV-1 also identies the interfaces between systems ication dened. The complete set of performance
and systems nodes. parameters may not be known at the early stages
of architecture denition, so it should be expected
SV-2 Systems/Services Communications Description that this product will be updated throughout the
Depicts pertinent information about communica- systems specication, design, development, testing,
tions systems, communications links, and commu- and possibly even its deployment and operations
nications networks. SV-2 documents the kinds of life-cycle phases.
communications media that support the systems
and implements their interfaces as described in SV-8 Systems/Services Evolution Description
SV-1. Thus, SV-2 shows the communications Captures evolution plans that describe how the
details of SV-1 interfaces that automate aspects of system, or the architecture in which the system is
the needlines represented in OV-2. embedded, will evolve over a lengthy period of
time. Generally, the timeline milestones are critical
SV-3 Systems-Systems, Services-Systems, Services- for a successful understanding of the evolution
Services Matrices timeline.
provides detail on the interface characteristics de-
scribed in SV-1 for the architecture, arranged in SV-9 Systems/Services Technology Forecast Denes
matrix form. the underlying current and expected supporting
7.1. DEPARTMENT OF DEFENSE ARCHITECTURE FRAMEWORK 61
technologies that have been targeted using standard 7.1.5 Version 2.0 viewpoints
forecasting methods. Expected supporting tech-
nologies are those that can be reasonably forecast
given the current state of technology and expected
improvements. New technologies should be tied to
specic time periods, which can correlate against
the time periods used in SV-8 milestones.
of data that has been organized to facilitate understand- Materiel (e.g., equipment, aircraft, and vessels) and
ing. To align with ISO Standards, where appropriate, the Personnel Types.
terminology has changed from Views to Viewpoint (e.g.,
the Operational View is now the Operational Viewpoint). The architectures for DoDAF V1.0 and DoDAF V1.5
may continue to be used. When appropriate (usually indi-
All Viewpoint (AV) Describes the overarching aspects cated by policy or by the decision-maker), DoDAF V1.0
of architecture context that relate to all viewpoints. and V1.5 architectures will need to update their archi-
tecture. When pre-DoDAF V2.0 architecture is com-
Capability Viewpoint (CV) New in DoDAF V2.0. Ar-
pared with DoDAF V2.0 architecture, concept dier-
ticulates the capability requirements, the delivery
ences (such as Node) must be dened or explained for the
timing, and the deployed capability.
newer architecture. In regard to DoDAF V1.5 products,
Data and Information Viewpoint (DIV) New in they have been transformed into parts of the DoDAF
DoDAF V2.0. Articulates the data relationships V2.0 models. In most cases, the DoDAF V2.0 Meta-
and alignment structures in the architecture content model supports the DoDAF V1.5 data concepts, with one
for the capability and operational requirements, notable exception: Node. Node is a complex, logical con-
system engineering processes, and systems and cept that is represented with more concrete concepts.
services.
Operational Viewpoint (OV) Includes the operational All Viewpoint (AV)
scenarios, activities, and requirements that support
capabilities. AV-1 Overview and Summary Information
Describes a Projects Visions, Goals, Objectives,
Project Viewpoint (PV) New in DoDAF V2.0. De- Plans, Activities, Events, Conditions, Measures,
scribes the relationships between operational and Eects (Outcomes), and produced objects.
capability requirements and the various projects be-
ing implemented. The Project Viewpoint also de- AV-2 Integrated Dictionary An architectural data
tails dependencies among capability and operational repository with denitions of all terms used
requirements, system engineering processes, sys- throughout
tems design, and services design within the Defense
Acquisition System process.
Capability Viewpoint (CV)
Services Viewpoint (SvcV) New in DoDAF V2.0.
Presents the design for solutions articulating the CV-1 Vision Addresses the enterprise concerns associ-
Performers, Activities, Services, and their Ex- ated with the overall vision for transformational en-
changes, providing for or supporting operational deavours and thus denes the strategic context for
and capability functions. a group of capabilities. The purpose of the CV-1
is to provide a strategic context for the capabilities
Standards Viewpoint (StdV) Renamed from Techni-
described in the Architecture Description.
cal Standards View. Articulates the applicable op-
erational, business, technical, and industry policies, CV-2 Capability Taxonomy Captures capability tax-
standards, guidance, constraints, and forecasts that onomies. The model presents a hierarchy of capa-
apply to capability and operational requirements, bilities. These capabilities may be presented in the
system engineering processes, and systems and ser- context of a timeline. The CV-2 species all the
vices. capabilities that are referenced throughout one or
Systems Viewpoint (SV) Articulates, for legacy sup- more architectures.
port, the design for solutions articulating the sys-
CV-3 Capability Phasing The planned achievement
tems, their composition, interconnectivity, and con-
of capability at dierent points in time or during
text providing for or supporting operational and ca-
specic periods of time. The CV-3 shows the capa-
pability functions. Note, System has changed in
bility phasing in terms of the activities, conditions,
DoDAF V2.0 from DoDAF V1.5: System is not just
desired eects, rules complied with, resource con-
computer hardware and computer software. Sys-
sumption and production, and measures, without re-
tem is now dened in the general sense of an as-
gard to the performer and location solutions
semblage of components - machine, human - that
perform activities (since they are subtypes of Per- CV-4 Capability Dependencies The dependencies be-
former) and are interacting or interdependent. This tween planned capabilities and the denition of log-
could be anything, i.e., anything from small pieces ical groupings of capabilities.
of equipment that have interacting or interdependent
elements, to Family of Systems (FoS) and System of CV-5 Capability to Organizational Development Mapping
Systems (SoS). Note that Systems are made up of The fulllment of capability requirements shows
7.1. DEPARTMENT OF DEFENSE ARCHITECTURE FRAMEWORK 63
the planned capability deployment and interconnec- OV-6a Operational Rules Model One of three mod-
tion for a particular Capability Phase. The CV-5 els used to describe activity (operational activity). It
shows the planned solution for the phase in terms identies business rules that constrain operations.
of performers and locations and their associated
concepts. OV-6b State Transition Description One of three
models used to describe operational activity (ac-
CV-6 Capability to Operational Activities Mapping tivity). It identies business process (activity)
A mapping between the capabilities required and responses to events (usually, very short activities).
the operational activities that those capabilities
support. OV-6c Event-Trace Description One of three models
used to describe activity (operational activity). It
CV-7 Capability to Services Mapping A mapping be- traces actions in a scenario or sequence of events.
tween the capabilities and the services that these ca-
pabilities enable.
Project Viewpoint (PV)
Data and Information Viewpoint (DIV) PV-1 Project Portfolio Relationships It describes the
dependency relationships between the organiza-
DIV-1 Conceptual Data Model The required high- tions and projects and the organizational structures
level data concepts and their relationships. needed to manage a portfolio of projects.
DIV-2 Logical Data Model The documentation of the PV-2 Project Timelines A timeline perspective on pro-
data requirements and structural business process grams or projects, with the key milestones and inter-
(activity) rules. In DoDAF V1.5, this was the OV-7. dependencies.
DIV-3 Physical Data Model The physical implemen- PV-3 Project to Capability Mapping A mapping of
tation format of the Logical Data Model enti- programs and projects to capabilities to show how
ties, e.g., message formats, le structures, physical the specic projects and program elements help to
schema. In DoDAF V1.5, this was the SV-11. achieve a capability.
Note, see Logical data model for discussion of the rela- Services Viewpoint (SvcV)
tionship of these three DIV data models, with comparison
of the Conceptual, Logical & Physical Data Models. SvcV-1 Services Context Description The identica-
tion of services, service items, and their intercon-
nections.
Operational Viewpoint (OV)
SvcV-2 Services Resource Flow Description A de-
OV-1 High-Level Operational Concept Graphic scription of Resource Flows exchanged between
The high-level graphical/textual description of the services.
operational concept.
SvcV-3a Systems-Services Matrix The relationships
OV-2 Operational Resource Flow Description A de- among or between systems and services in a given
scription of the Resource Flows exchanged between Architectural Description.
operational activities.
SvcV-3b Services-Services Matrix The relationships
OV-3 Operational Resource Flow Matrix A descrip- among services in a given Architectural Description.
tion of the resources exchanged and the relevant at- It can be designed to show relationships of interest,
tributes of the exchanges. (e.g., service-type interfaces, planned vs. existing
interfaces).
OV-4 Organizational Relationships Chart The orga-
nizational context, role or other relationships among SvcV-4 Services Functionality Description The func-
organizations. tions performed by services and the service data
ows among service functions (activities).
OV-5a Operational Activity Decomposition Tree
The capabilities and activities (operational activi- SvcV-5 Operational Activity to Services Traceability Matrix
ties) organized in a hierarchal structure. A mapping of services (activities) back to opera-
tional activities (activities).
OV-5b Operational Activity Model The context of
capabilities and activities (operational activities) and SvcV-6 Services Resource Flow Matrix It provides
their relationships among activities, inputs, and out- details of service Resource Flow elements being
puts; Additional data can show cost, performers or exchanged between services and the attributes of
other pertinent information. that exchange.
64 CHAPTER 7. DEFENSE INDUSTRY FRAMEWORKS
SvcV-7 Services Measures Matrix The measures system data ows among system functions (activi-
(metrics) of Services Model elements for the ties).
appropriate timeframe(s).
SV-5a Operational Activity to Systems Function
SvcV-8 Services Evolution Description The planned Traceability Matrix
incremental steps toward migrating a suite of ser- A mapping of system functions (activities) back to
vices to a more ecient suite or toward evolving operational activities (activities).
current services to a future implementation. SV-5b Operational Activity to Systems Traceability Matrix
A mapping of systems back to capabilities or oper-
SvcV-9 Services Technology & Skills Forecast The
ational activities (activities).
emerging technologies, software/hardware prod-
ucts, and skills that are expected to be available in a SV-6 Systems Resource Flow Matrix Provides
given set of time frames and that will aect future details of system resource ow elements being
service development. exchanged between systems and the attributes of
that exchange.
SvcV-10a Services Rules Model One of three models
used to describe service functionality. It identies SV-7 Systems Measures Matrix The measures (met-
constraints that are imposed on systems functional- rics) of Systems Model elements for the appropriate
ity due to some aspect of system design or imple- timeframe(s).
mentation.
SV-8 Systems Evolution Description The planned in-
SvcV-10b Services State Transition Description cremental steps toward migrating a suite of systems
One of three models used to describe service to a more ecient suite, or toward evolving a current
functionality. It identies responses of services to system to a future implementation.
events.
SV-9 Systems Technology & Skills Forecast The
SvcV-10c Services Event-Trace Description One of emerging technologies, software/hardware prod-
three models used to describe service functionality. ucts, and skills that are expected to be available in a
It identies service-specic renements of critical given set of time frames and that will aect future
sequences of events described in the Operational system development.
Viewpoint.
SV-10a Systems Rules Model One of three models
used to describe system functionality. It identies
Standards Viewpoint (StdV) constraints that are imposed on systems functional-
ity due to some aspect of system design or imple-
StdV-1 Standards Prole The listing of standards that mentation.
apply to solution elements. In DoDAF V1.5, this
was the TV-1. SV-10b Systems State Transition Description One
of three models used to describe system func-
StdV-2 Standards Forecast The description of tionality. It identies responses of systems to
emerging standards and potential impact on current events.
solution elements, within a set of time frames. In
DoDAF V1.5, this was the TV-2. SV-10c Systems Event-Trace Description One of
three models used to describe system functionality.
It identies system-specic renements of critical
Systems Viewpoint (SV) sequences of events described in the Operational
Viewpoint.
SV-1 Systems Interface Description The iden-
tication of systems, system items, and their
interconnections. 7.1.6 Creating an integrated architecture
using DoDAF
SV-2 Systems Resource Flow Description A descrip-
tion of Resource Flows exchanged between systems. The DODAF 2.0 Architects Guide [14] repeated DOD In-
SV-3 Systems-Systems Matrix The relationships struction 4630.8 denition of an integrated architecture
among systems in a given Architectural Descrip- as An architecture consisting of multiple views facilitat-
tion. It can be designed to show relationships of ing integration and promoting interoperability across ca-
interest, (e.g., system-type interfaces, planned vs. pabilities and among integrated architectures. For the pur-
existing interfaces). poses of architecture development, the term integrated
means that data required in more than one of the architec-
SV-4 Systems Functionality Description The func- tural models is commonly dened and understood across
tions (activities) performed by systems and the those models. Integrated architectures are a property or
7.1. DEPARTMENT OF DEFENSE ARCHITECTURE FRAMEWORK 65
frastructure support, IT and NSS interface require- Schema derived from the resulting relational database.
ments and dependencies focusing on net-centric, in- From version 2.0, DoDAF has adopted the IDEAS Group
teroperability, supportability and suciency con- foundation ontology as the basis for its new meta-model.
cerns (DODI 4630.8).[17] This new meta-model is called DM2"; an acronym for
DoDAF Meta-Model. Each of these three levels of the
Tailored Information Support Plan (TISP). The pur- DM2 is important to a particular viewer of Departmental
pose of the TISP process is to provide a dynamic and processes:
ecient vehicle for certain programs (ACAT II and
below) to produce requirements necessary for I&S
1. The conceptual level or Conceptual Data Model
Certication. Select program managers may request
(CDM) denes the high-level data constructs from
to tailor the content of their ISP (ref ss). For pro-
which Architectural Descriptions are created in
grams not designated OSD special interest by ASD
non-technical terms, so that executives and man-
(NII)/DOD CIO, the component will make nal de-
agers at all levels can understand the data basis
cision on details of the tailored plan subject to mini-
of Architectural Description. Represented in the
mums specied in the TISP procedures linked from
DoDAF V2.0 DIV-1 Viewpoint.
the CJCSI 6212 resource page and any special needs
identied by the J-6 for the I&S certication pro- 2. The Logical Data Model (LDM) adds technical in-
cess. formation, such as attributes to the CDM and, when
necessary, claries relationships into an unambigu-
ous usage denition. Represented in the DoDAF
7.1.7 Representation V2.0 DIV-2 Viewpoint.
Representations for the DoDAF products may be drawn 3. The Physical Exchange Specication (PES) consists
from many diagramming techniques including: of the LDM with general data types specied and
implementation attributes (e.g., source, date) added,
and then generated as an XSD. Represented in the
tables
DoDAF V2.0 DIV-3 Viewpoint.[6]
IDEF
The purposes of the DM2 are:
Entity-relationship diagrams (ERDs)
DoDAF has a meta-model underpinning the framework, The DM2 denes architectural data elements and enables
dening the types of modelling elements that can be used the integration and federation of Architectural Descrip-
in each view and the relationships between them. DoDAF tions. It establishes a basis for semantic (i.e., understand-
versions 1.0 thru 1.5 used the CADM meta-model, which ing) consistency within and across Architectural Descrip-
was dened in IDEF1X (then later in UML) with an XML tions. In this manner, the DM2 supports the exchange and
7.1. DEPARTMENT OF DEFENSE ARCHITECTURE FRAMEWORK 67
The UPDM (Unied Prole for DoDAF and MODAF) [4] Architecture Framework FAQ. Retrieved 2007-08-07.
is an OMG initiative to standardize UML and SysML us- [5] CJCSM 3170.01C OPERATION OF THE JOINT CA-
age for USA and UK defense architecture frameworks. PABILITIES INTEGRATION AND DEVELOPMENT
In addition, the multi-national IDEAS Group, which is SYSTEM. 1 May 2007. mandatory appendices for ICD,
supported by Australia, Canada, Sweden, UK, USA, with CDD, and CPD, e.g. pg E-A-5 Mandatory: OV-1
NATO observers, has launched an initiative to develop a
formal ontology for enterprise architectures. [6] DoDAF Meta Model (DM2)".
[20] GAO (2005). DoD Business Systems Modernization: Knowledge Management/ Decision Support
Long-Standing Weaknesses in Enterprise Architecture De-
velopment Need to Be Addressed. Washington, DC: Gov- Metadata Registry
ernment Accountability Oce.
Naval Architecture Elements Reference Guide
[21] GAO (2013). DoD Business Systems Modernization: Fur-
ther Actions Needed to Address Challenges and Improve Universal Joint Task List (UJTL)
Accountability. Washington, DC: Government Account-
CJCSI 6212.01 document
ability Oce.
MOD is working closely with its International Allies Service Orientated Viewpoint (SOV) describes the
to ensure coherence with their architecture frameworks services, (i.e. units of work supplied by providers to
to enable the sharing of information about capabili- consumers), required to support the processes de-
ties elded in coalition operations in-order to support scribed in the operational Views;
interoperability. MODAF was developed from the
US Department of Defense Architecture Framework Systems Viewpoint (SV) describes the physical im-
(DoDAF) version 1.0, but has been extended and modi- plementation of the Operational and Service Orien-
ed to meet MOD requirements by the addition of Strate- tated Views and, thereby, dene the solution;
gic, Acquisition and Service Oriented Viewpoints and the Acquisition Viewpoint (AcV) describes the depen-
provision of the M3. dencies and timelines of the projects that will of de-
MODAF version 1.0 was released in 2005, following de- liver the solution;
velopment work by the MODAF Partners, a collabora-
tive team of MOD sta and contractors from a number Technical Viewpoint (TV) denes the standards that
of industry partners and has been continuously improved are to be applied to the solution;
since Version 1.0, the latest release, version 1.2.004, was All Viewpoint (AV) provides a description and glos-
released in May 2010 sary of the contents of the architecture.
7.2.6 Tools and Tooling EADS use MODAF as part of the Modelling and
Simulation process for NetCOS their Synthetic En-
The MOD is agnostic about which software tools should vironment
or should not be used to develop MODAF architecture
descriptions. The key requirement is that they should cor- Thales Group use MODAF in their work for UK
rectly implement the M3[8] with downloads in Sparx Sys- MOD
tems Enterprise Architect; HTML and XMI formats. to
provide a coherent structure against which architecture Avolution use MODAF widely within the UK De-
information can be exchanged. A number of tools oer fence and Security sectors
this functionality.
BAA Limited
The MOD has been working with the Object Manage-
ment Group (OMG) to develop the Unied Prole for In addition, revision 3 of the NATO Architecture Frame-
DoDAF and MODAF (UPDM), an abstract UML pro- work (NAF) is identical to MODAF at its core, but
le that implements the MODAF Metamodel (M3), it- extends the framework by adding views for Bandwidth
self an abstract UML prole for UML modelling tools, Analysis, SOA and Standards congurations.
as well as the DODAF metamodel (DM2) . It is based on
the Unied Modelling Language (UML) and extends the MODAF is also the basis for other frameworks such as
Systems Modelling Language (SysML) UML prole. TRAK, a domain-free framework, which is based on
MODAF 1.2
7.2.7 Terminology
7.2.9 References
An architectural framework or architecture frame-
work is a specication of how to organise and present [1] 513014N 0730W / 51.50389N 0.12500W
architectural models. An architectural framework con-
[2] Defence in the Community. Ministry of Defence. Re-
sists of a standard set of views, which each have a specic
trieved 22 March 2010.
purpose.
An architectural description is a contiguous, coher- [3] Defence Spending. Ministry of Defence. Retrieved 22
ent model of an enterprise. An architectural description March 2010.
comprises architectural products. MODAF is not an [4] Error pages Archived 18 May 2010 at the Wayback Ma-
architectural description. chine.
A view is a specication of a way to present an aspect
of the enterprise. Views are dened with one or more [5] House of Commons Hansard Written Answers for 13 Jan
2009 (pt 0004)
purposes in mind - e.g., showing the logical topology of
the enterprise, describing a process model, dening a data [6] Archived 13 October 2010 at the Wayback Machine.
model, etc.
[7] IDEAS Group. IDEAS DM2 MetaModel. IDEAS
An architectural product is a model of a particular as-
Group.
pect of the enterprise. An architectural product conforms
to a view. [8] Ministry of Defence | About Defence | Corporate Publi-
A viewpoint is a collection of views. Viewpoints are cations | Information Management | MODAF | MODAF
usually categorized by domain - e.g., in MODAF there Meta Model
are seven viewpoints.
7.2.10 External links
7.2.8 Applications
MOD Site for MODAF
Although originally developed by the UK Ministry of De-
modaf.com - the MODAF user site
fence, MODAF is the standard architecture framework
for other organisations, such as:
The current NATO C3 System Architecture Framework The SOA views dier signicantly between
v2 (NAF v2), issued by NATO in September 2004 pro- MODAF and NAF. In particular, MODAF han-
vides guidance on describing communication and infor- dles in service orchestration in the Operational
mation systems. Revision 3 of the NATO Architecture Viewpoint (OV-5) whereas NAF uses NSOV-5
Framework (NAF), promulgated in November 2007, is
identical to MODAF at its core, but extends the frame- MODAF does not have a TV-3 view
work by adding views for Bandwidth Analysis, Semicon-
ductor Optical Ampliers (SOA) and standard congu- In most other respects, the MODAF documentation is t
rations. for use in developing NAF architectures.
The seven views are:
7.3.3 External links
NATO All View (NAV)
NATO C3 Board
NATO Capability View (NCV)
NATO Architecture Framework v3
NATO Operational View (NOV)
The initial work done on the bandwidth and fre-
NATO Service-Oriented View (NSOV) quency view in NAF v3 has since been further in-
vestigated by UK MOD CIO-J6 as part of the Spec-
NATO Systems View (NSV) trum Management work for CCEB
NATO Technical View (NTV) NATO Presentation on NAF by Frits Broekema
NATO Programme View (NPV) from Integrated EA Conference 2009
Summary of changes from NAF v2 to v3
Each view has a set of subviews.
7.4.2 AGATE Views [2] Manuel de rfrence AGATE V3, December 2005, El-
ments de dpart AGATE et Origine
An AGATE model is organized into 5 views:
7.4.7 External links
Stakes, Objectives, and context about the system
AGATE page on French Defense procurement web-
Business architecture: describes organizations and site
Business processes managed by the modelized
short presentation of AGATE on French Defense
Information system
procurement portal
Service-oriented architecture: describes the
Services of the system.
7.4.3 Representation
7.4.4 History
Government frameworks
8.1 Government Enterprise Archi- The QGEA is a federated architecture, which acknowl-
edges that the Queensland Government is a single enter-
tecture prise composed of autonomous agencies. Agencies are
responsible for their own enterprise architectures, yet are
The Queensland Government Enterprise Architec- able to leverage and contribute to whole of-Government
ture (now known as the QGEA 2.0) is an initiative of the architectures and investments through a single consistent
Queensland Government Chief Information Oce (QG- framework. The current state assessment of each depart-
CIO) in Australia. QGEA 2.0 is the collection of ICT ments business, information, application and technology
policies and associated documents that guides agency ICT component assets (called the ICT Baseline reporting ac-
initiatives and investments to improve the compatibility tivity) enables ICT portfolio investment analysis both at
and cost-eectiveness of ICT across the government. The the department and whole-of-Government level.
QGEA provides the decision making and management
structures to support the development of better services
for Queenslanders, more ecient and eective use of 8.1.2 History
information and ICT in government and eective part-
nering with the private sector through the application of The former Department of Communication and Informa-
whole-of-Government, cross agency and agency informa- tion, Local Government, Planning and Sport commenced
tion and information communications technology policies a project in early 1999 to dene what was called at the
and practices.[1] time a Government Information Architecture with the
aim of improving the interoperability of communication
and information systems and the sharing of information
8.1.1 Description resources across Queensland Government agencies.
The QGEA is a tailored EA which delivers a comprehen- Loosely based on the META Group Enterprise Architec-
sive set of processes, frameworks, policies, guidelines and ture Service methodology the rst version was published
tools to describe how the Queensland Government organ- in May 2001.
ises its resources to support service delivery. After an internal review of IT management across the
The QGEA assists agencies, multi-agency projects, Queensland Government in 2005 this original eort was
shared service providers and whole-of-Government ini- replaced by the expanded Government Enterprise Archi-
tiatives to: tecture (GEA). At the same time the notion of enterprise
architecture became enshrined in legislation in the form
of the Financial Management Standard. This became one
deliver services in a coordinated, cost eective and
of the rst known examples of enterprise architecture be-
ecient manner
ing explicitly mandated by a government body.
improve the integration and alignment of decision In 2006, the rst GEA alignment report was completed
making across the Queensland Government by all agencies. As recommended in the former Service
support coordinated decision making about strategic Delivery Performance Commissions Review of ICT gov-
directions, policies and standards ernance in the Queensland Government, the Queensland
Government Chief Information Oce and Queensland
use information and ICT to achieve their business Government Chief Technology Oce were established
objectives and assigned joint management of the GEA.
guide the development, use, and management of in- The QGEA 2.0 was developed in 2008 and released to
formation and ICT resources over time agencies for consultation. QGEA was adopted in pref-
erence to GEA to better reect it as a Queensland Gov-
position themselves for future needs. ernment developed framework. The QGEA 2.0 was of-
73
74 CHAPTER 8. GOVERNMENT FRAMEWORKS
cially launched on 21 April 2009. with the FEAF and highlights the importance of security
to all other components of the architecture.[2]
The FDIC EA framework includes ve components. The
8.1.3 See also
rst component, the Business Architecture, focuses on
FDICs business needs. The next three components, the
Enterprise Architecture
Data Architecture, Applications Architecture, and Tech-
Federal Enterprise Architecture nical Infrastructure Architectures, focus on the techno-
logical capabilities that support the business and informa-
tion needs. The nal component, the Security Architec-
8.1.4 References ture, focuses on specic aspects of interest to the Corpo-
ration that span the enterprise and must be integral parts
[1] Queensland Government Enterprise Architecture of all other architectures.[2]
Framework 2.0, (PDF). The State of Queensland
(Department of Public Works). 2009.
8.2.2 History
8.1.5 External links
Historically, Federal agencies have managed IT invest-
QGEA ments autonomously. Until the new millennium, there
has been little incentive for agencies to partner to eec-
Queensland Government Chief Information Oce tively reuse IT investments, share IT knowledge, and ex-
plore joint solutions. Starting in the second half of the
1990 a collective, government-wide eort, supported by
the Federal CIO Council, utilizing the Federal Enterprise
8.2 FDIC Enterprise Architecture Architecture (FEA), has been undertaken in an eort to
Framework yield signicant improvements in the management and
reuse of IT investments, while improving services to citi-
zens, and facilitating business relationships internally and
externally.[3]
The Federal Deposit Insurance Corporation (FDIC) rst
realized the value of Enterprise Architecture in 1997,
when two business executives had to reconcile data that
had come from dierent systems for a high-prole report
to the banking industry. The FDICs rst EA blueprint
was published in December 2002.[4]
In 2004 the FDIC received a 2004 Enterprise Archi-
tecture Excellence Award from the Zachman Institute
for Framework Advancement (ZIFA) for its initiative to
manage corporate data collaboratively.[5]
FDICs Enterprise Architecture Framework from 2005.[1]
Data Architecture : The Data Architecture describes The banking business model has become more complex,
the activities required to obtain and maintain data giving rise to nancial instruments such as collateralized
that supports the information needed by the Corpo- debt obligations (CDOs) and structured investment vehi-
rations major business areas. Data and information cles (SIVs) to manage risk. These instruments have cre-
are dierent. Data is the foundation of information. ated greater dependencies between the domestic and in-
Data is the raw material that is processed and rened ternational nancial markets. Financial institutions must,
to generate information. Information consists of a therefore, strike a balance between regulatory, legisla-
collection of related data that has been processed tive and banker concerns while appropriately managing
into a form that is meaningful to the recipient.[2] risk.[6]
Applications Architecture : The Applications Archi- As cost savings are realized from a simplied IT envi-
tecture describes the major types of applications ronment and more ecient processes, the savings will be
that manage data to produce the information needed reinvested for IT improvements or accrue to the Corpo-
to support the activities of the Corporation. The Ap- ration. This self-funding model is shown on the right.[6]
plications Architecture provides a framework that
enables the migration from the current applications Five-year technology roadmap
catalog and software development environment to
the target integrated applications, development and The technology roadmap outlines the major initiatives for
engineering environments. The target architecture standardizing the IT environment and increasing ITs ef-
promotes the use of commercial and government ciency and eectiveness over the next ve years. The
o-the-shelf products, consolidating applications, initiatives were determined by various sources including
where applicable, and the use of emerging technolo- business-side IT roadmaps, executive management plan-
gies where appropriate.[2] ning meetings, client planning sessions, and client year-
end reviews. The three major initiatives identied are en-
Technical Infrastructure Architecture : The IT in-
terprise architecture, security and privacy programs, and
frastructure provides access to application systems
scal discipline.[6]
and oce automation tools used in performance
of the business processes. The Corporation places
high priority on maintaining a consistent, available,
and reliable technical infrastructure. The Techni-
cal Architecture describes the underlying technol-
ogy for the Corporations business, data, and appli-
cation processing. It includes the technologies used
for communications, data storage, application pro-
cessing, and computing platforms.[2]
technology, such as scanning outgoing e-mail for sensi- business and technology management as part of organi-
tive information and encrypting removable storage de- zation design and performance improvement. [1]
vices, can mitigate potential risks. The other cornerstone The most familiar federal enterprise architecture is the
of mitigating risk is educating employees of emerging se- enterprise architecture of the Federal government of the
curity and privacy issues.[6] United States, the U.S. Federal Enterprise Architec-
Lastly, in order to continue sound scal discipline and re- ture (FEA) and the corresponding U.S. Federal En-
sponsibility, the organization will establish IT baselines terprise Architecture Framework (FEAF). This lemma
and metrics, study steady-state costs, manage service level will focus on this particular enterprise architecture and
agreements, and more judiciously choose new develop- enterprise architecture framework.
ment projects. These three areas enterprise architec-
ture, security and privacy programs, and scal discipline
are shown below with the estimated time frames.[6] 8.3.1 Overview
In September 1999, the Federal CIO Council pub- gic goals drive business services, which in turn provide
lished the Federal Enterprise Architecture Framework the requirements for enabling technologies. At its core is
(FEAF) Version 1.1 for developing an Enterprise Archi- the Consolidated Reference Model (CRM), which equips
tecture (EA) within any Federal Agency for a system that OMB and Federal agencies with a common language and
transcends multiple inter-agency boundaries. It builds framework to describe and analyze investments.
on common business practices and designs that cross or- Overall the Federal Enterprise Architecture (FEA) is
ganizational boundaries, among others the NIST Enter- mandated by a series of federal laws and mandates. These
prise Architecture Model. The FEAF provides an endur- federal laws have been:
ing standard for developing and documenting architec-
ture descriptions of high-priority areas. It provides guid-
ance in describing architectures for multi-organizational GPRA 1993 : Government Performance and Re-
functional segments of the Federal Government.[3] At the form Act
time of release, the Governments IT focus on Y2K issues PRA 1995 : Paperwork Reduction Act
and then the events of September 2001 diverted attention
from EA implementation, though its practice in advance CCA 1996 : Clinger-Cohen Act
and subsequent to this may have ameliorated the impact
of these events. Interim releases since that time have pro- GPEA 1998 : The Government Paperwork Elimi-
vided successive increases in denition for the core refer- nation Act
ence models (see below), as well as a very robust method- FISMA 2002 : Federal Information Security Man-
ology for actually developing an architecture in a series agement Act
of templates forming the Federal Segment Architecture
Methodology (FSAM) and its next generation replace- E-Gov 2002 : Electronic Government
ment, the Collaborative Planning Methodology (CPM),
which was designed to be more exible, more widely ap- Supplementary OMB circulars have been:
plicable, and more inclusive of the larger set of planning
disciplines. A-11 : Preparation, Submission and Execution of
These federal architectural segments collectively consti- the Budget
tute the federal enterprise architecture. In 2001, the
A-130 : OMB Circular A-130 Management of Fed-
Federal Architecture Working Group (FAWG) was spon-
eral Information Resources, rst issued in Decem-
soring the development of Enterprise Architecture prod-
ber 1985
ucts for trade and grant Federal architecture segments.
Method s prescribed way of approaching a particular
problem. As shown in the gure, the FEAF partitions 8.3.3 Collaborative planning methodology
a given architecture into business, data, applications, and
technology architectures. The FEAF overall framework The Collaborative Planning Methodology (CPM) is a
created at that time (see image) includes the rst three simple, repeatable process that consists of integrated,
columns of the Zachman Framework and the Spewak's multi-disciplinary analysis that results in recommenda-
Enterprise Architecture Planning methodology.[3] tions formed in collaboration with leaders, stakeholders,
In May 2012 OMB published a full new guide, the Com- planners, and implementers. It is intended as a full plan-
mon Approach to Federal Enterprise Architecture.[4] ning and implementation lifecycle for use at all levels of
Released as part of the federal CIOs policy guidance and scope dened in the Common Approach to Federal En-
management tools for increasing shared approaches to IT terprise Architecture: International, National, Federal,
service delivery, the guide presents an overall approach Sector, Agency, Segment, System, and Application.[4][5]
to developing and using Enterprise Architecture in the
Federal Government. The Common Approach promotes
increased levels of mission eectiveness by standardiz- 8.3.4 Version 2 reference models
ing the development and use of architectures within and
between Federal Agencies. This includes principles for The Consolidated Reference Model of the Federal En-
using EA to help agencies eliminate waste and duplica- terprise Architecture Framework (FEAF) equips OMB
tion, increase shared services, close performance gaps, and Federal agencies with a common language and frame-
and promote engagement among government, industry, work to describe and analyze investments. It consists of
and citizens. a set of interrelated reference models designed to facil-
itate cross-agency analysis and the identication of du-
On January 29, 2013, the White House released Ver- plicative investments, gaps and opportunities for collabo-
sion 2 of the Federal Enterprise Architecture Frame- ration within and across agencies. Collectively, the refer-
work (FEAF-II), to government agencies, making it pub- ence models comprise a framework for describing impor-
lic about a year later.[5] The document meets the criteria tant elements of federal agency operations in a common
set forth by Common Approach, emphasizing that strate- and consistent way. Through the use of the FEAF and
78 CHAPTER 8. GOVERNMENT FRAMEWORKS
[1]
its vocabulary, IT portfolios can be better managed and Federal Enterprise Architecture.
leveraged across the federal government, enhancing col-
laboration and ultimately transforming the Federal gov- The FEA is built using an assortment of reference models
ernment. that develop a common taxonomy and ontology for de-
The ve reference models in version 1 (see below) have scribing IT resources. FEA Version 1 reference models
been regrouped and expanded into six in the FEAF-II. (see image) included the following:
3. Identify performance improvement opportunities The Business Reference Model provides a framework
that span traditional organizational structures and that facilitates a functional (as opposed to organizational)
boundaries view of the federal governments LoBs, including its in-
ternal operations and its services for the citizens, inde-
pendent of the agencies, bureaus and oces that perform
The PRM uses a number of existing approaches to per-
them. By describing the federal government around com-
formance measurement, including the Balanced Score-
mon business areas instead of by a stovepiped, agency-
card, Baldrige Criteria,[6] value measuring methodology,
by-agency view, the BRM promotes agency collaboration
program logic models, the value chain, and the Theory of
and serves as the underlying foundation for the FEA and
Constraints. In addition, the PRM was informed by what
E-Gov strategies.[1]
agencies are currently measuring through PART assess-
ments, GPRA, enterprise architecture, and Capital Plan- While the BRM does provide an improved way of think-
ning and Investment Control. The PRM is currently com- ing about government operations, it is only a model; its
posed of four measurement areas: true utility can only be realized when it is eectively used.
The functional approach promoted by the BRM will do
Mission and Business Results little to help accomplish the goals of E-Government if
it is not incorporated into EA business architectures and
Customer Results the management processes of all Federal agencies and
OMB.[1]
Processes and Activities
The SRM establishes the following domains: Provides an introduction and high-level overview of
the contents that will be detailed in Volumes 24 of
Customer Services the model;
Service Categories : classify lower levels of technolo- assets whether they are strategies, business processes,
gies and standards with respect to the business or investments, data, systems, or technologies. EA is driven
technology function they serve. In turn, each Ser- by strategy; it helps an agency identify whether its re-
vice Category comprises one or more Service Stan- sources are properly aligned to the agency mission and
dards. (Bold-face groupings) strategic goals and objectives. From an investment per-
spective, EA is used to drive decisions about the IT in-
Service Standards : dene the standards and tech- vestment portfolio as a whole. Consequently, the primary
nologies that support a Service Category. To support stakeholders of the EA are the senior managers and exec-
agency mapping into the TRM, many of the Service utives tasked with ensuring the agency fullls its mission
Standards provide illustrative specications or tech- as eectively and eciently as possible.[2]
nologies as examples.(Plain text)
By contrast, "segment architecture" denes a simple
roadmap for a core mission area, business service, or en-
The gure on the right provides a high-level depiction of
terprise service. Segment architecture is driven by busi-
the TRM.
ness management and delivers products that improve the
Aligning agency capital investments to the TRM lever- delivery of services to citizens and agency sta. From
ages a common, standardized vocabulary, allowing in- an investment perspective, segment architecture drives
teragency discovery, collaboration, and interoperability. decisions for a business case or group of business cases
Agencies and the federal government will benet from supporting a core mission area or common or shared ser-
economies of scale by identifying and reusing the best vice. The primary stakeholders for segment architecture
solutions and technologies to support their business func- are business owners and managers. Segment architecture
tions, mission, and target architecture. Organized in a is related to EA through three principles:
hierarchy, the TRM categorizes the standards and tech-
nologies that collectively support the secure delivery, ex- structure: segment architecture inherits the frame-
change, and construction of business and application Ser- work used by the EA, although it may be extended
vice Components that may be used and leveraged in a and specialized to meet the specic needs of a core
component-based or service-oriented architecture.[1] mission area or common or shared service.
By denition, Enterprise Architecture (EA) is funda- Results of the Federal Enterprise Architecture program
mentally concerned with identifying common or shared are considered unsatisfactory:
82 CHAPTER 8. GOVERNMENT FRAMEWORKS
8.3.9 References
[1] FEA Consolidated Reference Model Document.FEA
Consolidated Reference Model Document Version 2.3
October 2007. Accessed 28 April 2009.
[4] Common Approach to Federal Enterprise Architecture NIST Enterprise Architecture Model.
(PDF). Oce of Management and Budget. May 2012.
Archived from the original (PDF) on 2013-03-08.
NIST Enterprise Architecture Model (NIST EA
[5] FEA Consolidated Reference Model Document. Federal Model) is a late-1980s reference model for enterprise ar-
chitecture. It denes an enterprise architecture[1] by the
Enterprise Architecture Framework version 2 January 29,
2013. Accessed 2 April 2015. interrelationship between an enterprises business, infor-
[6] 20152016 Baldrige Excellence Framework. Baldrige
mation, and technology environments.[2]
Performance Excellence Program. National Institute of Developed late-1980s by the National Institute of Stan-
Standards and Technology. January 15, 2015. Archived dards and Technology (NIST) and others, the federal gov-
from the original on August 4, 2016. ernment of the United States promoted this reference
[7] FEA (2005) FEA Records Management Prole, Version model in the 1990s as the foundation for enterprise ar-
1.0. December 15, 2005. chitectures of individual U.S. government agencies and
in the overall federal enterprise architecture.[2]
[8] Why Doesnt the Federal Enterprise Architecture
Work?", Stanley B. Gaver, visited 19 May 2016.
ing, planning, and building an integrated set of infor- External Models or Views
mation and information technology architectures. The ES1 ES2 ES3 ES4 External Level
ve layers are dened separately but are interrelated
and interwoven.[2] The model dened the interrelation as
follows:[3]
Conceptual Model Conceptual Level
Data Delivery Systems (Software, Hardware, Com- External schema for user views
munications) support the data architecture.
Conceptual schema integrates external schemata
The hierarchy in the model is based on the notion that Internal schema that denes physical storage struc-
an organization operates a number of business functions, tures
each function requires information from a number of
source, and each of these sources may operate one or
more operation systems, which in turn contain data or- At the center, the conceptual schema denes the ontology
ganized and stored in any number of data systems.[4] of the concepts as the users think of them and talk about
them. The physical schema according to Sowa (2004)
describes the internal formats of the data stored in the
8.4.2 History database, and the external schema denes the view of the
data presented to the application programs".[7]
The NIST Enterprise Architecture Model is initiated in Since the 1970s the NIST had held a series of four work-
1988 in the fth workshop on Information Management shops on Database and Information Management Di-
Directions sponsored by the NIST in cooperation with the rections. Each of the workshops addresses a specic
Association for Computing Machinery (ACM), the IEEE theme:[8]
Computer Society, and the Federal Data Management
Users Group (FEDMUG). The results of this research
project were published as the NIST Special Publication What information about database technology does
500-167, Information Management Directions: The Inte- the manager need to make prudent decisions about
gration Challenge.[3] using new technology, in 1975.
With the proliferation of information technology start- "Information management tools from the standpoint
ing in the 1970s, the job of information management had of: uses; policies and controls; logical and physical
taken a new light, and also began to include the eld of database design in 1980; and
data maintenance. No longer was information manage-
ment a simple job that could be performed by almost any- The nature of information resource management
one. An understanding of the technology involved, and practice and problems in 1985.
the theory behind it became necessary. As information
storage shifted to electronic means, this became more and The fth workshop in 1989 was held by the National
more dicult.[3] Computer Systems Laboratory (NCSL) of the NIST. By
One of the rst overall approaches to building then this was one of the four institutes, that performed
information systems and systems information man- the technical work of the NIST. The specic goal of
agement from the 1970s was the three-schema approach. the NCSL was to conduct research and provide scien-
It proposes to use three dierent views in systems devel- tic and technical services to aid Federal agencies in the
opment, in which conceptual modelling is considered to selection, acquisition, application, and use of computer
be the key to achieving data integration:[6] technology.[9]
84 CHAPTER 8. GOVERNMENT FRAMEWORKS
the integration of systems planning, development, To illustrate the levels of architecture, what has become
and maintenance tools and methods known as the NIST Enterprise Architecture Model, was
presented (see image). In this concept the three layers of
the integration of distributed, heterogeneous com- the three-schema approach are divided into ve layers.
puting environments, and
According to Rigdon et al. (1989) an architecture is a Business Architecture level: This level can picture
clear representation of a conceptual framework of com- the total or a subunit of any corporation, which are
ponents and their relationship at a point in time.[22] It in contact with external organizations.
may for example represent a view of a current situa-
tion with islands of automation, redundant processes and Information architecture level: This level species
data inconsistencies[23] or a future integrated automa- types of content, presentation forms, and format of
tion information structure towards which the enterprise the information required.
will move in a prescribed number on years.[24] The role
Information systems architecture level: Specica-
of standards in architecture is to enable or constrain the
tions for automated and procedure-oriented infor-
architecture and serve as its foundation.[23]
mation systems.
In order to develop an enterprise architecture Rigdon
acknowledge:[17] Data Architecture level: Framework for mainte-
nance, access and use of data, with data dictionary
and other naming conventions.
There are multiple ways to develop an architecture
Data Delivery Systems level: Technical implemen-
There are multiple ways to implement standards
tation level of software, hardware, and communica-
Development and implementation should be cus- tions that support the data architecture.
tomized to the environment
Some sample elements of how the Enterprise Architec-
Yet, every architecture itself can be divided into dif-
ture can be described in more detail is shown in the illus-
ferent levels.
tration.
aspects of the components will be implemented. Al- be shared corporately, for minimizing redundancy,
though the substance of these components, sometimes and for supporting new applications[30]
called architectures or sub-architectures, must be ad-
dressed in every agencys complete Enterprise Architec- Technology Infrastructure : The Technology In-
ture, agencies have great exibility in describing, combin- frastructure component describes and identies the
ing, and renaming the components, which consist of:[21] physical layer including, the functional characteris-
tics, capabilities, and interconnections of the hard-
Business Processes: This component of the Enter- ware, software, and communications, including net-
prise Architecture describes the core business pro- works, protocols, and nodes. It is the wiring dia-
cesses which support the organizations missions. gram of the physical IT infrastructure.[31]
The Business Processes component is a high-level
analysis of the work the agency performs to support
the organizationss mission, vision, and goals, and With the exception of the Business Processes component,
is the foundation of the ITA. Analysis of the busi- the interrelationships among and priorities of these com-
ness processes determine the information needed ponents are not prescribed by this guidance; there is no
and processed by the agency. This aspect of the ITA hierarchy of relationships implied. Furthermore, agen-
must be developed by senior program managers in cies should document not only their current environment
conjunction with IT managers. Without a thorough for each of these components, but also the target environ-
understanding of its business processes and their re- ment that is desired.[21]
lation to the agency missions, the agency will not be
able to use its ITA eectively.
Business processes can be described by decompos- 8.4.4 Applications
ing the processes into derivative business activi-
ties. There are a number of methodologies and
related tools available to help agencies decompose
processes. Irrespective of the tool used, the model
should remain at a high enough level to allow a broad
agency focus, yet suciently detailed to be useful in
decision-making as the agency identies its informa-
tion needs. Agencies should avoid excessive empha-
sis on modeling business processes, which can result
in a waste of agency resources.[27]
Information Flows and Relationships: This compo-
nent analyzes the information utilized by the organi-
zation in its business processes, identifying the infor-
mation used and the movement of the information FDIC EA Framework.[32]
within the agency. The relationships among the var-
ious ows of information are described in this com- The NIST Framework was picked up by several U.S. fed-
ponent. These information ows indicate where the eral agencies and used as the basis for their information
information is needed and how the information is strategy.[33] The reference model is applicated the follow-
shared to support mission functions.[28] ing frameworks:
Applications : The Applications component identi-
es, denes, and organizes the activities that cap- Department of Energy (DOE) Information Archi-
ture, manipulate, and manage the business informa- tecture [34]
tion to support mission operations. It also describes
the logical dependencies and relationships among FDIC Enterprise Architecture Framework is the
business activities.[29] Enterprise Architecture framework of the Federal
Data Descriptions: This component of the Enter- Deposit Insurance Corporation (FDIC).
prise Architecture identies how data is maintained,
accessed, and used. At a high level, agencies dene Federal Enterprise Architecture Framework
the data and describe the relationships among data (FEAF) : The 1999 documentation of the Federal
elements used in the agencys information systems. Enterprise Architecture Framework Version 1.1
The Data Descriptions and Relationships compo- explains how the NIST Framework is used as a
nent can include data models that describe the data foundation of the FEA Framework.[2]
underlying the business and information needs of the
agency. Clearly representing the data and data rela- NWS Enterprise Architecture : Enterprise Archi-
tionships is important for identifying data that can tecture of the National Weather Service[35]
8.4. NIST ENTERPRISE ARCHITECTURE MODEL 87
Application Portability Prole (APP) [16] W. Bradford Rigdon (1989) Architectures and Stan-
dards. In: Information Management Directions: The In-
History of business architecture tegration Challenge. E.N. Fong and A.H. Goldne (eds.).
NIST Sept 1989. p. 135-150
Open-system environment reference model
[17] Rigdon (1989), p. 136
Technical Architecture Framework for Information
Management (TAFIM) [18] Fong and Goldne (1989, p. 136)
Treasury Information System Architecture Frame- [19] J.A Zachman (1993) Concepts for Framework for EA -
work Enterprise Architecture Resources. Zachman International,
Inc. paper. p. 1
[20] Leonor Barroca, Jon Hall and Patrick Hall (200) "An In-
8.4.6 References troduction and History of Software Architectures, Com-
ponents, and Reuse" in: Software Architectures, 2000 p.
This article incorporates public domain material from the 1
National Institute of Standards and Technology website
http://www.nist.gov. [21] Franklin D. Raines, US OBM (1997) Memoranda 97-16
(Information Technology Architectures) M-97-16, issued
June 18, 1997.
[1] Chief Information Ocer Council (2001) A Practical
Guide to Federal Enterprise Architecture Version 1.0 Pref- [22] Rigdon et al. (1989, p. 136)
ace. February 2001.
[23] Rigdon (1989), p. 137
[2] The Chief Information Ocers Council (1999). Federal
Enterprise Architecture Framework Version 1.1. [24] Rigdon et al. (1989, p. 137-38)
September 1999.
[25] Rigdon et al. (1989, p. 139-140)
[3] Elizabeth N. Fong and Alan H. Goldne (1989)
Information Management Directions: The Integration [26] Examples of published architectural frameworks in-
Challenge. National Institute of Standards and Tech- clude the Treasury Information System Architecture
nology (NIST) Special Publication 500-167, September Framework (TISAF), the US Department of Defense
1989. Technical Architecture Framework for Information Man-
agement (TAFIM), and the Department of Energys Infor-
[4] John O'Looney (2002). Wiring Governments: Challenges
mation Architecture Volume 1.
and Possibilities for Public Managers. Greenwood Pub-
lishing Group. p.67. [27] The US Department of Defense includes aspects of the
Business Processes element in its Operational Architec-
[5] Matthew West and Julian Fowler (1999). High Quality
ture; the US Department of Treasury incorporates it into
Data Models. The European Process Industries STEP
its business view.
Technical Liaison Executive (EPISTLE).
[6] STRAP SECTION 2 APPROACH. Retrieved 30 [28] The US Department of Agriculture has incorporated this
September 2008. component into its Business Architecture, while the US
Department of Defense and Treasury have built it into
[7] John F. Sowa (2004). The Challenge of Knowledge their Operational Architectures.
Soup, in: Research Trends in Science, Technology and
Mathematics Education. Edited by J. Ramadas & S. Chu- [29] The US Department of Energy incorporates Business Ap-
nawala, Homi Bhabha Centre, Mumbai, 2006. plications into its Applications Subarchitecture, while the
US Department of Treasury includes them in its Func-
[8] Fong and Goldne (1989, p. 5) tional Architecture.
[9] Fong and Goldne (1989, p. i) [30] The US Department of Agriculture has included in this
element in its Business/Data Architecture, while the US
[10] Frank, Andrew U. Research Group Geoinformation, Vi- Department of Treasury incorporates it in its Information
enna. Accessed JUly 15, 2013. Architecture.
[11] David Terraso (2004) "Robert Fulton, 72, dies: Engi- [31] The US Department of Agriculture had incorporated this
neering professor and county commissioner". at whis- architecture into its Technical Standard and Telecommu-
tle.gatech.edu nications Architectures. US DoD uses its System Archi-
[12] Alan H. Goldne at DBLP. tecture, and US Treasury its Infrastrucsture to describe
the physical layer.
[13] Dale Goodhue at DBLP.
[32] OIG (2005). Implementation of E-Government Princi-
[14] Stanley Y. W. Su at DBLP. ples. May 2005
88 CHAPTER 8. GOVERNMENT FRAMEWORKS
ture Framework
Guidance to Treasury bureaus concerning the devel-
opment and evolution of information systems archi-
tecture,
8.5.1 Overview
Enterprise Architecture
Views
Perspectives
Work products
EA Development Environment.[2]
Eective management and strategic decision mak- The TEAF identies, as shown in the gure, resources
ing, especially for information technology (IT) invest- and work products that provide direction for EA devel-
ments, require an integrated view of the enterprise opment, work products constituting the EA description,
understanding the interrelationships among the business and work products documenting how to accomplishment
organizations, their operational processes, and the infor- an EA implementation. The resources and work prod-
mation systems that support them. An Enterprise Archi- ucts for EA direction and accomplishment are not part of
tecture formalizes the identication, documentation, and the EA description itself, but are developed and applied
management of these interrelationships, and supports the during the overall enterprise life cycle. The TEAF Ma-
management and decision processes. The Enterprise Ar- tri, organizes the subdivisions of the EA description and
chitecture provides substantial support for evolution of an demonstrates the relationships among them. The follow-
enterprise as it anticipates and responds to the changing ing sections describe the subdivisions of the EA and their
needs of its customers and constituents. The Enterprise relationships to the TEAF Matrix.[2]
Architecture is a vital part of the enterprises decision-
making process, and will evolve along with the enter- TEAF Matrix of Views and Perspectives
prises mission.[2]
The TEAF has been designed to help both the bureaus
Views
and the Department develop and maintain their Enter-
prise Architectures. The TEAF aims to establish a com-
mon Enterprise Architecture structure, consistent prac- Functional Information Organizational Infrastructure
tices, and common terminology; and to institutionalize view view view view
The TEAF Matrix aims to provide a simple, uniform a specic methodology or a specic bureaus approach.
structure to an entire framework. As depicted in the g- Each organization needs to follow a documented Enter-
ure, the TEAF Matrix consists of four architectural views prise Life Cycle methodology appropriate to its size, the
(Functional, Information, Organizational, and Infrastruc- complexity of its enterprise, and the scope of its needs.[2]
ture), which are shown as columns, and four perspectives
(Planner, Owner, Designer, and Builder), which appear
as rows. The TEAF Matrix is a four-by-four matrix with Products
a total of 16 cells. The views and perspectives are de-
scribed in the following sections.[2]
When an EA description work product is shown within
one cell of the TEAF Matrix, it means that the main van-
tage points for developing that work product correspond
to that column (view) and row (perspective). However,
information from other views (and sometimes other per-
spectives) is needed to produce a work product. Not all
cells must be lled-in by producing an associated work
product. Each bureau must dene in its EA Roadmap its
plans for producing and using an EA to match its needs.[2]
Conceptual schema
8.5.5 References
[1] FEA Consolidated Reference Model Document. white-
house.gov May 2005.
Lifecycles
9.1 Enterprise life cycle synchronized, systems migrate eciently from legacy
technology environments through evolutionary and incre-
mental developments, and the Agency is able to demon-
strate its return on investment (ROI). The gure on top
illustrates the interaction of the dynamic and interactive
cycles as they would occur over time.[1]
The enterprise life cycle is a key concept in enterprise As a prerequisite to the development of every enterprise
architecture (EA), enterprise engineering[2] and systems architecture, each Agency should establish the need to de-
engineering.[3] The Enterprise Architecture process is velop an EA and formulate a strategy that includes the
closely related to similar processes, as program manage- denition of a vision, objectives, and principles. The g-
ment cycle or systems development life cycle, and has ure shows a representation of the EA process. Executive
similar properties to those found in the product life cy- buy-in and support should be established and an architec-
cle.[4] tural team created within the organization. The team de-
The concept of enterprise life cycle aids in the implemen- nes an approach and process tailored to Agency needs.
tation of an enterprise architecture, and the capital plan- The architecture team implements [1]
the process to build
ning and investment control (CPIC) process that selects, both the baseline and target EAs.
controls, and evaluates investments. Overlying these pro- The architecture team also generates a sequencing plan
cesses are human capital management and information for the transition of systems, applications, and associ-
security management. When these processes work to- ated business practices predicated upon a detailed gap
gether eectively, the enterprise can eectively manage analysis. The architecture is employed in the CPIC and
information technology as a strategic resource and busi- the enterprise engineering and program management pro-
ness process enabler. When these processes are properly cesses via prioritized, incremental projects and the inser-
92
9.1. ENTERPRISE LIFE CYCLE 93
An enterprise life cycle integrates the management, busi- Illustration of the Enterprise Performance Life Cycle of the U.S.
ness, and engineering life cycle processes that span the Department of Health & Human Services.[7]
enterprise to align its business and IT activities. Enter-
prise life cycle refers generally to an organizations ap- The Enterprise Performance Life Cycle (EPLC) encom-
proach for managing activities and making decisions dur- passes the major business functions executed under the
ing ongoing refreshment of business and technical prac- Oce of the Chief Information Ocer (CIO), and in
tices to support its enterprise mission. These activities particular shows at a high level the relationship among the
include investment management, project denition, con- dierent business functions and both the general order
guration management, accountability, and guidance for and the iterative nature of their execution. The placement
systems development according to a system development of enterprise architecture in the center of the EPLC con-
life cycle (SDLC).[6] ceptual diagram, shown in the gure, reects the support-
94 CHAPTER 9. LIFECYCLES
ing and enabling role that enterprise architecture serves [7] U.S. Department of Health & Human Services (2007).
for the major business functions in the Enterprise Perfor- HHS Enterprise Architecture Governance Plan FY2007.
mance Life Cycle.[7]
The Enterprise Architecture (EA) Program explicitly 9.1.5 Further reading
considers the information needs of the Enterprise Perfor-
mance Life Cycle (EPLC) processes in developing and Alain Bernard, Serge Tichkiewitch (2008). Meth-
enhancing the EA Framework, collecting and populating ods and Tools for Eective Knowledge Life-Cycle-
data in the EA Repository, and developing views, reports, Management.
and analytical tools that can be used to facilitate the ex-
ecution of the EPLC processes. The EPLC conceptual Peter Bernus, Laszlo Nemes, Gnter Schmidt
diagram in the gure provides a Departmental perspec- (2003). Handbook on Enterprise Architecture.
tive of key business functions. The EPLC is also relevant
from an individual investment or project perspective, as Jerey O. Grady (2006). System requirements anal-
each new investment passes through each phase of the ysis
EPLC. The investment-level perspective is detailed in the
Arturo Molina, Jose Manuel Sanchez, Andrew Ku-
Enterprise Performance Life Cycle Framework.[7]
siak (1998). Handbook of Life Cycle Engineering:
Concepts, Models, and Technologies.
9.1.3 See also Franois Vernadat (1996). Enterprise Modeling and
Integration: Principles and Applications.
Business analysis
Enterprise architecture planning
9.1.6 External links
Enterprise modeling
Enterprise Life Cycle Management presentation
Organizational life cycle
2005
Product lifecycle management
EA in the Federal Enterprise Life Cycle EA in the
Service-oriented modeling life cycle Federal Enterprise Life Cycle presentation 2006.
Software lifecycle processes
Systems development life cycle 9.2 ISO 12207
Technology life cycle
The ISO/IEC 12207 Systems and software engineering
Whole-life cost Software life cycle processes[1] is an international stan-
dard for software lifecycle processes. It aims to be the
Enterprise integration
standard that denes all the tasks required for developing
and maintaining software.
9.1.4 References The ISO/IEC 12207 standard establishes a process of
lifecycle for software, including processes and activities
[1] Chief Information Ocer Council (2001). A Practical
applied during the acquisition and conguration of the
Guide to Federal Enterprise Architecture
services of the system. Each Process has a set of out-
[2] Kosanke, Kurt, F. Vernadat, and Martin Zelm]. comes associated with it. There are 23 Processes, 95 Ac-
CIMOSA: enterprise engineering and integration. tivities, 325 Tasks and 224 Outcomes (the new ISO/IEC
Computers in industry 40.2 (1999): 83-97. 12207:2008 Systems and software engineering Soft-
[3] Ronald E. Giachetti (2011) Design of Enterprise Systems:
ware life cycle processes denes 43 system and software
Theory, Architecture, and Methods. p. 7 processes).
The standard has the main objective of supplying a com-
[4] Alain Bernard, Serge Tichkiewitch (2008). Methods and
Tools for Eective Knowledge Life-Cycle-Management. p. mon structure so that the buyers, suppliers, develop-
403 ers, maintainers, operators, managers and technicians in-
volved with the software development use a common lan-
[5] DoD Architecture Framework Working Group (2003). guage. This common language is established in the form
DoD Architecture Framework Version 1.0 Deskbook 15 of well dened processes. The structure of the standard
August 2003. was intended to be conceived in a exible, modular way
[6] US Department of the Treasury Chief Information Of- so as to be adaptable to the necessities of whoever uses
cer Council (2000). Treasury Enterprise Architecture it. The standard is based on two basic principles: mod-
Framework. Version 1, July 2000. ularity and responsibility. Modularity means processes
9.2. ISO 12207 95
with minimum coupling and maximum cohesion. Re- Initiation: during this activity the following tasks are
sponsibility means to establish a responsibility for each completed
process, facilitating the application of the standard in
projects where many people can be legally involved. The need is described why to acquire, develop,
or enhance a product;
The set of processes, activities and tasks can be adapted
System requirements are dened and approved
according to the software project. These processes are
if applicable;
classied in three types: basic, for support and organi-
zational. The support and organizational processes must The global software requirements are dened;
exist independently of the organization and the project Evaluation of other options, like a purchase of
being executed. The basic processes are instantiated ac- an o-the-shelf product or enhancement of an
cording to the situation. existing product;
If an o-the-shelf product is purchased, the
9.2.1 History software requirements of this product need to
be analyzed.
ISO/IEC 12207:2008 is newest version of the inter- An acquisition plan is developed, this plan will
national standards. be used further on during the acquisition phase
Revises: ISO/IEC 12207:1995/Amd 2:2004 Acceptance criteria are dened.
Revises: ISO/IEC 12207:1995/Amd 1:2002 Request for proposal preparation: during this activ-
ity the following tasks are completed
First version was published 1995
Acquisition requirements, like System require-
ments and technical constraints such as target
9.2.2 Primary lifecycle processes environment, are dened.
Required ISO/IEC 12207 process for the
The primary lifecycle processes contain the core of pro- project are dened and changed accordingly if
cesses involved in creating a software product. These pro- needed.
cesses are divided into six dierent main processes:
Contract milestones for reviewing and sup-
pliers progress audits are dened.
Acquisition
Prepare Contract: during this activity the following
Supply
tasks are completed
Development
Selection procedure for suppliers are devel-
Operation oped;
Acquisition covers all the activities involved in initiating a Activities of the suppliers according to the
project. The acquisition phase can be divided into dier- agreements made are monitored;
ent activities and deliverables that are completed chrono- Work together with suppliers to guarantee
logically. timely delivery if needed.
96 CHAPTER 9. LIFECYCLES
Acceptance and completion: during this activity the The dierent modules are tested for correct
following tasks are completed functioning. If this is the case the project can
move to the next activity, else the project re-
Acceptance tests and procedures are devel- turns to the module design phase to correct any
oped; errors.
Acceptance and testing on the product is con-
Execute Integration test
ducted;
Conguration management on the delivered The communication between modules is
product is conducted; tested for correct functioning. If this is the
case the project can move to the next activity,
else the project falls back to the high level de-
Supply sign to correct any errors.
During the supply phase a project management plan is de- Execute System test
veloped. This plan contains information about the project
This test checks whether all functional require-
such as dierent milestones that need to be reached. This
ments are present in the product. If this is the
project management plan is needed during the next phase
case the product is completed and the product
which is the development phase.
is ready to be transferred to the customer. Else
the project falls back to the software require-
Development ments activity and the functional requirements
have to be adjusted.
During the development phase the software product is de-
signed, created and tested and will result in a software Operation
product ready to be released to the customer. Throughout
time many people have developed means of developing a The operation and maintenance phases occur simultane-
software application. The choice of developing method ously, the operation-phase consists of activities like assist-
often depends on the present situation. The development ing users in working with the created software product.
method which is used in many projects is the V-model.
Techniques that can be used during the development are
UML for designing and TMap for testing. This entry con- Maintenance
tains the most important steps of the V-model.
The maintenance-phase consists of maintenance-tasks to
Dene functional requirements: during this activity keep the product up and running. The maintenance
the following tasks are completed includes any general enhancements, changes and addi-
tions, which might be required by the end-users.These
Gather the functional requirements, or de- defects and deciencies are usually documented by the
mands, for the product that is to be created. developing organisation to enable future solutions and
known issues addressing in any future maintenance re-
Create High level design: during this activity the fol- leases. There is no disposal phase
lowing tasks are completed
The code is created according to the high level Initiation: during this activity the following deliver-
design and the module design. ables are developed:
Request for proposal preparation: during this activ- Module test: during this activity the following deliv-
ity the following deliverables are developed: erables are developed:
Request for proposal; Module test report, this test report contains
Prepare Contract: during this activity the following the test-results which are formed after a mod-
deliverables are developed: ule test of the application. Based on this test-
report the project-team can decide which ac-
Contract: this is a draft agreement between the tion to undertake further.
company and suppliers, set up by the company.
Integration test: during this activity the following
Negotiate Changes: during this activity the follow- deliverables are developed:
ing deliverables are developed:
Input from the suppliers: suppliers can react Integration test report, this test report contains
on the draft agreement submitted by the com- the test-results which are formed after an inte-
pany, this reaction will result in input from the gration test of the application. Based on this
suppliers test-report the project-team can decide which
action to undertake further.
Update Contract: during this activity the following
deliverables are developed: System test: during this activity the following deliv-
erables are developed:
Final Contract;
System test report;
Supplier monitoring: during this activity the follow-
ing deliverables are developed:
Supplier Monitor Report: this report covers 9.2.5 Example
the advances of the suppliers involved based
on dierent milestones. The method presented in this entry can be used in a com-
pany that is responsible for creating and maintaining a
Acceptance and completion: during this activity the software product for a customer. Especially when this
following deliverables are developed: company decides to build an application from scratch and
Acquisition report: this report covers the ac- that maintenance and assisting in the operation is also
ceptance and completion of the acquisition done by the company developer.
phase.
are then all built in one go as a collection of solution fea- 1. Conduct the preliminary analysis: in this
tures typically over a period of three to nine months, or step, you need to nd out the organiza-
more. These methodologies are obviously quite dier- tions objectives and the nature and scope
ent approaches yet, they both contain the SDLC phases of the problem under study. Even if a
in which a requirement is born, then travels through the problem refers only to a small segment
life cycle phases ending in the nal phase of maintenance of the organization itself, you need to
and support, after-which (typically) the whole life cycle nd out what the objectives of the orga-
starts again for a subsequent version of the software ap- nization itself are. Then you need to see
plication. how the problem being studied ts in with
them.
2. Propose alternative solutions: In dig-
9.3.2 History and details ging into the organizations objectives
and specic problems, you may have al-
The product life cycle describes the process for building ready covered some solutions. Alternate
information systems in a very deliberate, structured and proposals may come from interviewing
methodical way, reiterating each stage of the products employees, clients, suppliers, and/or con-
life. The systems development life cycle, according to sultants. You can also study what com-
Elliott & Strachan & Radford (2004), originated in the petitors are doing. With this data, you
1960s, to develop large scale functional business systems will have three choices: leave the system
in an age of large scale business conglomerates. Informa- as is, improve it, or develop a new system.
tion systems activities revolved around heavy data pro-
cessing and number crunching routines.[6] 3. Describe the costs and benets.
9.3.4 Systems analysis and design Some typical (but common to all types of design analysis)
input artifacts for object-oriented:
The systems analysis and design (SAD) is the pro-
cess of developing information systems (IS) that eec- Conceptual model: Conceptual model is the result
tively use hardware, software, data, processes, and peo- of object-oriented analysis, it captures concepts in
ple to support the companys businesses objectives. Sys- the problem domain. The conceptual model is ex-
tem analysis and design can be considered the meta- plicitly chosen to be independent of implementation
development activity, which serves to set the stage and details, such as concurrency or data storage.
bound the problem. SAD can be leveraged to set the cor-
rect balance among competing high-level requirements in Use case: Use case is a description of sequences of
the functional and non-functional analysis domains. Sys- events that, taken together, lead to a system doing
tem analysis and design interacts strongly with distributed something useful. Each use case provides one or
enterprise architecture, enterprise I.T. Architecture, and more scenarios that convey how the system should
business architecture, and relies heavily on concepts such interact with the users called actors to achieve a spe-
as partitioning, interfaces, personae and roles, and de- cic business goal or function. Use case actors may
ployment/operational modeling to arrive at a high-level be end users or other systems. In many circum-
system description. This high level description is then stances use cases are further elaborated into use case
further broken down into the components and modules diagrams. Use case diagrams are used to identify the
which can be analyzed, designed, and constructed sep- actor (users or other systems) and the processes they
arately and integrated to accomplish the business goal. perform.
SDLC and SAD are cornerstones of full life cycle prod-
uct and system planning. System Sequence Diagram: System Sequence dia-
gram (SSD) is a picture that shows, for a particular
scenario of a use case, the events that external ac-
tors generate, their order, and possible inter-system
9.3.5 Object-oriented analysis events.
Object-oriented analysis (OOA) is the process of ana- User interface documentations (if applicable): Doc-
lyzing a task (also known as a problem domain), to de- ument that shows and describes the look and feel of
velop a conceptual model that can then be used to com- the end products user interface. It is not mandatory
plete the task. A typical OOA model would describe to have this, but it helps to visualize the end-product
computer software that could be used to satisfy a set and therefore helps the designer.
of customer-dened requirements. During the analysis
phase of problem-solving, a programmer might consider Relational data model (if applicable): A data model
a written requirements statement, a formal vision docu- is an abstract model that describes how data is rep-
ment, or interviews with stakeholders or other interested resented and used. If an object database is not
parties. The task to be addressed might be divided into used, the relational data model should usually be cre-
several subtasks (or domains), each representing a dif- ated before the design, since the strategy chosen for
ferent business, technological, or other areas of inter- object-relational mapping is an output of the OO de-
est. Each subtask would be analyzed separately. Im- sign process. However, it is possible to develop the
plementation constraints, (e.g., concurrency, distribution, relational data model and the object-oriented design
persistence, or how the system is to be built) are not con- artifacts in parallel, and the growth of an artifact can
sidered during the analysis phase; rather, they are ad- stimulate the renement of other artifacts.
dressed during object-oriented design (OOD).
The conceptual model that results from OOA will typi- 9.3.6 Life cycle
cally consist of a set of use cases, one or more UML class
diagrams, and a number of interaction diagrams. It may Management and control
also include some kind of user interface mock-up.
The input for object-oriented design is provided by the The SDLC phases serve as a programmatic guide to
output of object-oriented analysis. Realize that an out- project activity and provide a exible but consistent way
put artifact does not need to be completely developed to to conduct projects to a depth matching the scope of
serve as input of object-oriented design; analysis and de- the project. Each of the SDLC phase objectives are de-
sign may occur in parallel, and in practice the results of scribed in this section with key deliverables, a description
one activity can feed the other in a short feedback cycle of recommended tasks, and a summary of related control
through an iterative process. Both analysis and design can objectives for eective management. It is critical for the
be performed incrementally, and the artifacts can be con- project manager to establish and monitor control objec-
tinuously grown instead of completely developed in one tives during each SDLC phase while executing projects.
shot. Control objectives help to provide a clear statement of
9.3. SYSTEMS DEVELOPMENT LIFE CYCLE 103
Software prototyping
9.3.7 Strengths and weaknesses [8] Control and Audit, Information Systems. SDLC (August
2013 ed.). Chapter 5: Institute of Chartered Accountants
Few people in the modern computing world would use of India. p. 5.28.
a strict waterfall model for their SDLC as many mod- [9] Radack, S. (n.d.). The system development life cycle
ern methodologies have superseded this thinking. Some (sdlc). Retrieved from http://csrc.nist.gov/publications/
will argue that the SDLC no longer applies to models like nistbul/april2009_system-development-life-cycle.pdf
Agile computing, but it is still a term widely in use in
technology circles. The SDLC practice has advantages [10] US Department of Justice (2003). INFORMATION RE-
in traditional models of systems development, that lends SOURCES MANAGEMENT Chapter 1. Introduction.
itself more to a structured environment. The disadvan- [11] Marakas, James A. O'Brien, George M. (2010). Man-
tages to using the SDLC methodology is when there is agement information systems (10th ed.). New York:
need for iterative development or (i.e. web development McGraw-Hill/Irwin. pp. 485489. ISBN 0073376817.
or e-commerce) where stakeholders need to review on
a regular basis the software being designed. Instead of [12] U.S. House of Representatives (1999). Systems Develop-
ment Life-Cycle Policy. p.13.
viewing SDLC from a strength or weakness perspective,
it is far more important to take the best practices from [13] Blanchard, B. S., & Fabrycky, W. J.(2006) Systems engi-
the SDLC model and apply it to whatever may be most neering and analysis (4th ed.) New Jersey: Prentice Hall.
appropriate for the software being designed. p.31
A comparison of the strengths and weaknesses of SDLC: [14] Post, G., & Anderson, D., (2006). Management informa-
An alternative to the SDLC is rapid application develop- tion systems: Solving business problems with information
technology. (4th ed.). New York: McGraw-Hill Irwin.
ment, which combines prototyping, joint application de-
velopment and implementation of CASE tools. The ad-
vantages of RAD are speed, reduced development cost, 9.3.10 Further reading
and active user involvement in the development process.
Blanchard, B. S., & Fabrycky, W. J. (2006) Sys-
tems engineering and analysis (4th ed.) New Jersey:
9.3.8 See also Prentice Hall.
Application lifecycle management Cummings, Haag (2006). Management Information
Systems for the Information Age. Toronto, McGraw-
IPO Model
Hill Ryerson
Software development methodologies
Beynon-Davies P. (2009). Business Information
System lifecycle Systems. Palgrave, Basingstoke. ISBN 978-0-230-
20368-6
[4] Software Development Life Cycle (SDLC), Power Point, The Agile System Development Lifecycle
Powered by Google Docs
Pension Benet Guaranty Corporation Informa-
[5] James Taylor (2004). Managing Information Technology tion Technology Solutions Lifecycle Methodology
Projects. p.39..
FSA Life Cycle Framework
[6] Georey Elliott & Josh Strachan (2004) Global Business
Information Technology. p.87. HHS Enterprise Performance Life Cycle Frame-
work
[7] QuickStudy: System Development Life Cycle, By Russell
Kay, May 14, 2002 The Open Systems Development Life Cycle
9.4. TECHNOLOGY LIFE CYCLE 105
System Development Life Cycle Evolution Model- integrated circuits used in a smartphone.
ing The development of a competitive product or process can
Zero Deviation Life Cycle have a major eect on the lifespan of the technology,
making it shorter. Equally, the loss of intellectual prop-
Integrated Defense AT&L Life Cycle Management erty rights through litigation or loss of its secret elements
Chart, the U.S. DoD form of this concept. (if any) through leakages also work to reduce a technol-
ogys lifespan. Thus, it is apparent that the management
of the TLC is an important aspect of technology devel-
9.4 Technology Life Cycle opment.
Most new technologies follow a similar technology ma-
turity lifecycle describing the technological maturity of a
product. This is not similar to a product life cycle, but
applies to an entire technology, or a generation of a tech-
nology.
Technology adoption is the most common phenomenon
driving the evolution of industries along the industry life-
cycle. After expanding new uses of resources they end
with exhausting the eciency of those processes, produc-
ing gains that are rst easier and larger over time then ex-
haustingly more dicult, as the technology matures. In
fact, many authors sustain that actual economical trends
presents clear symptoms of technological maturity, with
particular attention to many traditional industrial sec-
tors including automotive and aeronautical ones.[1] Those
considerations allows a clear verication of the state of
The typical life-cycle of a manufacturing process or production
system from the stages of its initial conception to its culmination technological maturity of the largest part of today trans-
as either a technique or procedure of common practice or to its port vehicles industrial sector and that sustainability ac-
demise. The Y-axis of the diagram shows the business gain to the tion are necessary for both reducing environmental im-
proprietor of the technology while the X-axis traces its lifetime. pact and levels of technological maturity.[2]
9.4.2 Technology perception dynamics Syndication stage: This stage represents the demon-
stration and commercialisation of a new technology,
There is usually technology hype at the introduction of such as, product, material or process with potential
any new technology, but only after some time has passed for immediate utilisation. Many innovations are put
can it be judged as mere hype or justied true acclaim. on hold in R&D laboratories. Only a very small per-
Because of the logistic curve nature of technology adop- centage of these are commercialised. Commerciali-
tion, it is dicult to see in the early stages whether the sation of research outcomes depends on technical as
hype is excessive. well non-technical, mostly economic factors.
The two errors commonly committed in the early stages Diusion stage: This represents the market penetra-
of a technologys development are: tion of a new technology through acceptance of the
innovation, by potential users of the technology. But
tting an exponential curve to the rst part of the
supply and demand side factors jointly inuence the
growth curve, and assuming eternal exponential
rate of diusion.
growth
tting a linear curve to the rst part of the growth Substitution stage: This last stage represents the de-
curve, and assuming that take-up of the new tech- cline in the use and eventual extension of a tech-
nology is disappointing nology, due to replacement by another technology.
Many technical and non-technical factors inuence
the rate of substitution. The time taken in the sub-
stitution stage depends on the market dynamics.
opment costs (the TLC crosses the X-axis), the ownership The exercise of this option is, generally, inferior to seek-
of the technology starts to undergo change. ing participatory exploitation; in other words, engage-
In the case of smaller rms, venture capitalists help clients ment in joint venture, typically in regions where the tech-
enter the stock market for obtaining substantially larger nology would be in the ascent phase,as say, a developing
funds for development, maturation of technology, prod- country. In addition to providing nancial opportunity
uct promotion and to meet marketing costs. A major it allows the technology-owner a degree of control over
route is through initial public oering (IPO) which in- its use. Gain ows from the two streams of investment-
vites risk funding by the public for potential high gain. based and royalty incomes. Further, the vital life of the
technology is enhanced in such strategy.
At the same time, the IPOs enable venture capitalists to
attempt to recover expenditures already incurred by them
through part sale of the stock pre-allotted to them (sub-
Licensing in the decline phase
sequent to the listing of the stock on the stock exchange).
When the IPO is fully subscribed, the assisted enterprise
becomes a corporation and can more easily obtain bank After reaching a point such as D in the above diagram,
loans, etc. if needed. the earnings from the technology begin to decline rather
rapidly. To prolong the life cycle, owners of technology
Strategic alliance partners, allied on research, pursue sep- might try to license it out at some point L when it can still
arate paths of development with the incipient technol- be attractive to rms in other markets. This, then, traces
ogy of common origin but pool their accomplishments the lengthening path, LL'. Further, since the decline is
through instruments such as 'cross-licensing'. Generally, the result of competing rising technologies in this space,
contractual provisions among the members of the con- licenses may be attracted to the general lower cost of the
sortium allow a member to exercise the option of inde- older technology (than what prevailed during its vital life).
pendent pursuit after joint consultation; in which case the
optee owns all subsequent development. Licenses obtained in this phase are 'straight licenses.
They are free of direct control from the owner of the tech-
nology (as would otherwise apply, say, in the case of a
Licensing in the ascent phase joint-venture). Further, there may be fewer restrictions
placed on the licensee in the employment of the technol-
The ascent stage of the technology usually refers to some ogy.
point above Point A in the TLC diagram but actually it The utility, viability, and thus the cost of straight-licenses
commences when the R&D portion of the TLC curve depends on the estimated 'balance life' of the technology.
inects (only that the cashow is negative and unremu- For instance, should the key patent on the technology have
nerative to Point A). The ascent is the strongest phase of expired, or would expire in a short while, the residual via-
the TLC because it is here that the technology is superior bility of the technology may be limited, although balance
to alternatives and can command premium prot or gain. life may be governed by other criteria such as knowhow
The slope and duration of the ascent depends on com- which could have a longer life if properly protected.
peting technologies entering the domain, although they
It is important to note that the license has no way of know-
may not be as successful in that period. Strongly patented
ing the stage at which the prime, and competing technolo-
technology extends the duration period.
gies, are on their TLCs. It would, of course, be evident to
The TLC begins to atten out (the region shown as M) competing licensor rms, and to the originator, from the
when equivalent or challenging technologies come into growth, saturation or decline of the protability of their
the competitive space and begin to eat away marketshare. operations.
Till this stage is reached, the technology-owning rm The license may, however, be able to approximate the
would tend to exclusively enjoy its protability, prefer- stage by vigorously negotiating with the licensor and com-
ring not to license it. If an overseas opportunity does petitors to determine costs and licensing terms. A lower
present itself, the rm would prefer to set up a controlled cost, or easier terms, may imply a declining technology.
subsidiary rather than license a third party.
In any case, access to technology in the decline phase is
a large risk that the licensee accepts. (In a joint-venture
Licensing in the maturity phase this risk is substantially reduced by licensor sharing it).
Sometimes, nancial guarantees from the licensor may
The maturity phase of the technology is a period of stable work to reduce such risk and can be negotiated.
and remunerative income but its competitive viability can There are instances when, even though the technology
persist over the larger timeframe marked by its 'vital life'. declines to becoming a technique, it may still contain
However, there may be a tendency to license out the tech- important knowledge or experience which the licensee
nology to third parties during this stage to lower risk of rm cannot learn of without help from the originator.
decline in protability (or competitivity) and to expand This is often the form that technical service and technical
nancial opportunity. assistance contracts take (encountered often in develop-
108 CHAPTER 9. LIFECYCLES
5. Commercial maturity
9.5 Whole-life cost
9.4.5 See also Whole-life cost, or Life-cycle cost (LCC), refers to the
total cost of ownership over the life of an asset.[1] Also
Background, foreground, sideground and post- commonly referred to as cradle to grave or womb to
ground intellectual property tomb costs. Costs considered include the nancial cost
which is relatively simple to calculate and also the en-
Business cycle vironmental and social costs which are more dicult to
quantify and assign numerical values. Typical areas of
Diusion (business) expenditure which are included in calculating the whole-
life cost include, planning, design, construction and ac-
Disruptive technology quisition, operations, maintenance, renewal and rehabili-
tation, depreciation and cost of nance and replacement
Mass customization or disposal.
service costs in the future. When making this calculation, Asset management
the depreciation cost on the capital expense should not be
included (refer page 2 of [2] During the life of the asset, decisions about how to main-
tain and operate the asset need to be taken in context with
the eect these activities might have on the residual life of
the asset. If by investing 10% more per annum in main-
tenance costs the asset life can be doubled, this might be
9.5.2 Environmental and social a worthwhile investment.
Other issues which inuence the lifecycle costs of an asset
Main article: Life cycle assessment include:
waiting), costs of security breaches (in loss of reputa- [3] Whole Life Costing For Sustainable Drainage
tion and recovery costs), costs of disaster preparedness
and recovery, oor space, electricity, development ex- [4] About Gartner TCO
penses, testing infrastructure and expenses, quality assur- [5] TCO: Whats Old is New
ance, boot image control, marginal incremental growth,
decommissioning, e-waste handling, and more. When in-
corporated in any nancial benet analysis (e.g., ROI, 9.5.8 Further reading
IRR, EVA, ROIT, RJE) TCO provides a cost basis for
determining the economic value of that investment. Riggs, James L., (1982), Engineering economics.
McGraw-Hill, New York, 2nd edition, 1982.
Understanding and familiarity with the term TCO has
been somewhat facilitated as a result of various compar- Norris, G. A. (2001): Integrating Life Cycle Cost
isons between the TCO of open source and proprietary Analysis and LCA, in: The International Journal of
software. Because the software cost of open source soft- Life Cycle Assessment, Jg. 6, H. 2, p. 118120.
ware is often zero, TCO has been used as a means to jus-
tify the up-front licensing costs of proprietary software. Schaltegger, S. & Burritt, R. (2000): Contemporary
Studies which attempt to establish the TCO and provide Environmental Accounting. Issues, Concepts and
comparisons have as a result been the subject of many Practice. Sheeld: Greenleaf Publ.
discussions regarding the accuracy or perceived bias in
Kicherer, A.; Schaltegger, S.; Tschochohei, H. &
the comparison.
Ferreira Pozo, B.: Eco-Eciency. Combining Life
Cycle Assessment and Life Cycle Costs via Normal-
9.5.5 Automobile industry, nances ization, International Journal of LCA, 2007, Vol 12,
No 7, 537-543.
Total cost of ownership is also common in the automobile
industry. In this context, the TCO denotes the cost of
owning a vehicle from the purchase, through its mainte-
9.5.9 External links
nance, and nally its sale as a used car. Comparative TCO Whole-life cost forum
studies between various models help consumers choose a
car to t their needs and budget. Whole-life costing for sustainable drainage
TCO can and often does vary dramatically against TCA BSRIA article: What is whole life cost analysis?"
(total cost of acquisition), although TCO is far more
relevant in determining the viability of any capital in- Role of depreciation
vestment, especially with modern credit markets and
nancing. TCO also directly relates to a businesss to- Cost Structure and Life Cycle Cost (LCC) for Mil-
tal costs across all projects and processes and, thus, its itary Systems - Papers presented at the RTO Stud-
protability. Some instances of TCO appear to refer ies, Analysis and Simulation Panel (SAS) Sympo-
to total cost of operation, but this may be a subset of sium held in Paris, France, 24-25 October 2001
the total cost of ownership if it excludes maintenance and
support costs.
9.5.7 References
[1] Association of Local Government Engineers New
Zealand: Infrastructure Asset Management Manual,
June 1998 - Edition 1.1
[2] http://www.business.govt.nz/procurement/pdf-library/
agencies/guides-and-tools/guide-total-cost-ownership.
pdf
Chapter 10
Modelling
111
112 CHAPTER 10. MODELLING
opportunities, and establish a basis for determining prod- based on the data requirements for the application that
uct and service costs.[17] A function model is created with is being developed, perhaps in the context of an activity
a functional modelling perspective. A functional perspec- model. The data model will normally consist of entity
tives is one or more perspectives possible in process mod- types, attributes, relationships, integrity rules, and the
elling. Other perspectives possible are for example be- denitions of those objects. This is then used as the start
havioural, organisational or informational.[18] point for interface or database design.[20]
A functional modelling perspective concentrates on de-
scribing the dynamic process. The main concept in this
Business process modelling
modelling perspective is the process, this could be a func-
tion, transformation, activity, action, task etc. A well-
known example of a modelling language employing this
perspective is data ow diagrams. The perspective uses
four symbols to describe a process, these being: Check status
of working group
Working
group still
Yes [Send]
Send current
active? issue list
Working Friday at
group 6 PM
active Pacic Time
Design & Engineering Methodology for Organiza- engineering principals to the management of enterprises.
tions (DEMO) It encompasses the application of knowledge, principles,
and disciplines related to the analysis, design, implemen-
Dynamic Enterprise Modeling tation and operation of all elements associated with an en-
Enterprise Modelling Methodology/Open Dis- terprise. In essence this is an interdisciplinary eld which
tributed Processing (EMM/ODP) combines systems engineering and strategic management
as it seeks to engineer the entire enterprise in terms of the
Extended Enterprise Modeling Language products, processes and business operations. The view is
one of continuous improvement and continued adapta-
Multi-Perspective Enterprise Modelling tion as rms, processes and markets develop along their
(MEMO),[23] life cycles. This total systems approach encompasses the
Process modelling such as BPMN, CIMOSA, DYA, traditional areas of research and development, product
IDEF3, LOVEM, PERA, etc. design, operations and manufacturing as well as informa-
tion systems and strategic management.[25] This elds is
Integrated Enterprise Modeling (IEM), and related to engineering management, operations manage-
ment, service management and systems engineering.
Modelling the enterprise with multi-agent systems.
In the context of software development a specic eld
More enterprise modelling techniques are developed into of enterprise engineering has emerged, which deals with
Enterprise Architecture framework such as: the modelling and integration of various organizational
and technical parts of business processes.[26] In the con-
text of information systems development it has been the
ARIS - ARchitecture of Integrated Information Sys- area of activity in the organization of the systems analy-
tems sis, and an extension of the scope of Information Mod-
[27]
DoDAF - the US Department of Defense Architec- elling. It can also be viewed as the extension and gen-
ture Framework eralization of the systems analysis and systems design
phases of the software development process.[28] Here En-
OBASHI The OBASHI Business & IT methodology terprise modelling can be part of the early, middle and
and framework late information system development life cycle. Explicit
representation of the organizational and technical sys-
RM-ODP - Reference Model of Open Distributed
tem infrastructure is being created in order to understand
Processing
the orderly transformations of existing work practices.[28]
TOGAF - The Open Group Architecture Frame- This eld is also called Enterprise architecture, or dened
work with Enterprise Ontology as being two major parts of En-
terprise architecture.[24]
Zachman Framework - an architecture framework,
based on the work of John Zachman at IBM in the
1980s 10.1.6 Related elds
Service-oriented modeling framework (SOMF), Business reference modelling
based on the work of Michael Bell
Services for Business
And metamodelling frameworks such as: Defense & National Security Environmental Management areas (4)
Citizens
Homeland Security Natural Resources
Purpose of Intelligence Operations Education Disaster Management
Government Law Enforcement Energy Community & Social Services Lines of
International Aairs & Commerce Health Economic Development Business (39)
Litigation & Judical Activities Transportation Workforce Management
Correctional Activities Income Security
denes in a series of reference models, how to organize and cooperative decision processes, resource limitations,
the structure and views associated with an Enterprise Ar- environmental and geographical constraints, institutional
chitecture. and legal requirements and purely random uctuations.
A reference model in general is a model of something Economists therefore must make a reasoned choice of
that embodies the basic goal or idea of something and which variables and which relationships between these
can then be looked at as a reference for various purposes. variables are relevant and which ways of analyzing and
A business reference model is a means to describe the presenting this information are useful.
business operations of an organization, independent of
the organizational structure that perform them. Other Ontology engineering
types of business reference model can also depict the re-
lationship between the business processes, business func- Ontology engineering or ontology building is a subeld
tions, and the business areas business reference model. of knowledge engineering that studies the methods and
These reference model can be constructed in layers, and methodologies for building ontologies. In the domain
oer a foundation for the analysis of service components, of enterprise architecture, an ontology is an outline or
technology, data, and performance. a schema used to structure objects, their attributes and
relationships in a consistent manner.[4] As in enterprise
modelling, an ontology can be composed of other ontolo-
Economic modelling
gies. The purpose of ontologies in enterprise modelling is
to formalize and establish the sharability, re-usability, as-
i similation and dissemination of information across all or-
LM ganizations and departments within an enterprise. Thus,
an ontology enables integration of the various functions
and processes which take place in an enterprise.[32]
One common language with well articulated structure and
vocabulary would enable the company to be more e-
cient in its operations. A common ontology will allow
i2
for eective communication, understanding and thus co-
ordination among the various divisions of an enterprise.
There are various kinds of ontologies used in numerous
i1 environments. While the language example given ear-
lier dealt with the area of information systems and design,
IS2 other ontologies may be dened for processes, methods,
activities, etc., within an enterprise.[4]
IS1 Using ontologies in enterprise modelling oers several
Y1 Y2 Y
advantages. Ontologies ensure clarity, consistency, and
structure to a model. They promote ecient model def-
inition and analysis. Generic enterprise ontologies allow
A diagram of the IS/LM model for reusability of and automation of components. Be-
cause ontologies are schemata or outlines, the use of on-
Economic modelling is the theoretical representation of tologies does not ensure proper enterprise model deni-
economic processes by a set of variables and a set of tion, analysis, or clarity. Ontologies are limited by how
logical and/or quantitative relationships between them. they are dened and implemented. An ontology may or
The economic model is a simplied framework designed may not include the potential or capability to capture all
to illustrate complex processes, often but not always using of the aspects of what is being modelled.[4]
mathematical techniques. Frequently, economic models
use structural parameters. Structural parameters are un-
derlying parameters in a model or class of models.[30] A Systems thinking
model may have various parameters and those parameters
may change to create various properties.[31] Main article: Systems thinking
In general terms, economic models have two functions:
rst as a simplication of and abstraction from observed The modelling of the enterprise and its environment
data, and second as a means of selection of data based could facilitate the creation of enhanced understanding
on a paradigm of econometric study. The simplication of the business domain and processes of the extended
is particularly important for economics given the enor- enterprise, and especially of the relationsboth those
mous complexity of economic processes. This complex- that hold the enterprise together and those that extend
ity can be attributed to the diversity of factors that deter- across the boundaries of the enterprise. Since enterprise
mine economic activity; these factors include: individual is a system, concepts used in system thinking[33] can be
116 CHAPTER 10. MODELLING
successfully reused in modelling enterprises. [11] Doumeingts, G., Vallespir, B., Zanettin, M. and Chen, D.
(1992) GIM, GRAI Integrated Methodology - A methodol-
This way a fast understanding can be achieved throughout ogy for Designing CIM systems, Version 1.0. Unnumbered
the enterprise about how business functions are working Report, LAP/GRAI, University of Bordeaux I, France
and how they depend upon other functions in the organi-
zation. [12] Mark S. Fox and Michael Gruninger (1998) "Enterprise
Modeling". American Association for Articial Intelli-
gence.
10.1.7 See also
[13] Naylor, T. (1970) Corporate simulation models and the
Business process modelling economic theory of the rm, in Schrieber, A. (editor)
Corporate simulation models, University of Washing-
Enterprise architecture ton Press, Seattle, 1970, pp 1-35.
Enterprise Architecture framework [14] Gershefski, G. (1971) Whats happening in the world of
corporate models?", Interfaces, Vol 1, No 4. p.44
Enterprise integration
[15] Beer, Staord. (1979) The Heart of Enterprise, Wiley.
Enterprise life cycle
[16] FIPS Publication 183 released of IDEF December 1993
ISO 19439 by the Computer Systems Laboratory of the National In-
stitute of Standards and Technology (NIST).
Enterprise Data Modeling
[17] Readers Guide to IDEF0 Function Models. Accessed 27
Nov 2008.
10.1.8 References
[18] Process perspectives. In: Metamodeling and method engi-
[1] Paul R. Smith & Richard Sarfaty (1993). Creating a neering, Minna Koskinen, 2000.
strategic plan for conguration management using Com-
puter Aided Software Engineering (CASE) tools. Pa- [19] Whitten, Jerey L.; Lonnie D. Bentley, Kevin C. Dittman.
per For 1993 National DOE/Contractors and Facilities (2004). Systems Analysis and Design Methods. 6th edi-
CAD/CAE Users Group. tion. ISBN 0-256-19906-X.
[2] Cornelius T. Leondes, Richard Henry Frymuth Jackson [20] Matthew West and Julian Fowler (1999). Developing
(1992). Manufacturing and Automation Systems: Tech- High Quality Data Models. The European Process Indus-
niques and Technologies. Academic Press, 1992. ISBN tries STEP Technical Liaison Executive (EPISTLE).
0-12-012745-8, p.97
[21] Haim Kilov. Business models - A Guide for Business and
[3] F.B. Vernadat (1997). Enterprise Modelling Languages IT. Prentice-Hall, 2002.
ICEIMT'97 Enterprise Integration - International Con-
sensus. EI-IC ESPRIT Project 21.859. [22] Frank Lillehagen, John Krogstie (2008). Active Knowl-
edge Modeling of Enterprises. Springer, 2008. ISBN 3-
[4] James K. Ostie (1996). An Introduction to Enterprise 540-79415-8
Modeling and Simulation
[23] Ulrich Frank (2002). "Multi-Perspective Enterprise Mod-
[5] E. Aranow (1991). Modeling Exercises Shape Up En- eling (MEMO): Conceptual Framework and Modeling
terprises. In: Software Magazine Vol.11 , p. 36-43 Languages". In: Proceedings of the Hawaii International
Conference on System Sciences (HICSS-35). Los Alamitos,
[6] C. J. Ptrie Jr. (1992). Introduction, In: Enterprise In-
CA. Ralph H. Sprague, Jr. (eds.). IEEE Computer Society
tegration Modeling - Proceedings of the First International
Press.
Conference MIT Press, p. 563.
[7] Enterprise modeling by Ulrich Frank (2009) at wi- [24] Jan Dietz (2006). Enterprise Ontology - Theory and
inf.uni-due.de. Retrieved May 30, 2009. Methodology. Springer-Verlag Berlin Heidelberg.
[8] Young, J. W., and Kent, H. K. (1958). Abstract Formu- [25] Enterprise Engineering Research at Royal Holloway led
lation of Data Processing Problems. In: Journal of In- by Dr Alan Pilkington, Ver 9.08. Accessed 4 November
dustrial Engineering. Nov-Dec 1958. 9(6), pp. 471-479 2008.
[9] Janis A. Bubenko jr (2007) From Information Alge- [26] Vernadat, F.B. (1996) Enterprise Modeling and Integra-
bra to Enterprise Modelling and Ontologies - a Historical tion: Principles and Applications. Chapman & Hall, Lon-
Perspective on Modelling for Information Systems. In: don, ISBN 0-412-60550-3.
Conceptual Modelling in Information Systems Engineering.
John Krogstie et al. eds. pp 1-18 [27] J A Bubenko (1993). Extending the Scope of Informa-
tion Modelling. In: Proceedings of the 4th International
[10] Doumeingts, Guy (1984) La Mthode GRAI. PhD. Thesis, Workshop on the Deductive Approach to Information Sys-
University of Bordeaux I, Bordeaux, France. (In French). tems and Databases, Costa Brava, Catalonia. 1993.
10.1. ENTERPRISE MODELLING 117
Collaboration
11.1 Business analyst The BA may also support the development of training
material, participates in the implementation, and pro-
A business analyst (BA) is someone who analyzes an vides post-implementation support. This may involve the
organization or business domain (real or hypothetical) and development of project plans and often requires project
documents its business or processes or systems, assessing management skills.
the business model or its integration with technology.
The International Institute of Business Analysis (IIBA) 11.1.2 Typical deliverables
describes the role as a liaison among stakeholders in or-
der to understand the structure, policies, and operations 1. Business requirements, i.e. business plan, key per-
of an organization, and to recommend solutions that en- formance indicator, project plan...
able the organization to achieve its goals.[1]
2. Functional requirements, i.e. logical data models,
The role of a systems analyst can also be dened as a use case scenarios, work instructions, reports...
bridge between the business problems and the technol-
ogy solutions. Here business problems can be anything 3. Non-functional requirements
about business systems, for example the model, process,
or method. The technology solutions can be the use of 4. As-is processes, e.g. dataow diagrams, owcharts
technology architecture, tools, or software application.
5. To-be processes, e.g. dataow diagrams, owcharts
So System Analysts are required to analyze, transform
and ultimately resolve the business problems with the help 6. Data models, i.e. data requirements expressed as a
of technology. documented data model of some sort
There are at least four types of business analysis: The BA records requirements in some form of require-
ments management tool, whether a simple spreadsheet or
1. Strategic planning to identify the organizations a complex application. Within the systems development
business needs life cycle, the business analyst typically performs a liai-
son function between the business side of an enterprise
2. Business model analysis to dene the organiza- and the providers of IT services.
tions policies and market approaches
118
11.2. SYSTEMS ANALYSIS 119
Systems analyst
11.2.2 Information technology
Use case
The development of a computer-based information sys-
tem includes a system analysis phase. This helps produce
11.1.5 References the data model, a precursor to creating or enhancing a
database. There are a number of dierent approaches
[1] International Institute of Business Analysis (IIBA). A
to system analysis. When a computer-based information
Guide to the Business Analysis Body of Knowledge, 2.0
system is developed, system analysis (according to the
(BABOK Guide 2). Cited in: Jerry Lee Jr. Ford (2010),
UML for the IT Business Analyst. p. 2 Waterfall model) would constitute the following steps:
This article is about the interdisciplinary eld. For the Fact-nding measures, designed to ascertain the re-
analysis of systems in electrical engineering, see system quirements of the systems end-users (typically in-
analysis. volving interviews, questionnaires, or visual obser-
vations of work on the existing system)
The Merriam-Webster dictionary denes system analy- Gauging how the end-users would operate the sys-
sis as the process of studying a procedure or business tem (in terms of general experience in using com-
in order to identify its goals and purposes and create puter hardware or software), what the system would
systems and procedures that will achieve them in an ef- be used for and so on
cient way. Another view sees system analysis as a
problem-solving technique that decomposes a system into
Another view outlines a phased approach to the process.
its component pieces for the purpose of the studying how
This approach breaks system analysis into 5 phases:
well those component parts work and interact to accom-
plish their purpose.[1] Analysis and synthesis, as scientic
methods, always go hand in hand; they complement one Scope Denition: denoting an instrument for ob-
another. Every synthesis builds upon the results of a pre- serving, viewing, or examining
ceding analysis, and every analysis requires a subsequent Problem analysis: analyzing the problem that arises
synthesis in order to verify and correct its results.
The eld of system analysis relates closely to Requirements analysis: determining the conditions
requirements analysis or to operations research. It that need to be met
is also an explicit formal inquiry carried out to help a Logical design: looking at the logical relationship
decision maker identify a better course of action and among the objects
make a better decision than she might otherwise have
made.[2] Decision analysis: making a nal decision
120 CHAPTER 11. COLLABORATION
Use cases are widely used system analysis modeling tools Whitten, Jeery L., Lonnie D. Bentley, and Kevin
for identifying and expressing the functional require- C. Dittman. Fundamentals of system analysis and
ments of a system. Each use case is a business scenario design methods. (2004).
or event for which the system must provide a dened re-
sponse. Use cases evolved from object-oriented analysis.
11.2.8 External links
The discipline of what is today known as policy analysis A useful set of guides and a case study about the
originated from the application of system analysis when it practical application of business and system analysis
was rst instituted by United States Secretary of Defense methods
Robert McNamara. A comprehensive description of the discipline of
system analysis from Simmons College, Boston,
MA, USA (Archive of original from www.simmons.
11.2.4 Practitioners edu)
Practitioners of system analysis are often called up to dis- System Analysis and Design introductory level
sect systems that have grown haphazardly to determine lessons
the current components of the system. This was shown
during the year 2000 re-engineering eort as business Template:System Engineering
and manufacturing processes were examined as part of
the Y2K automation upgrades.[4] Employment utilizing
system analysis include system analyst, business analyst,
manufacturing engineer, system architect, enterprise ar- 11.3 Information architecture
chitect, software architect, etc.
Information architecture (IA) is the structural design
While practitioners of system analysis can be called upon
of shared information environments; the art and science
to create new systems, they often modify, expand or
of organizing and labelling websites, intranets, online
document existing systems (processes, procedures and
communities and software to support usability and nd-
methods). Researchers and practitioners rely on system
ability; and an emerging community of practice focused
analysis. Activity system analysis has been already ap-
on bringing principles of design and architecture to the
plied to various research and practice studies including
digital landscape.[1] Typically, it involves a model or
business management, educational reform, educational
concept of information that is used and applied to activi-
technology, etc.
ties which require explicit details of complex information
systems. These activities include library systems and
11.2.5 See also database development.
Information architecture is considered to have been
11.2.6 References founded by Richard Saul Wurman.[2] Today there is a
growing network of active IA specialists who constitute
[1] System Analysis and Design for the Global Enterprise by the Information Architecture Institute.[3]
Lonnie D. Bentley p.160 7th edition
Peter Merholz
8. The practice of organizing the information / content
/ functionality of a web site so that it presents the best Eric Reiss
user experience it can, with information and services
being easily usable and ndable (as applied to web Donna Spencer
design and development).[8]
Thomas Vander Wal
Christina Wodtke
Debate
Card sorting
Visualization (graphics) Knowledge visualization Resmini, Andrea; Rosati, Luca (2011). Pervasive
Information Architecture - Designing Cross-channel
Waynding User Experiences (1st ed.). Morgan Kauman.
ISBN 0-123-82094-4.
Web graph
[7] Toms, Elaine (17 May 2012). Information interac- 11.4 Solutions Architect
tion: Providing a framework for information architec-
ture. Journal of the American Society for Information
Science and Technology. 53 (10.1002/asi.10094).
A solution architect, in information technology, is a
practitioner of solution architecture. Typically part of the
[8] Information Architecture. Mozilla Developer Network. solution development team, the solution architect trans-
lates requirements created by functional analysts into the
[9] Dillon, A (2002). Information Architecture in JASIST: architecture for that solution and describing it through
Just where did we come from?". Journal of the American
architecture and design artifacts. The rest of the devel-
Society for Information Science and Technology. 53 (10):
opment team then uses those artifacts to implement the
82123. doi:10.1002/asi.10090.
solution. The solution architects process typically in-
[10] Wurman, Introduction, in: Information Architects volves selecting the most appropriate technology for the
(1997). p. 16. problem.[1][2]
11.5. SOFTWARE ARCHITECT 123
11.4.1 Overview of the role sourced. Both may employ a solution architect to govern
an implementation project, or play a leading role within
An individual performing the role of a solution architect it.
focuses on converting requirements into the architecture
and design that ultimately constitute the blueprint for the
solution. In that process, the solution architect usually re- 11.4.3 References
lies on design patterns from their previous engagements,
published reference architectures, and on guidance from [1] Breaking Down Software Development Roles, an Inter-
enterprise architecture. In their eorts, solution archi- net.com Developer eBook, 2006 Jupitermedia Corp.
tects balance architectural concerns of the projects with [2] R. Bogue Anatomy of a Software Development Role:
the concerns of the enterprise.[1][2][3] Solution Architect, [online] Available: http://www.
The solution architect is often the development team developer.com/mgmt/article.php/3504496
leader. As such, they are often expected to provide moti- [3] Mistrk Ivan, Antony Tang, Rami Bahsoon, Judith A.
vation and guidance to the entire development team dur- Staord. (2013), Aligning Enterprise, System, and Soft-
ing the systems development life cycle. The solution ar- ware Architectures. Business Science Reference.
chitect must ensure buy-in from the development team,
so that the team is motivated to match the detailed design
of the solution to the higher-level architecture.[1][2]
11.5 Software architect
Solution architects play an important role in ensuring that
the solution architecture aligns with the roadmaps estab-
A software architect is a software expert who makes
lished by the enterprise architecture, and that it adheres
high-level design choices and dictates technical standards,
to the enterprise architecture principles. Solution archi-
including software coding standards, tools, and platforms.
tects are both a consumer and contributor to enterprise
The leading expert is referred to as the chief architect.
architecture collateral. Often, the patterns and guidance
solution architects develop becomes reusable in a broader
enterprise architecture context.[3] 11.5.1 History
The software architect concept began to take hold when
11.4.2 Solution architects vs. enterprise object-oriented programming (OOP) was coming into
architects more widespread use (in the late 1990s and early years
of the 21st century). OOP allowed ever-larger and more
Solution architects in large organizations often act as the complex applications to be built, which in turn required
bridge between [architecture] and applications architec- increased high-level application and system oversight.
ture.
An enterprise architects deliverables are usually more ab-
11.5.2 Responsibilities
stract than a solution architects, but not always. The main
distinction between the two lies in their dierent goals.
The main responsibilities of a software architect include:
The enterprise architect is primarily employed to design,
plan, and govern strategic and cross-organisational ratio-
nalization or optimization of an enterprises services, pro- Limit choices available during development by
cesses, or components. The solution architect primarily
helps programmers and project managers in the design, choosing a standard way of pursuing
planning, and governance of projects of any kind. application development
A solution architect may have a reporting line to an enter- creating, dening, or choosing an
prise architect, but the inuence the enterprise architect application framework for the applica-
team has on solution architects depends on an organisa- tion
tions policies and management structure. So, the extent
to which a solution architects work derives from an en- Recognize potential reuse in the organization or in
terprise architects road maps vary from 0 to 100 percent. the application by
Where the solution architect starts and stops depends on
the funding model for the process of solution identica- observing and understanding the broader
tion and delivery. For example, an enterprise may employ system environment
a solution architect on a feasibility study, or to prepare a
solution vision or solution outline for an invitation to ten- creating the component design
der. A supplier may employ a solution architect at bid having knowledge of other applications in
time, before any implementation project is costed or re- the organization
124 CHAPTER 11. COLLABORATION
Subdivide a complex application, during the design System architect (singular), which is often used as a
phase, into smaller, more manageable pieces synonym for application architect. However, if one
subscribes to Systems theory and the idea that an
Grasp the functions of each component within the enterprise can be a system, then System Architect
application could also mean Enterprise Architect.
Understand the interactions and dependencies Systems architect (plural), which is often used as a
among components synonym for enterprise architect or solution archi-
tect.
Communicate these concepts to developers
environment, especially the user), and the technologies requirements into discrete partitions such that a
and resources to be used in the design. minimum of communications is needed among
The Systems Architects work must avoid implementation partitions, and between the user and the system.
issues and readily permit unanticipated exten- Partitioning large systems into (successive layers of)
sions/modications in future stages. Because of the subsystems and components each of which can be
extensive experience required for this, the Systems handled by a single engineer or team of engineers or
Architect is typically a very senior technician with sub- subordinate architect.
stantial, but general, knowledge of hardware, software,
and similar systems. But above all, the systems architect Interfacing with the design and implementation en-
must be reasonably familiar with the users domain of gineers and architects, so that any problems arising
experience (that is, the architect of an air trac system during design or implementation can be resolved in
needs to be more than supercially familiar with all of accordance with the fundamental design concepts,
the tasks of an air trac system, including those of all and user needs and constraints.
levels of users).
Ensuring that a maximally robust design is devel-
oped.
11.6.1 Overview
Generating a set of acceptance test requirements, to-
Systems Architects interface with multiple stakeholders gether with the designers, test engineers, and the
in an organization in order to understand the various lev- user, which determine that all of the high level
els of requirements, the domain, the viable technolo- requirements have been met, especially for the
gies, and anticipated development. Their work includes computer-human-interface.
determining multiple design alternatives, assessing such
Generating products such as sketches, models, an
alternatives based on all identied constraints (such as
early user guide, and prototypes to keep the user and
cost, schedule, space, power, safety, usability, reliabil-
the engineers constantly up to date and in agreement
ity, maintainability, availability, and so on), and selecting
on the system to be provided as it is evolving.
the most suitable options for further design. The output
of such work sets the core properties of the system, and Ensuring that all architectural products and products
those that are hardest to change later. with architectural input are maintained in the most
In small systems the architecture is typically dened di- current state and never allowed to become obsolete.
rectly by developers. In larger systems, a Systems Ar-
chitect may be appointed to outline the overall system
and interface with the users and stakeholders. Very large, 11.6.2 Systems architect: topics
highly complex systems may include multiple architects,
in which case the architects work together to integrate Large systems architecture was developed as a way to
their subsystems or aspects, and may respond to a Chief handle systems too large for one person to conceive of,
Architect responsible for the entire system. let alone design. Systems of this size are rapidly becom-
ing the norm, so architectural approaches and architects
In systems design, the architects and engineers are re- are increasingly needed to solve the problems of large sys-
sponsible for: tems. In general, increasingly large systems are reduced
to 'human' proportions by a layering approach, where
Interfacing with the user(s) and sponsor(s) and all each layer is composed of a number of individually com-
other stakeholders in order to determine their (evolv- prehensible sub-layers-- each having its own principal en-
ing) needs. gineer and/or architect. A complete layer at one level will
Generating the highest level of system requirements, be shown as a functional 'component' of a higher layer.
based on the users needs and other constraints.
Ensuring that this set of high level requirements is Users and sponsors
consistent, complete, correct, and operationally de-
ned. Architects are expected to understand human needs and
develop humanly functional and aesthetically pleasing
Performing costbenet analyses to determine products. A good architect is also the principal keeper of
whether requirements are best met by manual, soft- the users vision of the end product and of the process
ware, or hardware functions; making maximum use of deriving requirements from and implementing that vi-
of commercial o-the-shelf or already developed sion.
components.
Architects do not follow exact procedures. They commu-
Developing partitioning algorithms (and other nicate with users/sponsors in a highly interactive way
processes) to allocate all present and foreseeable together they extract the true requirements necessary for
126 CHAPTER 11. COLLABORATION
the designed system. The architect must remain con- tion space, whereas the user may be thinking in terms of
stantly in communication with the end users and with the solving a problem of getting people from point A to point
(principal) systems engineers. Therefore, the architect B in a reasonable amount of time and with a reasonable
must be intimately familiar with the users environment expenditure of energy, or of getting needed information
and problem, and with the engineering environment(s) of to customers and sta. A systems architect is expected to
likely solution spaces. combine knowledge of both the architecture of the users
world and of (all potentially useful) engineering systems
architectures. The former is a joint activity with the user;
High level requirements the latter is a joint activity with the engineers. The prod-
uct is a set of high level requirements reecting the users
The user requirements specication should be a joint requirements which can be used by the engineers to de-
product of the user and designer: the user brings his needs velop systems design requirements.
and wish list, the architect brings knowledge of what is
likely to prove doable within cost, time and other con- Because requirements evolve over the course of a project,
straints. When the user needs are translated into a set of especially a long one, an architect is needed until the sys-
high level requirements is also the best time to write the tem is accepted by the user: the architect ensures that
rst version of the acceptance test, which should, there- all changes and interpretations made during the course of
after, be religiously kept up to date with the requirements. development do not compromise the users viewpoint.
That way, the user will be absolutely clear about what s/he
is getting. It is also a safeguard against untestable require-
Cost/benet analyses
ments, misunderstandings, and requirements creep.
The development of the rst level of engineering require- Architects are generalists. They are not expected to be
ments is not a purely analytical exercise and should also experts in any one technology but are expected to be
involve both the architect and engineer. If any compro- knowledgeable of many technologies and able to judge
mises are to be made to meet constraints- the archi- their applicability to specic situations. They also ap-
tect must ensure that the nal product and overall look ply their knowledge to practical situations, but evaluate
and feel do not stray very far from the users intent. The the cost/benets of various solutions using dierent tech-
engineer should focus on developing a design that opti- nologies, for example, hardware versus software versus
mizes the constraints but ensures a workable and reli- manual, and assure that the system as a whole performs
able product. The provision of needed services to the according to the users expectations.
user is the true function of an engineered system. How-
Many commercial-o-the-shelf or already developed
ever, as systems become ever larger and more complex,
hardware and software components may be selected in-
and as their emphases move away from simple hardware
dependently according to constraints such as cost, re-
and software components, the narrow application of tra-
sponse, throughput, etc. In some cases, the architect
ditional systems development principles has been found
can already assemble the end system unaided. Or, s/he
to be insucient the application of more general prin-
may still need the help of a hardware or software en-
ciples of systems, hardware, and software architecture to
gineer to select components and to design and build
the design of (sub)systems is seen to be needed. An ar-
any special purpose function. The architects (or engi-
chitecture may also be seen as a simplied model of the
neers) may also enlist the aid of other specialists in
nished end product its primary function is to dene
safety, security, communications, special purpose hard-
the parts and their relationships to each other so that the
ware, graphics, human factors, test and evaluation, quality
whole can be seen to be a consistent, complete, and cor-
control, reliability, maintainability, availability, interface
rect representation of what the user had in mind espe-
management, etc. An eective systems architectural
cially for the computer-human-interface. It is also used to
team must have access to specialists in critical speciali-
ensure that the parts t together and relate in the desired
ties as needed.
way.
It is necessary to distinguish between the architecture of
the users world and the engineered systems architecture. Partitioning and layering
The former represents and addresses problems and solu-
tions in the users world. It is principally captured in the An architect planning a building works on the overall de-
computer-human-interfaces (CHI) of the engineered sys- sign, making sure it will be pleasing and useful to its in-
tem. The engineered system represents the engineering habitants. While a single architect by himself may be
solutions how the engineer proposes to develop and/or enough to build a single-family house, many engineers
select and combine the components of the technical in- may be needed, in addition, to solve the detailed problems
frastructure to support the CHI. In the absence of an ex- that arise when a novel high-rise building is designed. If
perienced architect, there is an unfortunate tendency to the job is large and complex enough, parts of the architec-
confuse the two architectures. But the engineer thinks ture may be designed as independent components. That
in terms of hardware and software and the technical solu- is, if we are building a housing complex, we may have
11.6. SYSTEMS ARCHITECT 127
one architect for the complex, and one for each type of cuss dierent solutions and results with users, engineers,
building, as part of an architectural team. and other architects. An early, draft version of the users
Large automation systems also require an architect and manual is invaluable, especially in conjunction with a pro-
much engineering talent. If the engineered system is large totype. Nevertheless, it is important that a workable, well
and complex enough, the systems architect may defer to written set of requirements, or specication, be created
a hardware architect and a software architect for parts of which is reasonably understandable to the customer (so
the job, although they all may be members of a joint ar- that they can properly sign o on it, but the principal
chitectural team. user requirements should be captured in a preliminary
user manual for intelligibility). But it must use precise
The architect should sub-allocate the system require- and unambiguous language so that designers and other
ments to major components or subsystems that are within implementers are left in no doubt as to meanings or inten-
the scope of a single hardware or software engineer, or tions. In particular, all requirements must be testable, and
engineering manager and team. But the architect must the initial draft of the test plan should be developed con-
never be viewed as an engineering supervisor. (If the item temporaneously with the requirements. All stakehold-
is suciently large and/or complex, the chief architect ers should sign o on the acceptance test descriptions,
will sub-allocate portions to more specialized architects.) or equivalent, as the sole determinant of the satisfaction
Ideally, each such component/subsystem is a suciently of the requirements, at the outset of the program.
stand-alone object that it can be tested as a complete
component, separate from the whole, using only a sim-
ple testbed to supply simulated inputs and record outputs. 11.6.3 Architect metaphor
That is, it is not necessary to know how an air trac con-
trol system works in order to design and build a data man- The use of any form of the word 'architect' is regulated
agement subsystem for it. It is only necessary to know the by 'title acts in many states in the US, and a person must
constraints under which the subsystem will be expected to be licensed as a building architect to use it.[1]
operate. In the UK the architects registration board excludes the
A good architect ensures that the system, however com- usage of architect (when used in context of software and
plex, is built upon relatively simple and clean concepts IT) from its restricted usage. [2]
for each (sub)system or layer and is easily understandable
by everyone, especially the user, without special training.
The architect will use a minimum of heuristics to ensure 11.6.4 See also
that each partition is well dened and clean of kludges,
work-arounds, short-cuts, or confusing detail and excep- Enterprise architecture
tions. As user needs evolve, (once the system is elded Enterprise architect
and in use), it is a lot easier subsequently to evolve a sim-
ple concept than one laden with exceptions, special cases, Hardware architecture
and lots of ne print.
Requirements analysis
Layering the architecture is important for keeping the ar-
chitecture suciently simple at each layer so that it re- Software architecture
mains comprehensible to a single mind. As layers are
Software engineering
ascended, whole systems at lower layers become simple
components at the higher layers, and may disappear alto- Systems architecture
gether at the highest layers.
Systems modeling
Systems design
The acceptance test is a principal responsibility of the sys-
tems architect. It is the chief means by which the pro- Business analyst
gram lead will prove to the user that the system is as orig-
inally planned and that all involved architects and engi- Service-oriented modeling framework (SOMF)
neers have met their objectives.
11.6.5 References
Communications with users and engineers [1] The term architect is a professional title protected by
law and restricted, in most of the worlds jurisdictions, to
A building architect uses sketches, models, and drawings. those who are trained in the planning, design and super-
An automation systems (or software or hardware) archi- vision of the construction of buildings. In these jurisdic-
tect should use sketches, models, and prototypes to dis- tions, anyone who is not a licensed architect is prohibited
128 CHAPTER 11. COLLABORATION
from using this title in any way. In the State of New York, A project manager is a professional in the eld of project
and in other US states, the unauthorized use of the title management. Project managers have the responsibility of
architect is a crime and is subject to criminal proceed- the planning, procurement and execution of a project, in
ings.Architecture: Whats Legal, Whats Not (PDF). any domain of engineering. Project managers are rst
AIA New York State. Retrieved 9 July 2012.NYS point of contact for any issues or discrepancies arising
Architecture:Laws, Rules & Regulations:Article 147 Ar-
from within the heads of various departments in an orga-
chitecture. Retrieved 9 July 2012.
nization before the problem escalates to higher authori-
[2] What we do to regulate use of the title 'architect'". Ar- ties. Project management is the responsibility of a project
chitects Registration Board. Retrieved 1 December 2015. manager. This individual seldom participates directly in
the activities that produce the end result, but rather strives
to maintain the progress, mutual interaction and tasks of
11.6.6 Further reading various parties in such a way that reduces the risk of over-
all failure, maximizes benets, and minimizes costs.
Donald Firesmith et al.: The Method Framework for
Engineering System Architectures, (2008)
11.7.1 Overview
Mark W. Maier and Rechtin, Eberhardt, The Art of
Systems Architecting, Third Edition (2009) A project manager is the person responsible for accom-
Gerrit Muller, Systems architecting: A business plishing the project objectives. Key project management
perspective, CRC Press, (2012). responsibilities include
Eberhardt Rechtin, Systems Architecting: Creating & dening and communicating project objectives that
Building Complex Systems, 1991. are clear, useful and attainable
J. H. Saltzer, M. F. Kaashoek, Principles of Com- procuring the project requirements like workforce,
puter System Design: An Introduction, Morgan Kauf- required information, various agreements and mate-
mann, 2009. rial or technology needed to accomplish project ob-
jectives
Rob Williams, Computer Systems Architecture: a
Networking Approach, Second Edition (December managing the constraints of the project management
2006). triangle, which are cost, time, scope and quality
Insurance Claim Project Manager the Project Management Professional (PMP) designation
oered by the Project Management Institute, PRINCE2
In the insurance industry project managers often oversee or an advanced degree in project management, such as a
and manage the restoration of a clients home/oce after MSPM or other graduate degree in technology manage-
a re, ood. Covering the elds from electronics through ment.
to the demolition and constructions contractors.
11.7.4 Responsibilities
Engineering Project Manager
The Project Manager is accountable for ensuring that ev-
In Engineering project management is the term used to eryone on the team knows and executes his or her role,
describe the task of seeing a product/device through the feels empowered and supported in the role, knows the
stages of R&D/design to manufacturing stages. Work- roles of the other team members and acts upon the belief
ing with various professionals in dierent elds of engi- that those roles will be performed.[3] The specic respon-
neering and manufacturing to go from concept to nished sibilities of the Project Manager may vary depending on
product. Optionally, this can include dierent versions the industry, the company size, the company maturity,
and standards as required by dierent countries. Requir- and the company culture. However, there are some re-
ing knowledge of laws, requirements and infrastructure. sponsibilities that are common to all Project Managers,
Things like electrical voltages often change from country noting:[4]
to country.
Developing the project plans
Software Project Manager Managing the project stakeholders
A Software Project Manager has many of the same skills Managing communication
as their counterparts in other industries. Beyond the skills
normally associated with traditional project management Managing the project team
in industries such as construction and manufacturing, a Managing the project risk
software project manager will typically have an exten-
sive background in software development. Many soft- Managing the project schedule
ware project managers hold a degree in Computer Sci-
ence, Information Technology, Management of Informa- Managing the project budget
tion Systems or another related eld.
Managing the project conicts
In traditional project management a heavyweight, pre-
dictive methodology such as the waterfall model is of- Managing the project delivery
ten employed, but software project managers must also be
skilled in more lightweight, adaptive methodologies such
as DSDM, Scrum and XP. These project management 11.7.5 Education and Certications
methodologies are based on the uncertainty of developing
a new software system and advocate smaller, incremental Individuals wishing to obtain professional certications
development cycles. These incremental or iterative cy- may take one or more of the oerings available from a
cles are time boxed (constrained to a known period of variety of organizations:
time, typically from one to four weeks) and produce a The Project Management Institute oers the following
working subset of the entire system deliverable at the end credentials to project managers:[5][6]
of each iteration. The increasing adoption of lightweight
approaches is due largely to the fact that software require-
Project Management Professional (PMP)
ments are very susceptible to change, and it is extremely
dicult to illuminate all the potential requirements in Certied Associate in Project Management
a single project phase before the software development (CAPM),
commences.
Program Management Professional (PgMP)
The software project manager is also expected to be
familiar with the Software Development Life Cycle Risk Management Professional (PMI-RMP), and
(SDLC). This may require in depth knowledge of require-
ments solicitation, application development, logical and Scheduling Professional (PMI-SP)
physical database design and networking. This knowl-
edge is typically the result of the aforementioned educa- Portfolio Management Professional (PfMP)
tion and experience. There is not a widely accepted certi-
cation for software project managers, but many will hold Other institutions and organizations:
11.8. PROJECT MANAGEMENT OFFICE 131
AIMS (UK) Institute of Project Management oers [3] Russell, PMP, D. (2011). Accountability. In Succeeding
Certied Project Manager (CPM) and Diploma in in the project management jungle: How to manage the
Project Management programs people side of projects (p. 29). New York, NY: AMA-
COM.
PMLG oers The Certied Project Manager (CPM)
Boot Camp[7] [4] Berrie, Michele, Project Manager Responsibilities, PM
Hut. Accessed 17. Oct 2009.
The University of Wisconsins Masters Certicate in
Project Management [5] Project Management Institute Family of Credentials
The Defense Acquisition University (DAU) and its Open source handbook for project managers Open
School of Program Management oers practitioner source handbook for project managers. July 2006.
training in every element of project management for
members of the Federal Government, Defense in- Collection of scholarly articles Project Management
dustry and allied nations. Training: Research. Nov 2012.
There are other graduate programs in project and tech- A project management oce, abbreviated to PMO,
nology management, such as an MSPM. is a group or department within a business, agency or
enterprise that denes and maintains standards for project
The International Project Management Association management within the organization. The PMO strives
(IPMA) is an international network of national project to standardize and introduce economies of repetition in
management societies such as Association for Project the execution of projects. The PMO is the source of
Management in the UK. IPMA serves as an umbrella documentation, guidance and metrics on the practice of
organisation representing national societies which oer project management and execution.
their certications.
Darling & Whitty (2016) identify the denition of the
PMOs function has evolved over time:
11.7.6 See also
The 1800s project oce was a type of national gov-
Event Planning and Production ernance of the agricultural industry
Master of Science in Project Management
1939 appears as the earliest instance of the term
Project engineer 'project management oce' being published
[4] Funding for Government Olympic Executive / Olympic relevant for a Chief Information Ocer of an organiza-
Programme Programme Oce (PDF). Greater London tion who must balance roles in order to gain a competitive
Authority. 2012. advantage and keep the best interests of the organizations
employees. CIOs also have the responsibility of recruit-
[5] PMIs Program Management Oce (PMO Symposium): ing, so it is important that they take on the best employees
Asking Tough Questions, Identifying Solutions (Press re-
to complete the jobs the company needs fullling.
lease). PMI. 13 November 2012.
In addition, CIOs are directly required to map out both
the ICT strategy and ICT policy of an organization. The
ICT strategy covers future proong, procurement, and
11.9 Chief information ocer the external and internal standards laid out by an orga-
nization. Similarly, the CIO must write up the ICT pol-
Chief information ocer (CIO), chief digital infor- icy, detailing how ICT is utilized and applied. Both are
mation ocer (CDIO) or information technology (IT) needed for the protection of the organization in the short
director, is a job title commonly given to the most senior and long term and the process of strategizing for the fu-
executive in an enterprise responsible for the information ture. Paul Burtt, former CIO of AstraZeneca, also out-
technology and computer systems that support enterprise lines the CIOs role of IT governance, which he refers
goals. Generally, the CIO reports directly to the chief to as the clarifying of accountability and the role of
executive ocer but may also report to the chief operat- committees.[8]
ing ocer or chief nancial ocer. In military organiza-
tions, they report to the commanding ocer. The Chief
Information Ocer role was rst dened[1] in 1981 by 11.9.3 Risks involved
William R. Synnott, former Senior Vice President of the
Bank of Boston, and William H. Gruber, former profes- As the CIO has a large number of responsibilities such
sor at the MIT Sloan School of Management.[2] as provision of nance, recruitment of professionals and
development of policy and strategy, the risks are conse-
quently vast. The CIO of U.S company Target was forced
11.9.1 The need for CIOs into resignation in 2014 after the theft of 40 million credit
card details and 70 million customer details by hackers.[9]
CIOs or CDIOs form a key part of any business that uti- CIOs carry out a large number of roles and therefore the
lizes technology and data. In recent times, it has been chance of failure is very high. In this way, any CIO must
identied that an understanding of just business or just be knowledgeable about the industry so they can adapt
IT is not sucient.[3] CIOs manage IT resources and plan and reduce the chance of error.
"ICT including policy and practice development, plan-
ning, budgeting, resourcing and training.[4] In addition
to this, CIOs are becoming increasingly important in cal- 11.9.4 Information technology
culating how to increase prots via the use of ICT frame-
works, as well as the vital role of reducing expenditure Information technology and its systems have become so
and limiting damage by setting up controls and planning important that the CIO has come to be viewed in many
for possible disasters. Computer Weekly magazine high- organizations as a key contributor in formulating strategic
lights that 53% of IT leaders report a shortage of people goals for an organization. The prominence of the CIO po-
with high-level personal skills in the workplace.[5] CIOs sition has greatly risen as information, and the informa-
are needed to decrease the gulf between roles carried out tion technology that drives it, has become an increasingly
by both IT professionals and non-IT professionals in busi- important part of the modern organization. Many CIOs
nesses in order to set up eective and working relation- are adding additional c-level titles to reect the growing
ships. importance of technology in successfully running com-
panies; this trend is referred to as the CIO-plus. The
CIO may be a member of the executive committee of
11.9.2 Roles and responsibilities an organization, and/or may often be required to engage
at board level depending on the nature of the organi-
The Chief Information Ocer of an organization is re- zation and its operating structure and governance envi-
sponsible for a number of roles. First and most impor- ronment. No specic qualications are intrinsic to the
tantly, the CIO must fulll the role of business leader.[6] CIO position, though the typical candidate may have ex-
As a CIO must make executive decisions regarding things pertise in a number of technological elds - computer
such as the purchase of IT equipment from suppliers or science, software engineering, or information systems.
the creation of new systems, they are therefore responsi- Many candidates have Master of Business Administration
ble for leading and directing the workforce of their spe- or Master of Science in Management degrees.[10] More
cic organization. In addition, the CIO is required to recently, CIOs leadership capabilities, business acumen
have strong organizational skills.[7] This is particularly and strategic perspectives have taken precedence over
134 CHAPTER 11. COLLABORATION
technical skills. It is now quite common for CIOs to be More specically, CIOs manage a businesss IT systems
appointed from the business side of the organization, es- and functions, creates and delivers strategies and policies,
pecially if they have project management skills. and places great emphasis on internal customers. In con-
In 2012, Gartner Executive Programs conducted a global trast to this, CTOs place emphasis on the external cus-
CIO survey and received responses from 2,053 CIOs tomers to the organization and focus on how dierent [15]
from 41 countries and 36 industries.[11] Gartner reported technology can make the company more protable.
that survey results indicated that the top ten technol- The traditional denition of CTOs focused on using tech-
ogy priorities for CIOs for 2013 were analytics and nology as an external competitive advantage now includes
business intelligence, mobile technologies, cloud com- CDOs who use the power of modern technologies, online
puting, collaboration technologies, legacy moderniza- design and big data to digitalise a business.
tion, IT management, customer relationship manage-
ment, virtualization, security, and enterprise resource
planning. 11.9.6 See also
CIO magazines State of the CIO 2008 survey asked 558 Chief technology ocer
IT leaders whom they report to. The results were: CEO
(41%), CFO (23%), COO (16%), Corporate CIO (7%) Chief digital ocer
and Other (13%).[12]
Chief executive ocer
Typically, a CIO is involved with driving the analysis and
re-engineering of existing business processes, identifying Chief nancial ocer
and developing the capability to use new tools, reshaping
the enterprises physical infrastructure and network ac- Chief operating ocer
cess, and with identifying and exploiting the enterprises
knowledge resources. Many CIOs head the enterprises
eorts to integrate the Internet into both its long-term
11.9.7 References
strategy and its immediate business plans. CIOs are of- [1] http://www.williamgruber.com/newpage1.htm
ten tasked with either driving or heading up crucial IT
projects that are essential to the strategic and operational [2] Synnott W.R. and Gruber W.H. (1981) Information Re-
objectives of an organization. A good example of this source Management: Opportunities and Strategies for the
would be the implementation of an Enterprise Resource 1980s. New York: Wiley-Interscience.
Planning (ERP) system, which typically has wide-ranging
[3] von Simson, Ernest. The new role of the CIO.
implications for most organizations. ww.businessweek.com. Retrieved 26 October 2014.
Another way that the CIO role is changing is an increased
[4] University of Nottingham. The role of a Chief Informa-
focus on service management.[13] As SaaS, IaaS, BPO
tion Ocers (CIO) or equivalent Senior ICT Manager.
and other more exible value delivery techniques are www.nottingham.ac.uk. Retrieved 26 October 2014.
brought into organizations the CIO usually functions as
a 3rd party manager for the organization. In essence, a [5] Manwani, Sharm; Flint, David. From manager to chief
CIO in the modern organization is required to possess information ocer. www.computerweekly.com. Re-
business skills and the ability to relate to the organization trieved 26 October 2014.
as a whole, as opposed to being a technological expert
[6] Peppard, Joe (August 2010). Unlocking the Perfor-
with limited functional business expertise. The CIO po- mance of the Chief Information Ocer (CIO)". Califor-
sition is as much about anticipating trends in the market nia Management Review. 52 (4): 5. Retrieved 26 October
place with regard to technology as it is about ensuring that 2014.
the business navigates these trends through expert guid-
ance and proper strategic IT planning that is aligned to [7] Lawry, Rachel; Waddell, Dianne; Singh, Mohini (2007).
the corporate strategy of the organization. Roles, Responsibilities and Futures of Chief Information
Ocers (CIOs) in the Public Sector (PDF): 3. Retrieved
26 October 2014.
11.9.5 Distinction between CIO, CDO and [8] Computer Weekly. What exactly does a chief informa-
CTO tion ocer do?". www.computerweekly.com. Retrieved
26 October 2014.
The roles of Chief Information Ocer, Chief Digital
Ocer and Chief Technology Ocer are commonly [9] Vaas, Lisa. Target CIO Beth Jacob resigns in breach af-
blurred. Tom Silver, the North American senior vice termath. www.nakedsecurity.sophos.com. Retrieved 27
October 2014.
president for Dice, states that CTOs are concerned with
technology itself, whereas CIOs are much more con- [10] Meridith Levinson (2007-07-05). Should You Get an
cerned with its applications in the business and how this MBA? - CIO.com - Business Technology Leadership.
can be managed.[14] CIO.com. Retrieved 2012-03-28.
11.9. CHIEF INFORMATION OFFICER 135
[12] State of the CIO 2008 Data Shows CIO Salaries, Inu-
ence Rising. CIO. Retrieved 27 February 2010.
12.1 Text
Enterprise architecture Source: https://en.wikipedia.org/wiki/Enterprise_architecture?oldid=774589954 Contributors: Edward, Michael
Hardy, Kku, Rfoard, Ronz, Geirem, Nickg, EricStephens, Khalid hassani, Alexf, Kustere, Mormegil, Rich Farmbrough, Mike Schwartz,
MaxHund, Mdd, Poweroid, Sutch, Ringbang, Dr Gangrene, Boothy443, Poppafuze, Tschirl, Kjenks, Dmccreary, Fred Bradstadt, Jpom,
Bgwhite, YurikBot, Gardar Rurak, YoavShapira, Lijealso, Yahya Abdal-Aziz, Jpbowen, Larry laptop, Pkearney, Tribaal, Deville,
Richard@lbrc.org, Leebrian, Bihal, Modify, Petko, Veinor, SmackBot, KAtremer, Gletiecq, Tbyrne, Svtveld, Ohnoitsjamie, Hmains, Chris
the speller, UdayanBanerjee, Colonies Chris, Sct72, Can't sleep, clown will eat me, Mahanchian, Etu, JonHarder, Rrburke, Wen D House,
Cybercobra, Colinwheeler, FlyHigh, DearMyrah, Moejorris, Kuru, RfHilliard, Roypittman, H.meligy@ieee.org, Evmako, ScottWAmbler,
Mudgen, Charles T. Betz, Razi chaudhry, AGK, Andy.k.chang, JForget, PhillyPartTwo, Johngt, CmdrObot, Daljitbanger, IanDBailey,
SeanFromIT, David Waters, DumbBOT, Lewisskinner, Horatio Huxham, Thijs!bot, Hervegirod, Headbomb, Dubtank, Picus viridis,
RichardVeryard, EdJohnston, VivekRaman, Dawnseeker2000, Gizmoeti, Jayron32, JEH, MER-C, Michig, Roleplayer, Creacon, VoABot
II, Ff1959, Indon, Saccland, SunSw0rd, Samhiggins1973, Jstehlin, Oicumayberight, DGG, Saigeethamn, Nickmalik, Jmgendron, R'n'B,
David.t.bath, Erkan Yilmaz, Athaenara, Sri1968, MatthewFordKern, Tonyshan, 0mark0, Keithstagner, Yogishpai, Heppelle, Inwind, Lar-
sonk, Jcs2006, Signalhead, VolkovBot, Shajela, TXiKiBoT, EnterprisePlanner, Arpabr, Lradrama, Factician, Ylvabarker, Kpellegrino,
Graham Berrisford, Id027411, SieBot, EAIG, Malcolmxl5, Lucasbfrbot, Dvanberg, Flyer22 Reborn, Jroschella, Leowashere, Momo san,
Pm master, Antonio Lopez, Faradayplank, Senright, Alienjim, Ncw0617, Noru66, Per.foldager, Eaguru, Billaronson, Sthubbar, Brandguru,
Qartman, SWA2, Vicpulido~enwiki, Mild Bill Hiccup, Niceguyedc, Trivialist, Vandvik, Catof, M4gnum0n, Qatestdev, Toheller, Sun
Creator, Eustress, Metaframe, Ricardus64, Vdmeraj, Lakeworks, XLinkBot, Dwbrockway, Petersleep, Lockezachman, Brandy Downs,
Rriverapadilla, Richard.McGuire88, Ron Gaba, Tom Corn, Addbot, Nocontributionsever, Mabdul, Hazarbx, AntonioVallecillo, Fort-
myers, EAPRACTICE, VishalVPatil, MrOllie, AndersBot, Manishpk, BlackKnight, Richard R White, Jarble, Luckas-bot, Yobot, Eis-
saf, Guy1890, AnomieBOT, DemocraticLuntz, Rubinbot, Emahdizargar, Eddiexx77, Nazrani, Citation bot, MithrasPriest, ArthurBot,
Xqbot, Osorin, Emrekenci, GrouchoBot, Marklane0913, Omnipaedista, SassoBot, Je Zhuk, In fact, Anna Roy, Mark Renier, W Now-
icki, Mikeyboysan, Raju bhupesh, Winterst, Rapsar, Troy.frericks, Foobarnix, Mirkoki, Lotje, 0tsa0, Darp-a-parp, ErikvanB, Svesterli,
Raholijaona, Mean as custard, Atifmkhan, EmausBot, WikitanvirBot, Ian Glossop, Primefac, Marcoprez, Sightreadernow, Somerwind,
Eamteam, Nav102, Kvoges, Wayne Slam, Erianna, Enoril~enwiki, ISresearcher, Architectchao, Cfoglia, Jlapalme, , Rudytheman,
ChuispastonBot, Gricehead, Scottlawrencelawson, Mjbmrbot, ClueBot NG, Ontist, Turnb345, Carl presscott, Eateacher, Sonyasunshine,
Neln, BG19bot, Monash123, Anubhab91, Compfreak7, ChrisGualtieri, Mediran, Mmalotau, Clapstick77, JD Beckingham, Rupert loup,
OhioGuy814, Phamnhatkhanh, Maya.lincoln, MaryEFreeman, Kjas1970, Comp.arch, Mandar.vanarse1974, Sbond01, Thewikiguru1,
Ftak, Mosaati, Entarchtools, Farleyortiz, Ed Gives, Rcmola, Voywiki, Haloedscape, Paulfaran, Sqjdiu Entaidia, JussiSiltanen, KasparBot,
Knife-in-the-drawer, MaxxPhase, Spbarrows, NB665, 665NB, Paulesco, Jacksonlukar, Georey Manning, Michael page23, Clintonandre,
Fmadd, Csnikoletta, LauraMauersberg, JohnPaulSmith, GratefulLearner and Anonymous: 289
Enterprise architect Source: https://en.wikipedia.org/wiki/Enterprise_architect?oldid=743758856 Contributors: Kku, Ronz, Cobalt-
bluetony, Mboverload, Rich Farmbrough, MBisanz, Mdd, RoySmith, Ruud Koot, Rjwilmsi, IceCreamAntisocial, Dariopy, SmackBot,
Svtveld, Hmains, JorgePeixoto, Peter Campbell, JonHarder, Kuru, Nux, JHunterJ, CBM, Ensa, Headbomb, Phronko, RichardVeryard,
Bwesche, Roleplayer, Appraiser, ICloche, DGG, Drm310, Aleksander.adamowski, Nickmalik, Pravin Gupta, Kimleonard, Yogishpai,
Rharner, King Lopez, Jclouse, ClueBot, The Thing That Should Not Be, Niceguyedc, Catof, M4gnum0n, Lockezachman, Brandy Downs,
Ron Gaba, Greg Zorne, EAPRACTICE, OceanKiwi, Moringadan, AnomieBOT, Maxis ftw, Marklane0913, Sn2000, Ace of Spades,
Berny68, Simple Bob, GardmanVS, Ian Glossop, Biolekk, Architectchao, ClueBot NG, Sonyasunshine, BG19bot, Happyuk, Epischel,
Entarchtools, Bender the Bot and Anonymous: 52
Enterprise Architecture Assessment Framework Source: https://en.wikipedia.org/wiki/Enterprise_Architecture_Assessment_
Framework?oldid=772643703 Contributors: Mdd, Jpbowen, Leebrian, Headbomb, TAnthony, DGG, ShelleyAdams, UnCatBot, Matthew-
Vanitas, Yobot, MerlLinkBot, Cat4567nip, GreenC bot and Anonymous: 4
Enterprise architecture planning Source: https://en.wikipedia.org/wiki/Enterprise_architecture_planning?oldid=768298169 Contribu-
tors: Kjkolb, Mdd, Woohookitty, Bgwhite, Vprajkumar, JForget, Headbomb, Denisarona, AnomieBOT, FrescoBot, Mirkoki, Nav102,
BG19bot, ChrisGualtieri, JohnPaulSmith and Anonymous: 8
Enterprise Architecture Management Source: https://en.wikipedia.org/wiki/Enterprise_architecture_management?oldid=756008797
Contributors: Edward, Chowbok, Mdd, Van der Hoorn, SmackBot, Kuru, Ehheh, Headbomb, RichardVeryard, Saccland, R'n'B, Yogishpai,
136
12.1. TEXT 137
Brandguru, DianaNier, Dinishare, MrOllie, Manishpk, Yobot, Redrose64, ClaretAsh, Helpful Pixie Bot, Smid12, Magnolia677, Voywiki,
LauraMauersberg and Anonymous: 5
Architectural pattern (computer science) Source: https://en.wikipedia.org/wiki/Architectural_pattern?oldid=771749576 Contributors:
Codeczero, Pnm, Kku, MartinSpamer, Andrewman327, Greenrd, Topbanana, Rursus, Wlievens, Beland, Vinsci, Bobo192, Kenyon, Jen-
rzzz, Davidfstr, BD2412, Bgwhite, Jpbowen, Rwwww, SmackBot, Jjalexand, LtPowers, Kuru, Rory O'Kane, Spdegabrielle, Yaris678,
Ephillipe, Christian75, Katjah, Honette, Archknight, TAnthony, Magioladitis, Avicennasis, Christian Storm, Vinod.pahuja, VolkovBot,
Thedjatclubrock, AlastairIrvine, A4bot, BenjaminHeitmann, McM.bot, SieBot, Janggeom, Martarius, Rpawson, Sandeep ubs, Shaded0,
M4gnum0n, Sbywater, MystBot, Tomrbj, Addbot, Jafeluv, Jarble, KamikazeBot, 4th-otaku, AnomieBOT, Citation bot, Thehelpfulbot,
Sae1962, Citation bot 1, Trappist the monk, CamilleLM, Madmikey, Naveen607, EmausBot, WikitanvirBot, Nav102, Demonkoryu, Sci-
entic29, Ptrb, Susanpadura, BattyBot, RandomLittleHelper, Mohsen Sadeghi Hasanabadi, Piecioshka, Softzen, Gorohoroh, Rod.bishti,
Wikishovel, Aone1988 and Anonymous: 56
Enterprise Architecture framework Source: https://en.wikipedia.org/wiki/Enterprise_architecture_framework?oldid=776261929 Con-
tributors: Ronz, M1ss1ontomars2k4, Coherers, Mdd, Woohookitty, Tabletop, BD2412, Rjwilmsi, AJackl, Bgwhite, RussBot, Gaius
Cornelius, Tony1, Drstrangeluv25, SmackBot, Miljoshi, JonHarder, Colinwheeler, RfHilliard, JForget, JohnCD, IanDBailey, Thijs!bot,
Roebuckr, Hervegirod, Sprhodes, Headbomb, RichardVeryard, Isometric, Nick Number, Pinaghosh, Appraiser, SunSw0rd, Samhig-
gins1973, Nickmalik, R'n'B, David.t.bath, Erkan Yilmaz, J.delanoy, STBotD, Izno, Squids and Chips, UnitedStatesian, Graham Berris-
ford, Malcolmxl5, Leowashere, Boppet, Wikitect, SWA2, S650588, Iohannes Animosus, SchreiberBike, Rriverapadilla, MystBot, Addbot,
Conrad Hughes, AntonioVallecillo, Grin700, Luckas-bot, Yobot, AnomieBOT, LilHelpa, Xqbot, Drilnoth, Dcannin, Omnipaedista,
Nkemp2010, Marc Schade~enwiki, MerlLinkBot, FrescoBot, Kevinleesmith, LucienBOT, Mishras99, Nav102, Dynamicedge, Archi-
tectchao, Ufoldager, , ChuispastonBot, Krohorl, 28bot, Widr, ChanochWiggers, BG19bot, Frze, Wikimpan, Compfreak7, Grlarose,
Mark Paauwe, Entarchtools, Ed Gives, Samuelholcman, Spbarrows, GratefulLearner and Anonymous: 73
Enterprise Architecture Body of Knowledge Source: https://en.wikipedia.org/wiki/Enterprise_Architecture_Body_of_Knowledge?
oldid=755838238 Contributors: Kku, Ronz, Khalid hassani, Tabletop, Jpbowen, SmackBot, Chris the speller, Cydebot, RichardVeryard,
Davidjcmorris, Nickmalik, David.t.bath, David.T.Bath, Bew TN, Olea, Jackfork, Skiwi~enwiki, Randy Kryn, Robomanx, Addbot, ,
Quarilari23, ArmbrustBot, EoRdE6 and Anonymous: 8
Generalised Enterprise Reference Architecture and Methodology Source: https://en.wikipedia.org/wiki/Generalised_Enterprise_
Reference_Architecture_and_Methodology?oldid=746814524 Contributors: Mdd, Estienne, Bgwhite, The Transhumanist, R'n'B, Wik-
Head, J04n, W Nowicki, Cat4567nip, KTachyon, BG19bot, Me, Myself, and I are Here and Anonymous: 3
IDEAS Group Source: https://en.wikipedia.org/wiki/IDEAS_Group?oldid=670015868 Contributors: The Anome, Aecis, Mdd, Smack-
Bot, Folajimi, JHunterJ, IanDBailey, Richard R White, Yobot, FrescoBot, Merlion444, AvicAWB, Theopolisme, Leggattst and Anony-
mous: 8
RM-ODP Source: https://en.wikipedia.org/wiki/RM-ODP?oldid=761823874 Contributors: Edward, Nickg, Mdd, Odalet~enwiki,
SmackBot, CmdrObot, Mblumber, RichardVeryard, Husond, .anacondabot, TXiKiBoT, Hardistyar, Ivarru, Addbot, AntonioVallecillo,
AnomieBOT, EdMcMahon, Miym, Nasa-verve, FrescoBot, Cat4567nip, Kaluzman, BG19bot, The s0rc3r, Me, Myself, and I are Here,
LauraALo and Anonymous: 9
The Open Group Architecture Framework Source: https://en.wikipedia.org/wiki/The_Open_Group_Architecture_Framework?oldid=
776264380 Contributors: Rp, Ronz, Nurg, Decoy, Chowbok, Discospinster, Rvodden, John Vandenberg, Mdd, Dominik Kuropka~enwiki,
Stephen, Stuartyeates, Hojimachong, Bobrayner, Zanaq, RHaworth, Apokrif, CiTrusD, Markphahn, Phantom309, Utuado, FlaBot, Juliank,
Kmorozov, FireballDWF2, Pittspilot, Spike Wilbury, Georgewilliamherbert, SmackBot, Mauls, Bluebot, Mahanchian, Colinwheeler, Kuru,
Yan Kuligin, Dl2000, IvanLanin, Prof 7, JForget, IanDBailey, Dwelliott, Thijs!bot, Hervegirod, IP 84.5, RichardVeryard, Nick Number,
QuiteUnusual, Sgryphon, SunSw0rd, Davidjcmorris, Nickmalik, Elpecek, Larsonk, GrahamHardy, Kyle the bot, Kronix1986, Graham
Berrisford, Jamelan, SieBot, Cirdan747, Timdwilliams, Laoyao99, TechnoMorphWiki, Jdbarras, Vdmeraj, Addbot, Ghettoblaster, Maria
C Mosak, Faramir4, Richard R White, ToolPioneer, Luckas-bot, Yobot, Bunnyhop11, AnomieBOT, Mgl795, Obersachsebot, Maurits-
Bot, Hassan210360, Je Zhuk, Desphi, Mohamad Hani ELJAMAL, FrescoBot, Airon90, Craigrmartin, Jonste, Uppalj, Lineslarge, Dou-
glasBeattieJr, ErikvanB, EmausBot, Varghesejac, John of Reading, Tdubendorf, Cat4567nip, BatesyM, Lokpest, Gmjohnston, Damian
Gawlowski, Turnb345, Helpful Pixie Bot, BG19bot, Edhgoose, Mark Paauwe, Editor0071, S. Stephane, Haloedscape, Babymissfortune
and Anonymous: 118
Integrated Architecture Framework Source: https://en.wikipedia.org/wiki/Integrated_Architecture_Framework?oldid=689508953
Contributors: Skysmith, Iznogoud~enwiki, Mdd, SmackBot, T@nn, Rpearlman, R'n'B, Addbot, Mtaksrud, Cat4567nip, Ontist and Anony-
mous: 6
OBASHI Source: https://en.wikipedia.org/wiki/OBASHI?oldid=759282384 Contributors: Jason Quinn, Chowbok, Mdd, Gary, Rjwilmsi,
MZMcBride, Rjjm, SmackBot, Chris the speller, Kuru, Alaibot, Reedy Bot, Lucasbfrbot, Fergus Cloughley, AnomieBOT, LilHelpa,
Dadadi, FrescoBot, Lotje, Adi4094, John of Reading, GoingBatty, Cat4567nip, DanielV UK, Miroslaw dabrowski, The Quixotic Potato
and Anonymous: 7
Information Framework Source: https://en.wikipedia.org/wiki/Information_Framework?oldid=730516192 Contributors: Giraedata,
Mdd, Bgwhite, Malcolma, MaximvsDecimvs, Magioladitis, Adrianrgcampbell, Infotect, Addbot, Yobot, AnomieBOT, Erik9bot, Fres-
coBot, DocYako, Onel5969, Mean as custard, John of Reading, Cat4567nip, Raja Angamuthu, BG19bot, BattyBot, The squaw on the
hippopotamus, Daithi.o.ciaran, Jordanni1972, Paulfaran and Anonymous: 14
Zachman Framework Source: https://en.wikipedia.org/wiki/Zachman_Framework?oldid=768421947 Contributors: Lousyd, Kku, Ronz,
Gzornenplatz, Chowbok, GoodStu, Bender235, Mike Schwartz, Mdd, Next2u, Ynhockey, HGB, Blaxthos, Dismas, Natalya, Woohookitty,
Mandarax, BD2412, MZMcBride, Ian Pitchford, Kmorozov, Gaius Cornelius, Zwobot, Gadget850, Deville, CQ, Knowlengr, Adnan-
mukhtar, Mlibby, SmackBot, AngelovdS, Mauls, Duke Ganote, Tennekis, Sct72, Mahanchian, JonHarder, BryanG, Louv, Aarktica,
Hu12, ScottWAmbler, Skapur, DEddy, CmdrObot, Larsonbennett, Gregbard, Grgarza, Paddles, Hagge, RichardVeryard, EdJohnston,
Dawkeye, AntiVandalBot, Darklilac, Magioladitis, EagleFan, SunSw0rd, Fang 23, DGG, Davidjcmorris, Nickmalik, R'n'B, Commons-
Delinker, GrWikiMan, Mhavila, Reedy Bot, MatthewFordKern, Elpecek, STBotD, Larrygoldberg, Fredrick day, PaulTanenbaum, Wiae,
Graham Berrisford, Metaman1, Rcbapb, Sbowers3, Boppet, ImageRemovalBot, CasperGoodwood, AnneBoleyn1536, Phogg2, Muhandes,
Metaframe, SchreiberBike, Thehelpfulone, Lockezachman, Len Morrow, Ron Gaba, Tom Corn, Addbot, Maria C Mosak, Tcrowley7,
Yobot, AnomieBOT, ChristopheS, Gark08, LilHelpa, Phwedh, J04n, Timp21337, FrescoBot, RonaldKunenborg, John of Reading, Go-
ingBatty, Cat4567nip, Arvigtall, Sgasson, , ClueBot NG, Ontist, Paulalbinson, Helpful Pixie Bot, Wikimpan, Jpzachman, BattyBot,
Ideasintegration, Entarchtools, Vivekkush1983, Sajadtorkamani, GoneWilde, Coghillcort and Anonymous: 95
138 CHAPTER 12. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
Tanvir Ahmmed, GarbagEcol, ClueBot, LAX, Hutcher, Mick1990, Unbuttered Parsnip, Shaded0, Torqtorqtorq, Niceguyedc, Ajbrulez,
SigmaJargon, Arunsingh16, Kurumban, Veryprettysh, Kalai545, M4gnum0n, NuclearWarfare, Cory Donnelly, Aitias, Jonverve, Ran-
jithsutari, Versus22, Apparition11, Ordoon, XLinkBot, Stickee, Little Mountain 5, Avoided, WikHead, Addbot, Howartthou, Andaryj,
Jncraton, GD 6041, MrOllie, Tide rolls, Bguras puppy, Teles, Informatwr, RT Carpenter, Yobot, Jdg12345, Ptbotgourou, Fraggle81,
Merlin, Sarloth, Joe4210, Josephedouard, Evaders99, AnomieBOT, Cochiloco, Jim1138, Piano non troppo, 90, Kingpin13, Materialscien-
tist, , Michael Chidester, Xqbot, Jerey Mall, MikeEcho, Coretheapple, J04n, GrouchoBot, Shadowjams, Ebessman,
Mummy34, FalconL, Mark Renier, Recognizance, Wandering-teacher, Pinethicket, I dream of horses, Timo395, Thomasjereyanderson-
twin, Swep01, Twistor96, Hughiki, Throwaway85, Seahorseruler, Specs112, Suneelkushwaha, Yeng-Wang-Yeh, Sideways713, DARTH
SIDIOUS 2, Strawny02, VectorThorn, Salvio giuliano, Enauspeaker, CanadianPenguin, EmausBot, Avenue X at Cicero, BillyPreset,
Satishshah123, RA0808, RenamedUser01302013, Qrsdogg, Tommy2010, Wikipelli, Dcirovic, K6ka, Copyeditor22, Devarishi, PS., Al-
pha Quadrant (alt), HyperSonic X, Rooseveltavi, SporkBot, Ocaasi, Coasterlover1994, L Kensington, Qaiassist, Orange Suede Sofa, NTox,
Flyerwolf, AbbasSarfraz, Beiber the justin, ClueBot NG, Cwmhiraeth, Smtchahal, MelbourneStar, Widr, Chillllls, Gamcall, SentientSys-
tem, Kdridder, Oddbodz, Harsha.nagaraju, Omkar1234, Compfreak7, Herwin.a, Avi Harel, RscprinterBot, Johnjeric, BattyBot, Pratyya
Ghosh, Hghyux, MahdiBot, ChrisGualtieri, Holsen266, Ekren, Can357, Cliydcw, FoCuSandLeArN, Lugia2453, SFK2, Matt.sigs, Pabba
naresh, Michipedian, Sue Mars, Tentinator, Vizzy135, ITECStudent01, Zenibus, Ginsuloft, , Gmmahinya, Elon-
Phoenix, 12tl21, Patient Zero, 13EvilCows, Deecee59, Michaelrham, Sanjaya r 1985, Psycho rajput, Kamayani thakur, Johaardanish,
Agasthya1992, Tedy Beor, CAPTAIN RAJU, Shqiptar1234, Bungai2015, Ozoudemartins540, Invisible Guy, KATMAKROFAN, Bender
the Bot, Kavyakumari, Sssatyam patel, Yana.gusti, Pujakedar and Anonymous: 899
Technology Life Cycle Source: https://en.wikipedia.org/wiki/Technology_life_cycle?oldid=747930465 Contributors: Markhurd, Edcol-
ins, Giraedata, Mdd, Woohookitty, Sylvainremy, BD2412, Rjwilmsi, Phantomsteve, DragonHawk, Bachrach44, Tony1, EEMIV, Smack-
Bot, McGeddon, Chris the speller, Iridescent, Hermitage17, Ipsofacto, Nick Number, Widefox, Froid, JaGa, Hbent, Nickmalik, R'n'B,
Rlsheehan, Oshwah, Flyer22 Reborn, Nopetro, Swferrier, Sbolat, Auntof6, Yobot, AnomieBOT, Eumolpo, LittleWink, Skyerise, Clue-
Bot NG, BG19bot, Marcocapelle, BattyBot, Me, Myself, and I are Here, Randykitty, Biogeographist, XW42, Aeroid, Ghannam Wasif,
Dasari12, Chinmaynandy, MattBishop5, Mynameisjulious123456 and Anonymous: 15
Whole-life cost Source: https://en.wikipedia.org/wiki/Whole-life_cost?oldid=764791995 Contributors: Mrwojo, Kku, Paul W, Quarl,
Mdd, Velella, Woohookitty, RussBot, SmackBot, Hmains, Beetstra, Motorworld~enwiki, Future Perfect at Sunrise, Gnfnrf, Nick Num-
ber, Fayenatic london, DASonnenfeld, VolkovBot, Helenalex, Pm master, Martarius, Addbot, MrOllie, OceanKiwi, JonathanBentz,
AnomieBOT, LilHelpa, Mthrandir, Robtrob, EmausBot, Smobbl Bobbl, Widr, Helpful Pixie Bot, NukeofEarl, Scmbwis, ProjMngt,
Jeremy112233, Kkumaresan26, KasparBot and Anonymous: 15
Enterprise modelling Source: https://en.wikipedia.org/wiki/Enterprise_modelling?oldid=761813695 Contributors: Giraedata, Mdd,
ReyBrujo, Woohookitty, RussBot, SmackBot, Chris the speller, ScottWAmbler, Cnbrb, TheTito, Keithh, AndrewHowse, Hazmat2,
RichardVeryard, MarshBot, EagleFan, Davidjcmorris, Nickmalik, R'n'B, GrWikiMan, KvanHaperen, Telecomtom, Banana Concoction,
Equilibrioception, EwokiWiki, Flyer22 Reborn, Stanio, Berean Hunter, PongoPrint, Addbot, Jncraton, Yobot, Ptbotgourou, Legobot II,
LilHelpa, J04n, Some standardized rigour, FrescoBot, Noble Krypton, DrilBot, EnterpriseModeller, Purge me, , Petrb, Wbm1058,
Razorbliss, Sebastian-aus-Berlin, Quinto Simmaco and Anonymous: 27
Business analyst Source: https://en.wikipedia.org/wiki/Business_analyst?oldid=773950803 Contributors: Michael Hardy, Ronz, Grom-
lakh, Goethean, Wjhonson, Kpalion, Khalid hassani, VampWillow, 9ign, The Land, AndrewTheLott, Humblefool, Dr.frog, Discospin-
ster, Notinasnaid, ESkog, Kx1186, Ociallyover, Mdd, Gary, MarkGallagher, Saxifrage, Mindmatrix, Kgrr, SCEhardt, Kbdank71,
Harro5, Gurch, TheDJ, DVdm, The Rambling Man, Cpuwhiz11, NawlinWiki, Matthew0028, BOT-Superzerocool, Jeh, Gadly, Zzuuzz,
Closedmouth, Daugustine, SmackBot, MeiStone, Brick Thrower, Gilliam, Ohnoitsjamie, Choalbaton, Josbald1975, Jjalexand, Vdavis-
son, Freek Verkerk, Radagast83, Mion, Rklawton, Rodney Boyd, Kuru, Terzett, Stupid Corn, Andrew Kay, Mathewssh, Scratz, Cnbrb,
Albattar, Randhirreddy, Rambam rashi, RobinGoldsmith, Thumbarger, Outriggr (2006-2009), Cydebot, Odie5533, Bmitchelf, Hitrish,
JonathanWeaver, 2KT, Nick Number, Mactin, Widefox, QuiteUnusual, Movses, Alphachimpbot, Arvalarva, Edwardmking, Fusionmix,
Tedickey, Avicennasis, Irmtraining, DerHexer, Davidjcmorris, R'n'B, Kateshortforbob, Justaba500, J.delanoy, 02design, Siegfried1, Fre-
quencydip, Anagha dhumal, Kevin Brennan, Benglish11, Jackofwiki, Geeteshjain, Stuartlachlan, 3ta, R, Oshwah, GDonato, Amol pharate,
Dwandelt, Ghaag, Yintan, Oli2007, Kathode raytube11, Kinkyy, Flyer22 Reborn, The-sloans, GeoWingChun, Deereav, Boing! said
Zebedee, Davidovic, M4gnum0n, NuclearWarfare, JulianSammy, Wacko39, Thingg, Akshat59, Genmel, Oli.ahad, XLinkBot, Jytdog,
Dthomsen8, Strings28, Addbot, Maria C Mosak, Wikicsb, CanadianLinuxUser, MrOllie, Tassedethe, Tide rolls, Dave601, Evans1982, Az-
contributor, Rubinbot, Pendse pradeep, Sunshinedaydream95, Wenat, Materialscientist, Citation bot, LilHelpa, XZeroBot, Santosh kumar
g, Locobot, FrescoBot, LucienBOT, Taliped, Davidvilson2009, Jcampsall, I dream of horses, Tra, Petergjansen, Serols, Dfarnham, Light-
lowemon, Monymirza, Jaychowrocksmysocks, Slon02, Vwtinfo, Dcirovic, Cobaltcigs, L Kensington, Donner60, Wesmith4, Kalpanatikoo,
Baspecialist, Manytexts, AbbasSarfraz, ClueBot NG, Baanalyst, Jasper432, Widr, Oklahoma3477, BG19bot, MusikAnimal, Marcocapelle,
Mark Arsten, Elainarufs, Dexbot, Indexed card, Jacobnav, Frosty, Mhailstone, Wywin, Cadillac000, Me, Myself, and I are Here, MrLink-
inPark333, Drchriswilliams, Inphynite, Monkbot, Greedo8, Rogerborges, Contributorauthor, Some Gadget Geek, Oycps2014, Fico2015,
Ira Leviton, RashiRastogi2, AshokShauryaSingh and Anonymous: 350
Systems analysis Source: https://en.wikipedia.org/wiki/Systems_analysis?oldid=764277582 Contributors: Tbackstr, Stevertigo, Kku,
Ronz, Kingturtle, Mydogategodshat, Bearcat, Goethean, Bobbyanalog, Sverdrup, BigHaz, Beowulph, Discospinster, Rich Farmbrough,
Bender235, El C, Bobo192, Remuel, Maurreen, Rajah, Mdd, Riana, Velella, Jheald, Albamuth, Versageek, Kenyon, Fooziex, Btyner, Ted
Wilkes, Tawker, Yamamoto Ichiro, Authalic, Strangnet, DVdm, Straker, The Rambling Man, YurikBot, RussBot, NawlinWiki, Shreshth91,
RattleMan, Grafen, Toxickore, Malcolma, Jpbowen, Larsobrien, Cyrus Grisham, Rwwww, Cask05, SmackBot, Impaciente, Gjs238,
Gilliam, Bigs slb, Octahedron80, Nbarth, JonHarder, RJBurkhart, Nick Green, Kuru, Mr Stephen, The Missing Hour, Charleenmerced,
CMG, Jac16888, Cydebot, Mblumber, Skittleys, SimonClinch, Deipnosophista, AntiVandalBot, Luna Santin, Brian48, VictorAnyakin,
AllTheCoolNamesAreAlreadyTaken, EagleFan, Irmtraining, Johnbrownsbody, Mrten Berglund, Wylve, R'n'B, Nono64, Thirdright, Erkan
Yilmaz, Philosopher06, Zoara, Mcsharry, KylieTastic, Burzmali, X!, Psheld, Philip Trueman, Jemartincg, Ask123, Wpociengel, An-
drewaskew, SieBot, WereSpielChequers, Malcolmxl5, BotMultichill, Flyer22 Reborn, Qst, OKBot, ClueBot, Ian Tabi, Jesgab, Excirial,
Tyler, Stypex, 1ForTheMoney, Aitias, Aardila, AlanM1, Srikant.sharma, Addbot, Willking1979, Freakmighty, Maria C Mosak, MrOllie,
Tide rolls, Luckas-bot, Yobot, Ptbotgourou, Al.Ragsdale, KamikazeBot, Wiki Roxor, AnomieBOT, Soresumakashi, Piano non troppo, Ma-
terialscientist, Xqbot, S0aasdf2sf, Omnipaedista, RibotBOT, Mnent, Liridon, Mark Renier, Social Norm, Pinethicket, MastiBot, Serols,
Jandalhandler, FoxBot, Alph Bot, EmausBot, WikitanvirBot, Primefac, ZroBot, Donner60, Architectchao, Logicalgregory, ClueBot NG,
Widr, Theopolisme, MerlIwBot, BG19bot, ElphiBot, HusiGeza, Millennium bug, M Preston Sparks, Oreileao, Khazar2, Mr. Guye, Ankit
Neo Ghz, GabeIglesia, Phamnhatkhanh, Biogeographist, Drscarlat, Melody Lavender, My name is not dave, Aldishopper92, Nikolaiho,
140 CHAPTER 12. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
P1971, DissidentAggressor, Dhiraj.j.shetty, Hoornsma, Cherdchai Iamwongsrikul, Ibijoke, Hashi15, Grub98, FYD Ripper and Anony-
mous: 193
Information architecture Source: https://en.wikipedia.org/wiki/Information_architecture?oldid=771512051 Contributors: Deb, Edward,
TeunSpaans, Michael Hardy, Ronz, Angela, Pema~enwiki, Nickg, Phoebe, Mbria, Masao, Tea2min, LLarson, LockeShocke, Macrakis,
Urhixidur, KeyStroke, Dobrien, LeeHunter, Pavel Vozenilek, S.K., Fenice, Lycurgus, Marcok, Aaronbrick, Spalding, Enric Naval, Ka-
ganer, SeanGustafson, Jakew, Pinar, Mduvekot, Mattbrundage, Burkinaboy, Skeejay, Velvetsmog, JimmycurN, Burkhard~enwiki, BD2412,
Koavf, Captmondo, Aapo Laitinen, FlaBot, Timo Kouwenhoven, PhilipR, Insydney, Jpbowen, Speedoight, Parham, Veinor, SmackBot,
Brick Thrower, Ohnoitsjamie, JonathanHart~enwiki, Infophiliac, Kostmo, Mahanchian, Smoken Flames, Flyguy649, Lus Felipe Braga,
SashatoBot, RichMorin, Scetoaux, Ehheh, Quarty~enwiki, IvanLanin, DEddy, Atomiq, Timber92, Prof 7, Bill.albing, Outriggr (2006-
2009), Clayoquot, Horatio Huxham, A3RO, Jmelody, JustAGal, Salvadorious, Kauczuk, Asist, Creacon, Swpb, Lutzv, Ajcheng, Mets-
Bot, Havanafreestone, DerHexer, Hbent, Oicumayberight, Harvardnet, Nickmalik, Keith D, Craigb81, R'n'B, Captain panda, Chrisfur-
niss, Icseaturtles, Frequencydip, Orangewarp, Steel1943, VolkovBot, Mymarpie, Erliptac, JhsBot, Broadbot, PaulTanenbaum, Graham
Berrisford, Justin2007, Simon.raistrick, GlassFET, SieBot, BotMultichill, Of.information.architecture, KPH2293, Hobartimus, Abialek,
Sethlilly, Sfermigier, Martarius, ClueBot, Pucciar, The Thing That Should Not Be, CounterVandalismBot, Pboersma, BirgerH, Studip101,
XLinkBot, Danimovski, Addbot, Jomackiewicz, Willking1979, Whbenjaminjones, Emorrogh, Bevcorwin, CanadianLinuxUser, MrOllie,
Luckas-bot, Yobot, AmeliorationBot, Lostnumber747, AnomieBOT, Rubinbot, Eddiexx77, Oconar, DanimovIA, Materialscientist, Cita-
tion bot, LilHelpa, Xqbot, Capricorn42, Socrates32, Onepd, Martijnd, J04n, Greenmtncville, SassoBot, Smallman12q, FrescoBot, Ekillaby,
Pinethicket, Jonesey95, Skyerise, MondalorBot, Novacough, Lotje, Tankgrrl2000, Mandolinface, EmausBot, John of Reading, Wikitan-
virBot, Super48paul, Kellylautt, UXjam, , Mentibot, Nighthawk2050, ClueBot NG, Resmini, 10k, NicHB7, Ekphraster, Saluki2001,
PatHadley, Helpful Pixie Bot, BG19bot, DigitalWikiMan, SilvrWings, Brad7777, Rcunderw, Marty computerscientist, David.moreno72,
MarkTraceur, Kruchkamgar, IGeoy, LibrarianAnnie, MaryEFreeman, Znacznik, Biogeographist, Mcio, Jakedtc, Star767, Isabelgrob-
ler, Alad19, Zissou7, Nwhysel, Okpaulmecom, BethNaught, Aresmini, Maee10, Bigwavephoto, XamieA, Ks-M9, Tthompso spiritof76,
Bender the Bot, Mariasheler, Wikishovel, MalSol, JueLinLi, G.london, Gracezhang15m and Anonymous: 215
Solutions Architect Source: https://en.wikipedia.org/wiki/Solution_architect?oldid=774758039 Contributors: Ronz, RedWolf, Icairns,
Mdd, Rsrikanth05, SmackBot, Jamesont, Kuru, Alaibot, MER-C, Graham Berrisford, Enviroboy, Bentogoa, Michael.W.Meissner, Yobot,
AnomieBOT, Dplt, Jonathanchaitow, Super48paul, Jenks24, ClueBot NG, TruPepitoM, Fyrftd, Paulhussein, Glacialfox, Holsen266,
Dexbot, Aaadonai, Bw57899, Paul2520, Voywiki, Frankbybuc, Chekv and Anonymous: 69
Software architect Source: https://en.wikipedia.org/wiki/Software_architect?oldid=776502898 Contributors: Ronz, Boson, Willpeavy,
EricStephens, Antandrus, Andreas Kaufmann, Hydrox, Max Terry, RoyBoy, Mdd, Espoo, Masums, Nightscream, XLerate, GnniX, Gam3,
Roboto de Ajvol, Pinecar, Arado, Bhny, Bovineone, SamJohnston, Mtze, Deville, K.Nevelsteen, Drable, SmackBot, Bigbluesh, Anwar
saadat, Wigren, Robth, JonHarder, Allan McInnes, Normxxx, Cybercobra, MichaelBillington, Ryan Roos, Doug Bell, Kuru, Kompere, Dab-
Machine, Hetar, Longshot14, Wspencer11, Koe, Ervinn, Tlatoani, Alucard (Dr.), .anacondabot, Jatkins, Aladdin Sane, Nickmalik, R'n'B,
Doryexmachina, KylieTastic, HiEv, Vipinhari, UnitedStatesian, Sapphic, Laoris, MikelZap, ClueBot, DukeyToo, Java4food, Muro Bot, Ap-
parition11, Xtremeways, Neuralwarp, Addbot, Mr4tastic, BrianFennell, Maria C Mosak, Lightbot, Gail, Poosari, LuK3, Luckas-bot, Yobot,
AnomieBOT, Xqbot, JimVC3, Leoluz, RibotBOT, Drheaton, Edderso, RandomStringOfCharacters, Swampdaddy87, RichardAlexan-
derGreen, Dolovis, Erianna, Erget2005, ClueBot NG, Alex.shafran, Widr, Helpful Pixie Bot, Techmage, Daewoochong, Wikilobbyist,
David.moreno72, Fuebar, SFK2, Ginsuloft, Mike Schwartz SF, Melcous, Cherdchai Iamwongsrikul, Bazlul1, Rraheja, Frodothehobo and
Anonymous: 96
Systems architect Source: https://en.wikipedia.org/wiki/Systems_architect?oldid=774987080 Contributors: Ronz, Furrykef, Jnc, Sempf,
Andreas Kaufmann, D6, Mdd, Carbon Caryatid, Woohookitty, BD2412, Kmorozov, Vonkje, RussBot, Toxickore, Tony1, CLW, Deville,
K.Nevelsteen, Open2universe, SmackBot, Bigbluesh, Gilliam, Robth, Sct72, Allan McInnes, Normxxx, MichaelBillington, Ryan Roos,
Lus Felipe Braga, Louv, Drieux, Soap, DabMachine, Hetar, Iridescent, Longshot14, Markhu, Cydebot, Thijs!bot, Bobblehead, Richard-
Veryard, Ablqadir, Psychohistorian, EagleFan, Aleksander.adamowski, Chris Pickett, CardinalDan, Zac Gochenour, Sapphic, Philip Sut-
ton, Drmies, JustinClarkCasey, SchreiberBike, 9Nak, WikHead, Kbdankbot, Addbot, Yousou, Maria C Mosak, SEI Publications, Jarble,
AnomieBOT, J04n, Omnipaedista, Thehelpfulbot, DrilBot, Texclayton, DonFiresmith, Architectchao, ClueBot NG, Satellizer, Mrgates,
Calabe1992, Wbm1058, JoanZehrt, CarnivorousGnomeCatuse, HMSLavender, Jonathanarpith, David O Sampson and Anonymous: 59
Project manager Source: https://en.wikipedia.org/wiki/Project_manager?oldid=769057630 Contributors: Heron, Edward, Kku, Ping-
PongBoy, Ellywa, Mkoval, MQuinn, Wik, Cleduc, Hubertus~enwiki, Chris Roy, Ploums, Graeme Bartlett, Zigger, Chowbok, Antan-
drus, Hgfernan, Discospinster, Guanabot, S.K., Shanes, Richi, Kjkolb, Mdd, Carbon Caryatid, Wtmitchell, RJFJR, Digitric, Wiktoria,
Blair Azzopardi, Wdyoung, Rillian, YurikBot, Richieman, Mtcedar, Deville, David Biddulph, SmackBot, Od Mishehu, Chris the speller,
Bluebot, Stevenmitchell, Hoof Hearted, Dogears, Ojophoyimbo, Kuru, Gobonobo, Minna Sora no Shita, Rundquist, Travis99, Bhalchan-
dratk, Flaviohmg~enwiki, Beetstra, Ehheh, Ft1~enwiki, Iridescent, JensenDied, Dlohcierekim, CmdrObot, Cydebot, Voldemortuet, PKT,
Thijs!bot, Sisalto, James086, Matthew Proctor, Mentisto, Luna Santin, QuiteUnusual, Vincehk, .anacondabot, Bencherlite, Ff1959, Glob-
alprofessor, Oicumayberight, MartinBot, R'n'B, Akalanaki, Bendhoward, Bonadea, Synique, Dandriani, VolkovBot, Keith Richards UK,
TXiKiBoT, Saber girl08, BotKung, MADe, Haikon, Enviroboy, C45207, SieBot, Flyer22 Reborn, Pm master, Jagra, Silver Master, Ferdilo,
ClueBot, The Thing That Should Not Be, Karmona, Eeekster, BOTarate, Chiefmanzzz, XLinkBot, Jytdog, Dthomsen8, Alexolson, Myst-
Bot, Addbot, Co1Spain, MrOllie, Keith Biglin, Glane23, Mfo321, OlEnglish, LeonMichaelSmith, Waltloc, Luckas-bot, Yobot, Evans1982,
Michelle2mmb, AnomieBOT, DemocraticLuntz, Nankivel, Piano non troppo, A123a, ArthurBot, Obersachsebot, Xqbot, Capricorn42,
Mechanic1c, Kokcharov, FrescoBot, Hury94, Nazmanager, Vavilen, Jcampsall, Wndola, Banej, IMsupersmith, Muazen, Theblueman-
ager, Lordbrocket, Dineshasewwandi, Cloud10pm, WikitanvirBot, Jazzy Diva, RA0808, KimBecker, ZroBot, Cymru.lass, Sean Whitaker,
Donner60, Jsiraj, ClueBot NG, Artemis Fowl Rules, Nan-bread666, Stoborrobots, BG19bot, Jacobsharps, Juro2351, Axelberube, KGun10,
Fernandocastor, Vanmarcus, 2Flows, Pjganon, SFK2, Epicgenius, Eyesnore, Geza.molnar, NottNott, Behug, John Gaziano, Tom Hayhoe,
PMinformation, Stevebrown164, Liance, Dbayom, MasterRainbow, AyelitaBose, Libragagan, Djtizalami, Doumaio000, Jdbingham, An-
driy.nykytyuk and Anonymous: 207
Project management oce Source: https://en.wikipedia.org/wiki/Project_management_office?oldid=759052466 Contributors: The
Epopt, Kku, Donalmc, Boudewijn~enwiki, Pascal666, Khalid hassani, Stesmo, Kjkolb, Pearle, Rodii, SDC, FlaBot, TheDJ, Jar-
rahTree, RussBot, Stephenb, BirgitteSB, NickelShoe, SmackBot, Paraparam Bigot, SmartGuy Old, DemolitionMan, OrphanBot, Kuru,
Ashrafhashem, TastyPoutine, Hu12, Akbradford, Cespa, Asamawal, Darrentcook, Cydebot, CharlotteWebb, JamesBWatson, Chris0427,
DerHexer, Jwestland, Davidjcmorris, YUiCiUS, Nickmalik, J.delanoy, Tagus, VolkovBot, TXiKiBoT, Willit63, Pm master, KathrynLy-
barger, Lightfair, Flashart1, DickieTruncheon, PipepBot, Kokilads, Pakaraki, Alexbot, BOTarate, Eduardo6028, Vanished User 1004,
Addbot, Xp54321, Mapador, MrOllie, Download, SpBot, Waltloc, Yobot, Lindsayascott, AnomieBOT, Materialscientist, Citation bot,
12.2. IMAGES 141
Xqbot, Mattg82, FrescoBot, Fortdj33, Jonesey95, Lineslarge, Karateguyindc, Mean as custard, DavidAndres, Nick Moyes, GoingBatty,
U+003F, Qaiassist, Chasep2010, ChuispastonBot, ClueBot NG, Scmbwis, DanReedPMP, Drullewatz, Khorramirad, Moonowerdragon,
EPRNYC, BigJolly9, Ralfjnr, Ginsuloft, Pmi, Nitinmadhvani, Prem 9718270951 and Anonymous: 63
Chief information ocer Source: https://en.wikipedia.org/wiki/Chief_information_officer?oldid=772343389 Contributors: Robert
Merkel, Aldie, Kku, Egil, Ronz, Schneelocke, David Shay, Greyengine5, Gadum, LiDaobing, Iznogoud~enwiki, Neutrality, Zondor,
Lacrimosus, Rich Farmbrough, Rhobite, Aecis, Mairi, Mpeisenbr, Mdd, Mote, Poweroid, PaulHanson, Dismas, Woohookitty, Mindmatrix,
Dandv, Rjwilmsi, Davidp, Dmccreary, FlaBot, Ian Pitchford, Leslie Mateus, Alphachimp, Diza, YurikBot, Hede2000, OneGyT, Curtis
Clark, Zwobot, Rwalker, Katieh5584, SmackBot, Sebesta, Yamaguchi , Gilliam, Ohnoitsjamie, Bluebot, Jazmatician, Scwlong, Jon-
Harder, Benjamin Mako Hill, Cebess, Cybercobra, Nslonim, Kuru, Robosh, Comfychaos, Ehheh, InedibleHulk, Thiagoeh, Djharrity,
JForget, Yarnalgo, Mitchello, WeggeBot, Cydebot, Pdxuser, Odie5533, SusanLesch, Sorenriise, AntiVandalBot, Sadchild, ChristianBk,
Gatemansgc, Mrip, Pan Dan, Svetovid, 72Dino, VolkovBot, OminousSkitter, Shajela, Hqb, Yesha.sivan, Jvlock, Doc James, Iswive,
Rock2e, Ddmishra, Flyer22 Reborn, CIOGuru, Fbarw, Millstream3, ClueBot, Daniel73480, The Thing That Should Not Be, Gaia Octavia
Agrippa, Jaysee21, Ottawahitech, Zelig123456, Nuiloa, SoxBot III, DumZiBoT, MystBot, Johnloia2112, Addbot, MrOllie, Buster7, ,
Joseph.strunz, Legobot, Yobot, Vague, Themfromspace, Jamalystic, Bruce404, Nurtsio, Tempodivalse, AnomieBOT, Thomasjl, Materi-
alscientist, Laran.evans, Xqbot, C172rg, Andrewmin, Nasa-verve, Groverxv, Omnipaedista, Pravin.taskseveryday, Thehelpfulbot, Dub617,
Wiki3 1415, Swineinuenza, Dukeofgaming, EFormsBlogger, OnceAlpha, Lotje, Diannaa, Rollins83, Primefac, Julsssark, Thecheesykid,
Smpclient, Jplarkin, ClueBot NG, Tellmewhy1, Jmilestaylor, MerlIwBot, BlueSkyNoRain, BG19bot, MusikAnimal, Mark Arsten, Aranea
Mortem, Rrastin, Me, Myself, and I are Here, Phamnhatkhanh, John Jacobson367, Ugog Nizdast, Caliburn, DavidWestT, WB 96, Hectics,
HelpUsStopSpam, GeneralizationsAreBad, KasparBot, Whgruber, MateMaticMatan, Bishoptom, GregoryPence, Rantemario and Anony-
mous: 152
12.2 Images
File:4+1_Architectural_View_Model.svg Source: https://upload.wikimedia.org/wikipedia/commons/e/e6/4%2B1_Architectural_
View_Model.svg License: CC BY-SA 3.0 Contributors: Based on File:4+1 Architectural View Model.jpg by User:Mdd Original artist:
mpan
File:4-2_ANSI-SPARC_three_level_architecture.svg Source: https://upload.wikimedia.org/wikipedia/commons/8/84/4-2_
ANSI-SPARC_three_level_architecture.svg License: CC BY-SA 3.0 Contributors: Developing High Quality Data Models. The
European Process Industries STEP Technical Liaison Executive (EPISTLE).
Original artist: 4-2_ANSI-SPARC_three_level_architecture.jpg: Matthew West and Julian Fowler
File:4-3_Data_Modelling_Today.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/5d/4-3_Data_Modelling_Today.svg
License: CC BY-SA 3.0 Contributors: Developing High Quality Data Models. The European Process Industries STEP Technical Liaison
Executive (EPISTLE).
Original artist: 4-3_Data_Modelling_Today.jpg: Matthew West and Julian Fowler
File:A_Tutorial_on_the_Zachman_Architecture_Framework.jpg Source: https://upload.wikimedia.org/wikipedia/commons/0/0c/
A_Tutorial_on_the_Zachman_Architecture_Framework.jpg License: Public domain Contributors: A Tutorial on the Zachman Architec-
ture Framework Original artist: va.gov
File:Air_Force_Ensign_of_the_United_Kingdom.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/cc/Air_Force_
Ensign_of_the_United_Kingdom.svg License: Public domain Contributors: ? Original artist: ?
File:Ambox_current_red.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/98/Ambox_current_red.svg License: CC0
Contributors: self-made, inspired by Gnome globe current event.svg, using Information icon3.svg and Earth clip art.svg Original artist:
Vipersnake151, penubag, Tkgd2007 (clock)
File:Ambox_important.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svg License: Public do-
main Contributors: Own work, based o of Image:Ambox scales.svg Original artist: Dsmurat (talk contribs)
File:Architectural_Levels_and_Attributes.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/14/Architectural_Levels_
and_Attributes.jpg License: Public domain Contributors: FEA Practice Guidance Original artist: Federal Enterprise Architecture Program
Management Oce, OMB
File:Architecture_framework.jpg Source: https://upload.wikimedia.org/wikipedia/commons/2/27/Architecture_framework.jpg Li-
cense: Public domain Contributors: Building an Enterprise Architecture framework Original artist: Rob Thomas, Director and Phil Cullen,
Policy Analyst, Technology and Architecture Group, Oce of Information and Technology
File:BPMN-AProcesswithNormalFlow.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b8/
BPMN-AProcesswithNormalFlow.svg License: Public domain Contributors: This le was derived from BPMN-
AProcesswithNormalFlow.jpg: <a href='//commons.wikimedia.org/wiki/File:BPMN-AProcesswithNormalFlow.jpg'
class='image'><img alt='BPMN-AProcesswithNormalFlow.jpg' src='https://upload.wikimedia.org/wikipedia/commons/thumb/3/
36/BPMN-AProcesswithNormalFlow.jpg/50px-BPMN-AProcesswithNormalFlow.jpg' width='50' height='28' srcset='https://upload.
wikimedia.org/wikipedia/commons/thumb/3/36/BPMN-AProcesswithNormalFlow.jpg/75px-BPMN-AProcesswithNormalFlow.
jpg 1.5x, https://upload.wikimedia.org/wikipedia/commons/thumb/3/36/BPMN-AProcesswithNormalFlow.jpg/
100px-BPMN-AProcesswithNormalFlow.jpg 2x' data-le-width='556' data-le-height='306' /></a>
Original artist: BPMN-AProcesswithNormalFlow.jpg: Tttt1234
File:BRM_Overview.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/1d/BRM_Overview.jpg License: Public domain
Contributors: FEA Consolidated Reference Model Document Original artist: FEA
File:Blueprint_Roadmap_to_Treasury_IT_Modernization.jpg Source: https://upload.wikimedia.org/wikipedia/commons/d/da/
Blueprint_Roadmap_to_Treasury_IT_Modernization.jpg License: Public domain Contributors: Treasury Technical Standards Prole
Original artist: Standards and Conguration Management Team (SCMT) of the Treasury Enterprise Architecture Sub-Council (TEAC)
File:Capabilities_Described_with_Architectures.jpg Source: https://upload.wikimedia.org/wikipedia/commons/7/7c/Capabilities_
Described_with_Architectures.jpg License: Public domain Contributors: DoDAF 1.0 Deskbook Original artist: DoD Architecture Frame-
work Working Group
142 CHAPTER 12. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
3. William H. Inmon (2005). Building the Data Warehouse, on page 155: A 6 rows and 6 column matrix with the cells
empty
4. The Zachman Framework: An Introduction by David C. Hay. Published: June 1, 1997, see <a data-x-rel='nofollow'
class='external text' href='http://www.tdan.com/view-articles/4140/'>here</a>: A 6 rows and 6 column matrix with the cells
with text
5. A modied 1987 Framework by Paul Harmon (2003) in Business Process Change page 319: A 6 rows and 3 column
matrix with the cells with text
Original artist: Marcel Douwe Dekker