Final Answesaanalytics (002).xlsx

  • Uploaded by: Ashraf Sayed Abdou
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Final Answesaanalytics (002).xlsx as PDF for free.

More details

  • Words: 6,481
  • Pages: 58
ROLE

CASE

43

Lead Integrartion Architct

Aquire for a company Montoring system outdated

44

Chief ARCHITICT

No centralized entry for customer requests

45

business intelligence subject matter expert

46

Chief architict

Togaf Project

Extending mother company Vision & Approval satellite monotoring system based on DDD to include aquired one presented

reliable global online portal

Design an enhancement of Leverage on customer data the current enterprise data to gain source of analytic warehousing system to data which increase support change in business company revenue model

Mssive replacement for supply chain to reduce production cost

togaf action

Replace REP using green field appreach

CIO setup team

47

Process imporovemnt by replacing outdated MRB2 with ERP

Lead Arcitict

chief architiect

Reducing It Costs

48

49

approach is needed consultant to lead Consolidated ERP system A phased to implement target archtict architicture

Architecture Vision Produced

49

approach is needed consultant to lead Consolidated ERP system A phased to implement target archtict architicture

togaf phase

TOGAF PART/question

Ans wer C

D

Recommend best approach to design full architecture and present it to the board

D A B

A Vision

present architecture vision

B C D

A Phase C determine suitable artifact for our case

C D B

A Architict ure contract

To write architicture design and development contract

B C D

D

update pricipals

update IT architecture principals

B A C

D

E

examining opportunities & Solutions before presenting to the board A

C

B

C final implementation after E steps to prepare and migation plan

A

final implementation after E steps to prepare and migation plan D B

claim

follow togaf sequence missing roadmap impact assessment Sequence phaese,develop target before base mention implementation & migration plan snd then mention GAP

follow all phase A Steps Stakeholder map, evaluation business cabapility assessment transformation readiness, apply business scenario technique, missing : stakeholder map,bussiness capability assessment, transformation readiness assessment missing hagat kteer in vision we don't perform detailed view nor architicture defintiin document. system/data matrix identify relation between data entitles and applications, Data life cycle diagram identify common data requirement.apllications that operates on data entities includes data warehouse Like A except Data life cycle mention data/matrix with wrong function Role/system catalogue identify relation between application/business role, no artifact called data use case diagram .

follow architicture contract content except ARCHiticure development mangemnts process and roles Same as A but include business arch defenition which is not in architucture contract missing some output from contracts dosn'tcontain any of arch contract and contains gap and impact whcigh are not included in contra ct

Information Management is Everybody's business:address Information mangement concern/IT Responsibility:address responsibility/Data Trastee:address security requied in consolodation projects/Technology Independence:requird in consolodation projects/Responsive Change Management:address time to change Business Continuity addressess reliability/Service-Orientation addressess interoperability and location transparency./Data is shared,secured address securedResponsive Change Management:address time to change no addressing for information mangement and to change concerns

time

No principal is called data is normalized

Follows phase E steps:1. Determine/confirm key corporate change attributes --2. Determine business constraints for implementation 3. Review and consolidate Gap Analysis results from Phases B to D 4. Review IT requirements from a functional perspective 5. Consolidate and reconcile interoperability requirements 6. Refine and validate dependencies 7. Confirm readiness and risk for business transformation 8. Formulate high-level Implementation and Migration Strategy 9. Identify and group major work packages 10. Identify Transition Architectures 11. Create portfolio and project charters and update the architectures

Missing:. Determine/confirm key corporate change attributes 2. Determine business constraints for implementation Confirm readiness and risk for business transformation 8. Formulate high-level Implementation and Migration Strategy

Missing:. Determine/confirm key corporate change attributes 2. Determine business constraints for implementation 3. Review and consolidate Gap Analysis results from Phases B to D. 8. Formulate high-level Implementation and Migration Strategy 11. Create portfolio and project charters and update the architectures

Contains features n Migration plan (Cost benefit/risk) lessons learned mentioned integration to other frameworks(which has been mentioend explictly in the case). didn’t mention integration with other frameworks

what is configuration control???governenace model is reviewed not produced it is phase G

ROLE

CASE

1

Lead enterprise architectue

replacing current enterprise planning and scheduling planning with a common centralized ERP

develop a comprehensive pln for transformation to team +Request for achieve desired outsomes architicture work and benifites

2

Consultant to a chief architict

Problem in customer service

Customer service system & Developing Green initiative buissiness scenario

Chief Architect.

The Corporate Board is concerned that the new ERP system must be able to manage and safeguard customer information in a manner that meets or exceeds the legal requirements of the countries in which the company operates.

3

4

5

Lead Archtict

Lead Architict

Togaf Project

togaf action

ERP system

an architecture project was completed that defined a The Chief Engineer, standard approach for sponsor of the activity, has controlling the Automated expressed concern that a Test System that is used at uniform process be employed at each plant to perform final each site to ensure consistency. quality assurance tests on each completed blade assembly.

An Architecture Contract was developed

the researchers have been resisting the change because of concerns about

completed a Business Transformation Readiness

5

6

7

Lead Architict

Lead Architict

concerns about safeguarding individually identifiable information about the subjects who were participating in the trials

Readiness Assessment in Phase A (Architecture Vision).

develop strong directed Florians international operations team in each location, define are subject to various legal and new business models regulatory requirements. profitable and green consolidate and reduce redundant procurement company prefers to processes and systems implement existing package no particularly higher volume discounts and applications from systems useful architectural lower related IT support costs by vendors with little assets instituting a preferred supplier customization. program.

togaf phase

TOGAF PART/question

Ans wer C

Vision

Update Principals

B A D B

Vision

advise the Chief Architect on the best ways to approach to the implementation planning activities for this significant business transformation.

C A D

A recommend the approach to take in Prelimin the Preliminary Phase to ensure that ary the Corporate Board's concern is addressed

D

C B

G

You have been asked to recommend the best approach to adopt to address the Chief Engineer's concern. (COTRACT)

D

C B A

E

You have been asked to recommend how this situation be managed in the implementation planning phases.

B

You have been asked to recommend how this situation be managed in the implementation planning phases.

E

B

C D A

A You have been asked to recommend an approach that would enable the B development of an architecture that addresses the needs of all these parties D C

B-to- F Architec ture Defeniti on cycle \

\

claim Bussiness contiunty = relability /Data is shared +Secured = Security/ Maximize benefit to the organization = impove efficiency of applications (from the case) lacks data is shared and amximize benefite to the organization lacks bussiness continuity and maximize benefit to thre enterprise technology independace contradicting with the case. we should use capability based planning as we are in initiative that providing bussiness outcome and it is a horizontal activity, it is horizontal activity ,no apprach is callled developemnt lift cycle in TOGAF it shouldn't go through conventianl planning capability based plannig could be used in provate sector , it shouldn't go through conventianl planning

evaluate the requirement of the board’s concern In term of regulatory, update and publish the security policy, security team to ensure security consideration are included, assessment of security requirement for the company business and their suppliers. Missing the security policy publishing and assessment of security policy on the company business and their suppliers. it focuses on allocating security architecture team only missing updating and publishing the policy and assessing the implication of it on the company business and their suppliers wrong security is not a separate architecture projec

1- the only that mention each site (concern). 2- The onl ythat mention contract components. 3- the only that mention complaince . 4- mention deviation mangement Only mention deviation mangement. mention deviation mangement wrong. we can make change request not re quest for architicture work. a sitiuation that arise makes them return to phase A and risk mitigation

RISK MITIGATION BUT IN PHASE E NO overall solution strategy. No risk mitigation mentioned develop model ,model compaiance with local regulations, follow sequence of modeling missing complaince with regulations missing modeling sequence didn't mention modeing relation between actors and business process need from basline applications and actors use this applications relation between bussiness process and applications lifecycle of the request,interopearbility,data sharing

6

YY

P6P

HH

Q NO

PHASE

Answer

1

Preliminary

C

2

implementa tion planning

CapabilityBased Planning.

B

3

Preliminary

Adapting ADM Security

A

4

G

architicture contract

D

5

E

Risk mitigation

C

6

Vision

Stackholder concerns

D

7

content metamodel

B

8

E

Techniques

C

9

G

Architecture complaiance

D

10

A

Scope

A

11

E

Work packages

A

12

after Vision

course of action to complete the project

B

13

preliminary

Principles

D

14

F

15

F steps

B

artifacts

C

16

after preliminary

Stackholder concerns

D

17

D

architicture contract

A

18

Preliminary

Adapting ADM Security

C

19

After Vision

ADM iteation

A

20

E(prior to approval of detailed implentation plan )

assessing risk

C

21

Preliminary

Principals

B

Vision

business transformation readiness assessment

C

22

23

Extention of Priliminary content metamodel

A

24

Vsion

tacke stakholder concrns

C

25

After Vision

ADM iteation

B

26

NOT determined

Stackholder concerns

C

27

Prliminary

Principles

D

28

prilimiinary

Principals

C

Security

B

29

30

begin in B

steps in B_D

C

31

E

steps of E

D

32

Principals

D

33

content metamodel

A

34

Vision

Vision steps

A

35

Priliminary

Priliminary steps

C

Befor development Risk assessement of arciticture project

B

36

37

Compliance review steps

D

38

F

F steps

B

39

E

E steps

C

40

G

B

41

content metamodel

A

Stackholder concerns

D

42

Vision

43

Vision

Steps from B TO D

C

44

Vision

Steps of phase A

A

45

content metamodel

A

46

architicture contract

A

47

Principals

B

48

E

E steps

D

49

F

F steps

C

50

after priliminary

Stackholder concerns

A

51

E(prior to approval of detailed implentation plan )

assessing risk

D

52

D

architicture contract

A

53

After Vision

ADM iteation

B

54

content metamodel

C

55

Principals

B

56

Security In priliminary

D

57

EA TEAM SKILLS

C

58

Priliminary

Content extension

A

60

Vision

business transformation readiness assessment

C

61

E

Work packages

B

59

Rational from TOGAF minimize waste and improve the efficiency of all of its production operations = Maximize benefit to the enterprise Business continuity = reliability data is secured = data is shared, data is secured centeralized application= common use applications. outcome= capability based planning / in the case he needs horizonal green capability in the case : improving overall customer service within each business unit = in the answe: It is crucial to gain business unit support and cooperation to achieve the broader business outcomes which will benefit all

The security policy should be examined to find relevant sections, and updated if necessary. Architecture constraints established in the security policy must be communicated to the other members of the architecture team. A written security policy for the organization must be in place, and there should be regular notification and education established for employees. ISO/IEC 17799: 2005 is a good place to start the for mation of a security policy, and can be used to assess the security readiness of an organization. Without a written and published security policy, enforcement is difficult Architecture constraints established in the security policy must be communicated to the other members of the architecture team.

Phase G establishes the connection between architecture and implementation organization, through the Architecture Contract. Project details are developed, including: ■ Name, descr iption, and objectives/■ Scope, deliverables, and constraints ■ Measures of efectiveness/■ Acceptance criter ia/■ Risks and issues The steps in Phase G are as follows: ■ Confir m scope and prior ities for deployment with development management ■ Identify deployment resources and skills ■ Guide development of solutions deployment ■ Perform enterprise architecture compliance reviews ■ Implement business and IT operations ■ Perfor m post-implementation review and close the implementation

Confirm Readiness and Risk for Business Transformation Review the findings of the Business Transfor mation Readiness Assessment previously conducted in Phase A and determine their impact on the Architecture Roadmap and the Implementation and Migration Strategy. It is impor tant to identify, classify, and mitigate risks associated with the transfor mation efor t. Risks should be documented in the Consolidated Gaps, Solutions, and Dependencies matrix. Science I need to analyse stackholders with their concerns I begin with stackholder map

1. What groups of people should be involved in procurement-related business processes? = Business Service/Function catalog 2. What current applications do those groups use? App Organization matrix 3. Which procurement-related business processes are supported by zero, one, or many existing applications? 4. What are the overall lifetimes of the Request for Proposal and Purchase Order business objects? = Product Lifecycle diagrams 5. What non-procurement applications will need to be integrated with any new procurement applications? Application Communication diagrams and an Application Interaction matrix 6. What data will need to be shared? = Data Entity/Business Function matrix

lists the steps (techniques) to construct initial implementation and migration plan The steps in Phase E are as follows: n Deter mine/confirm m key cor porate change attributes n Deter mine business constraints for implementation n Review and consolidate gap analysis results from Phases B to D n Review consolidated requirements across related business functions n Consolidate and reconcile interoperability requirements n Refine and validate dependencies) n Confirm readiness and risk for business transform mation n Formulate Implementation and Migration Strategy n Identify and group major wor k packages n Identify Transition Architectures n Create the Architecture Roadmap & Implementation and Migration Plan

Non-conformant: Any of the above in which some features in the architecture specification are implemented not in accordance with the specification appropriate and useful technique to discover and document business requirements, and to ar ticulate an Architecture Vision that responds to those requirements 13.4.9 Identify and Group Major Work Packages Key stakeholders, planners, and the enterpr ise architects should assess the missing business capabilities identified in the Architecture Vision and Target Architecture. Using the Consolidated Gaps, Solutions, and Dependencies matrix together with the Implementation Factor ssessment and Deduction matrix, logically group the var ious activities into wor k packages.

summerize togaf steps after vision

Pr inciples are general rules and guidelines, intended to be enduring and seldom amended, that infor m and support the way in which an organization sets about fulfilling its mission. Architecture principles are typically developed by the enterpr ise architects, in conjunction with the key stakeholders, and are approved by the Architecture Board.

Confirm management framework interactions for Implementation and Migration Plan n Assign a business value to each work package n Estimate resource requirements, project timings, and availability/delivery vehicle n Prioritize the migration projects through the conduct of a cost/benefit assessment and risk validation n Confirm Architecture Roadmap and update Architecture Definition Document n Complete the Implementation and Migration Plan n Complete the architecture development cycle and document lessons learned science there is no architictue exists we neglect points that begins with baseline / concern 1 relationship between business process and applications which exists in data entity/business function matrix and application data matrix dtat will be shared it needs a baseline artifact for data which is data entity/data component entity The purpose of the Stakeholder Map matrix is to identify the stakeholders for the architecture engagement, their influence over the engagement, and their key questions, issues, or concer ns that must be addressed by the architecture framework.

Phase G establishes the connection between architecture and implementation organization, through the Architecture Contract. Project details are developed, including: ■ Name, descr iption, and objectives/■ Scope, deliverables, and constraints ■ Measures of efectiveness/■ Acceptance criter ia/■ Risks and issues The steps in Phase G are as follows: ■ Confir m scope and prior ities for deployment with development management ■ Identify deployment resources and skills ■ Guide development of solutions deployment ■ Perfor m enter prise architecture compliance reviews ■ Implement business and IT operations ■ Perfor m post-implementation review and close the implementation

Define and document applicable regulatory and security policy requirements The framework and principles rarely change, and so the security implications called out in the objectives of this phase should be fair lee straightforward. A written security policy for the organization must be in place, and there should be regular notification and education established for employees. ISO/IEC 17799: 2005 is a good place to start the for mation of a security policy, and can be used to assess the security readiness of an organization. Without a written and published security policy, enforcement is difficult. Security policies refer to many aspects of secur ity for the organization — such as physical premises security — that are remotely related to secur ity of systems and applications. The security policy should be examined to find relevant sections, and updated if necessary. Architecture constraints established in the security policy must be communicated to the other members of the architecture team. In a similar fashion, there may be regulator y requirements that specify obligations the system must fulfil or actions that must be taken. Whether the system will be subject to regulation will depend upon the functionality of the system and the data collected or maintained. In addition, the jurisdiction where the system or service is deployed, where the users reside, or under which the deploying entity is chartered or incorporated will infor m this decision. It may be wise to obtain legal counsel regarding these obligations at the outset of activities.

Architectural Definition of Bounded Change Initiatives Architecture Development (Target First) Transition Planning Focus on elaborating the target to meet a previously defined an agreed vision, scope, or set of constraints. Use the target as a basis for analysis to avoid per petuation of baseline, suboptimal architectures Review the findings of the Business Transfor mation Readiness Assessment previously conducted in Phase A and determine their impact on the Architecture Roadmap and the Implementation and Migration Strategy. It is impor tant to identify, classify, and mitigate risks associated with the transfor mation efor t. Risks should be documented in the Consolidated Gaps, Solutions, and Dependencies matrix. Bussiness contiunty = relability /Data is shared +Secured = Security/ Maximize benefit to the organization = impove efficiency of applications (from the case) A Business Transfor mation Readiness Assessment can be used to evaluate and quantify the organization’s readiness to undergo a change. This assessment is based upon the determination and analysis/rating of a series of readiness factors, as descr ibed in Chapter 30. The results of the readiness assessment should be added to the Capability Assessment (see Part IV, Section 36.2.10). These results are then used to shape the scope of the architecture, to identify activities required within the architecture project, and to identify risk areas to be addressed.

Governance Extensions:Extension to support in-depth, operational governance/ Services Extensions: Extension to support definition of discrete business and application services Process Modeling Extensions : Extension to support process modeling Data Extensions:Extension to support data modeling Infrastructure Consolidation Extensions : Extension to support consolidation of applications and technology across locations Motivation Extensions : Extension to support linkage of drivers, goals, and objectives to organizations and services All extension modules are optional and should be selected during the Preliminary Phase of the architecture development to meet the needs of the organization

Architectural Definition of Bounded Change Initiatives Architecture Development (Target First) Transition Planning Focus on elaborating the target to meet a previously defined an agreed vision, scope, or set of constraints. Use the target as a basis for analysis to avoid per petuation of baseline, suboptimal architectures The purpose of the Stakeholder Map matrix is to identify the stakeholders for the architecture engagement, their influence over the engagement, and their key questions, issues, or concer ns that must be addressed by the architecture framework.

Architecture principles are typically developed by the enterpr ise architects, in conjunction with the key stakeholders, and are approved by the Architecture Board. Architecture principles will be infor med by principles at the enterpr ise level, if they exist. Architecture principles must be clearly traceable and clearly articulated to guide decisionmaking. They are chosen so as to ensure alignment of the architecture and implementation of the Target Architecture with business strategies and visions. Specifically, the development of architecture principles is typically influenced by the following: n Enterprise mission and plans: the mission, plans, and organizational infrastr ucture of the enter prise. n Enterprise strategic initiatives: the character istics of the enterpr ise — its strengths, weaknesses, oppor tunities, and threats — and its current enterpr ise-wide initiatives (such as process improvement and quality management). n External constraints: mar ket factors (time-to-market imperatives, customer expectations, etc.); existing and potential legislation. n Current systems and technology: the set of infor mation resources deployed within the enter prise, including systems documentation, equipment inventor ies, networ k configuration diagrams, policies, and procedures. n Emerging industry trends: predictions about economic, political, technical, and market factors that influence the enterpr ise environment.

Bussiness contiunty = relability /Data is shared +Secured = Security/ Maximize benefit to the organization = impove efficiency of applications (from the case) Secur ity concer ns are pervasive throughout the architecture domains and in all phases of the architecture development. Security is called out separately because it is infrastr ucture that is rarely visible to the business function. All groups of stakeholders in the enterpr ise will have secur ity concer ns and it is desirable to br ing a secur ity architect into the project as early as possible. Throughout the phases of the ADM, guidance will be ofered on security-specific infor mation which should be gathered, steps which should be taken, and artifacts which should be created. Architecture decisions related to secur ity should be traceable to business and policy decisions and their risk management.

no assessts and target is not clear so traditional baseline bottom up approach The steps in Phase E are as follows: Deter mine/confirm key corporate change attributes Deter mine business constraints for implementation Review and consolidate gap analysis results from Phases B to D Review consolidated requirements across related business functions Consolidate and reconcile interoperability requirements Refine and validate dependencies Confirm readiness and risk for business transformation Formulate Implementation and Migration planning Identify and group major work packages Identify transition Architectures Creat the architecture roadmap & implementation and migration plan.

Quality of data :Data Trustee: Statement: Each data element has a trustee accountable for data quality. Maintain without disruption : business continuty : Statement: Enterprise operations are maintained in spite of system interruptions. without any unforseen delays :Responsive Change Management:Changes to the enterpr ise infor mation environment are implemented in a timely manner.Implications: We have to develop processes for managing and implementing change that do not create delays. Technology Independence : Statement: Applications are independent of specific technology choices and therefore can operate on a var iety of technology platfor ms.

1- They want to analyze the roles of the top management for each revenue earning service = means role and business service =Actor/Role Matrix 2-many of the HR related critical Search application component have become extremely slow. This needs to be diagnosed and rectified. = System/Functions Matrix 3- there is no proper tracking of revenue from retail store component products over time. = Data Entity/Business Function Matrix 4- There has also been a lot of unauthorized or unwanted access to many of the critical information. Hence the mode of access needs to be strengthened and made much more secure. = Data Security Diagram 5- the new launches and the progress of each of the launches over time. = Technology Portfolio Catalog

#VALUE! The steps within the Preliminary Phase are as follows: n Scope the enterpr ise organizations impacted (see Section 6.4.1) n Confir m governance and support frameworks (see Section 6.4.2) n Define and establish enterpr ise architecture team and organization (see Section 6.4.3) n Identify and establish architecture principles (see Section 6.4.4) n Tailor TOGAF and, if any, other selected Architecture Frameworks (see Section 6.4.5) n Implement architecture tools (

There will always be risk with any architecture/business transfor mation efor t. It is important to identify, classify, and mitigate these risks before starting so that they can be tracked throughout the transfor mation efor t. Mitigation is an ongoing efor t and often the risk triggers may be outside the scope of the transfor mation planners (e.g., merger, acquisition) so planners must monitor the transfor mation context constantly. It is also important to note that the enterpr ise architect may identify the risks and mitigate certain ones, but it is within the governance framework that risks have to be first accepted and then managed. The risk identification and mitigation assessment wor ksheets are maintained as governance ar tifacts and are kept up-to-date in Phase G (Implementation Governance) where risk monitoring is conducted.

1-Request architecture review,2-Identify responsible part of Architecture Review ,3-Identify Lead Enterpr ise Architecture , 4 Deter mine scope of review,5- Tailor checklists.,6shedule Architecture Review Meeting 7 Inter view project principals,8 Analyze completed checklists,9 Prepare Architecture Compliance review repor t 10 Present review findings 11 Accept review and sign of 12 Send assessment Lead Enter prise Architect repor t/summar

The steps in Phase F are as follows: n Confirm management framework interactions for Implementation and Migration Plan n Assign a business value to each work package n Estimate resource requirements, project timings, and availability/delivery vehicle ( n Prioritize the migration projects through the conduct of a cost/benefit assessment and risk validation n Confir m Architecture Roadmap and update Architecture Definition Document n Complete the Implementation and Migration Plan n Complete the architecture development cycle and document lessons learned

The steps in Phase E are as follows: Deter mine/confirm key corporate change attributes Deter mine business constraints for implementation Review and consolidate gap analysis results from Phases B to D Review consolidated requirements across related business functions Consolidate and reconcile interoperability requirements Refine and validate dependencies Confirm readiness and risk for business transformation Formulate Implementation and Migration planning Identify and group major work packages Identify transition Architectures Creat the architecture roadmap & implementation and migration plan. most TOGAFSH · To identify the changes to existing business processes.=Process/Event/Control/Product Catalog : identify the full chain of impacts resulting from changing a high-level process. · To identify the data entities that can be shared among the sales agents.= Data Entity/Data Component Catalog · To clarify how to keep the data secured.= Data Security diagram,System/Data matrix, · To identify the list of non-sales application to be integrated with the sales applications= interface catalog

Identify Stakeholders, Concerns, and Business Requirements Identify the key stakeholders and their concerns/objectives, and define the key business requirements to be addressed in the architecture engagement The major product resulting from this step is a stakeholder map for the engagement, showing which stakeholders are involved with the engagement, their level of involvement, and their key concernsAnother key task will be to consider which architecture views and viewpoints need to be developed to satisfy the var ious stakeholder requirements.

The steps in Phase B are as follows: as example n Select reference models, viewpoints, and tools (see Section 8.4.1) n Develop Baseline Business Architecture Description (see Section 8.4.2) n Develop Target Business Architecture Description (see Section 8.4.3) n Perfor m gap analysis (see Section 8.4.4) n Define candidate roadmap components (see Section 8.4.5) n Resolve impacts across the Architecture Landscape (see Section 8.4.6) n Conduct for mal stakeholder review (see Section 8.4.7) n Finalize the Business Architecture (see Section 8.4.8) n Create Architecture Definition Document (

The steps in Phase A are as follows: n Establish the architecture project (see Section 7.4.1) n Identify stakeholders, concer ns, and business requirements (see Section 7.4.2) n Confir m and elaborate business goals, business drivers, and constraints n Evaluate business capabilities (see Section 7.4.4) n Assess readiness for business transfor mation (see Section 7.4.5) n Define scope (see Section 7.4.6) n Confirm and elaborate Architecture Principles, including business principles n Develop Architecture Vision (see Section 7.4.8) n Define the Target Architecture value propositions and KPIs (see Section 7.4.9) n Identify the business transfor mation risks and mitigation activities (see Section 7.4.10) n Develop Statement of Architecture Wor k; secure approval (see Section 7.4.11)

You first list the data used across the enterprise using a Data Entity/Data Component Catalog, including data entities and also the data components where data entities are stored. You then classify what the data source are and the relationship with the data entities via a System/Data Matrix. You finally identify common data requirements using a Data Lifecycle Diagram.

Typical contents of an Architecture Design and Development Contract are: n Introduction and background n The nature of the agreement n Scope of the architecture n Architecture and strategic principles and requirements n Confor mance requirements n Architecture development and management process and roles n Target Architecture measures n Defined phases of deliverables n Pr ior itized joint wor kplan n Time window(s) n Architecture deliver y and business metrics

reliability= Business Continuity Statement: Enterprise operations are maintained in spite of system interruptions. Rationale: As system operations become more pervasive, we become more dependent on them; therefore, we must consider the reliability of such systems throughout their design and use. Security :Data is shared + Data is secured

The steps in Phase E are as follows: Deter mine/confirm key corporate change attributes Deter mine business constraints for implementation Review and consolidate gap analysis results from Phases B to D Review consolidated requirements across related business functions Consolidate and reconcile interoperability requirements Refine and validate dependencies Confirm readiness and risk for business transformation Formulate Implementation and Migration planning Identify and group major work packages Identify transition Architectures Creat the architecture roadmap & implementation and migration plan.

The steps in Phase F are as follows: n Confirm management framework interactions for Implementation and Migration Plan n Assign a business value to each work package n Estimate resource requirements, project timings, and availability/delivery vehicle ( n Prioritize the migration projects through the conduct of a cost/benefit assessment and risk validation n Confir m Architecture Roadmap and update Architecture Definition Document n Complete the Implementation and Migration Plan n Complete the architecture development cycle and document lessons learned

Review the findings of the Business Transfor mation Readiness Assessment previously conducted in Phase A and determine their impact on the Architecture Roadmap and the Implementation and Migration Strategy. It is impor tant to identify, classify, and mitigate risks associated with the transfor mation efor t. Risks should be documented in the Consolidated Gaps, Solutions, and Dependencies matrix.

Phase G establishes the connection between architecture and implementation organization, through the Architecture Contract. Project details are developed, including: ■ Name, descr iption, and objectives/■ Scope, deliverables, and constraints ■ Measures of efectiveness/■ Acceptance criter ia/■ Risks and issues The steps in Phase G are as follows: ■ Confir m scope and prior ities for deployment with development management ■ Identify deployment resources and skills ■ Guide development of solutions deployment ■ Perfor m enter prise architecture compliance reviews ■ Implement business and IT operations ■ Perfor m post-implementation review and close the implementation

Architectural Definition of Bounded Change Initiatives Architecture Development (Target First) Transition Planning Focus on elaborating the target to meet a previously defined an agreed vision, scope, or set of constraints. Use the target as a basis for analysis to avoid per petuation of baseline, suboptimal architectures What groups of people should be involved in procurement-related business processes? = business interaction matrix What are the overall lifetimes of the Request for Proposal and Purchase Order business objects? = Data life cycle Diagram What non-procurement applications will need to be integrated with any new procurement applications? =Application communication diagram , Application interaction matrix

Define and document applicable regulatory and security policy requirements The framework and principles rarely change, and so the security implications called out in the objectives of this phase should be fair ly straightforward. A written security policy for the organization must be in place, and there should be regular notification and education established for employees. Skills frameworks provide a view of the competency levels required for specific roles. They define: n The roles within a wor k area n The skills required by each role n The depth of knowledge required to fulfil the role successfully

problem from the case : 1- upgrade reliability and performanc e for its secure communication service . 2- the upgraded system must be able to provide assurance and verifications of specific performance measures on the key services . 3- focusing on these service level details and specific mesasures allow more strong strong requirements to be inforced in service contract . 4- review processes, content , governeance of th EA cabability to ensure higher target performance and service levels required by the upgraded system . 5- the artifact don't have explicit provision for defing the in-depth measurement requirements regarding specific services from TOGAF 34.4.1 Governance Extensions The scope of this extension is as follows: n The ability to apply measures to objectives and then link those measures to services Changes to the metamodel entities and relationships are as follows: n Measure is added as a new entity that links objective and business service. n Ser vice Quality is added as a new entity that provides a generic service profile template to be applied to business services or contracts. Changes to the metamodel attributes are as follows: n Attr ibutes are added for the new metamodel entities of Measure, Ser vice Quality, and Ser vice Contract 34.4.6 Motivation Extensions Purpose The motivation extension is intended to allow additional structured modeling of the drivers, goals, and objectives that influence an organization to provide business services to its customers. This in turn allows more efective definition of service contracts and better measurement of business perfor mance.

A Business Transfor mation Readiness Assessment can be used to evaluate and quantify the organization’s readiness to undergo a change. This assessment is based upon the determination and analysis/rating of a series of readiness factors, as descr ibed in Chapter 30. The results of the readiness assessment should be added to the Capability Assessment (see Part IV, Section 36.2.10). These results are then used to shape the scope of the architecture, to identify activities required within the architecture project, and to identify risk areas to be addressed. 13.4.9 Identify and Group Major Work Packages Key stakeholders, planners, and the enterpr ise architects should assess the missing business capabilities identified in the Architecture Vision and Target Architecture. Using the Consolidated Gaps, Solutions, and Dependencies matrix together with the Implementation Factor ssessment and Deduction matrix, logically group the var ious activities into wor k packages.

Comments

Question 17

tamam

same as 61

same as 27

same as 7

same as 6 we ana mosh moktan3a

Question 4

tamam

discussed well in answers we hoa megawb wrong same as,25 , 53

same as 51

same as 29 tamam

tamam same as 60

discussed well in answers we hoa megawb wrong same as,19 , 53

Confusion sam as 6 and 16

same as 13

same as 21

hoa mgawb wrong

tamam

tamam

tamam

reconsider

zeft & vey confusing

confusing

tamam

tamam

tamam

tamam

tamam we hoa megawb wrong

tamam we hoa megawb wrong

tamam we hoa megawb wrong

tamam we hoa megawb wrong

same as 20

tamam we hoa megawb wrong same as 17

discussed well in answers we hoa megawb wrong same as 19

tamam subset of 7

tamam we hoa megawb wrong

same as 18

hoa mgawb wrong

tamam same as 22 we hoa mwgawb wrong

tamam we hoa megawb wrong same as 11

App Integration

Interface Catalouge App Interaction Matrix App Communication Diagram

Data Security

Data Security Diagram

Changes in Bus Processes over time

Process/event/control/product Catalouge

roles of top Management

Actor/Role Matrix

Identify Common Data Req.

Data life Cycle Diagram

Purchase Order

Product life cycle Diagram

Mesurement

Governance extension

group of people

Function or Organization

Realiability Distracion

Bus Contuenity Bus Contuenity

minimize Waste, improve efficincy

Maxemize Benefit to enterprize

Data is Shared, Data Secure

Security

Time to Change

Responsive Change Management

Data Quality

Data Trustee

Dependieces is minimal

Technology independence

Data Is an asset

A I ensure there is a Request for Architecture Work from the CIO. Then I ensure that there is recognition for the architecture vision project by following any project management and programmed management frameworks used within the organization. I would identify the key stakeholders and engage with them to understand and document their concerns and high-level requirements. This would result in a stakeholder map used to support other deliverables such as the Architecture Vision, a Communications plan and a Statement of Architecture Work. I would then define the business capabilities of the organization needed to fulfill those business goals and drivers and their readiness for change. Once complete, I would define the scope , confirm the architecture business principles and develop the Architecture Vision. would define the business case for the architecture project, assess the business risks and produce a risk mitigation plan.

I would then define a plan of enterprise architecture work to meet the scope in the desired time line and the resources required and secure the support of stakeholders.

C I would start by establishing the architecture project and follow the appropriate project management method.

I would identify stakeholders their concerns and business requirements

then confirm and elaborate the business goals, business drivers and constraints I would then evaluate the business capabilities and readiness for business transformation and define the scope. I would then develop the architecture vision , define the target architecture value proposition, KPIs and identify and mitigate all risks associated with the transformation efort.

I would develop an Enterprise Architecture Plan and Statement of Work and secure approval from the relevant stakeholders.

The steps in Phase A are as follows: n Establish the architecture project (see Section 7.4.1) n Identify stakeholders, concer ns, and business requirements (see Section 7.4.2) n Confir m and elaborate business goals, business drivers, and constraints (see Section 7.4.3) n Evaluate business capabilities (see Section 7.4.4) n Assess readiness for business transfor mation (see Section 7.4.5) n Define scope (see Section 7.4.6) n Confirm and elaborate Architecture Principles, including business principles (see Section 7.4.7) n Develop Architecture Vision (see Section 7.4.8) n Define the Target Architecture value propositions and KPIs (see Section 7.4.9) n Identify the business transfor mation risks and mitigation activities (see Section 7.4.10) n Develop Statement of Architecture Wor k; secure approval (see Section 7.4.11)

Related Documents

Ais Final Final Final
November 2019 111
Final Final
June 2020 55
Final
June 2020 2

More Documents from ""