Sunday, May 26, 2019

Final Corporate Enterprise

opening architecture is a strategic planning form of an organization. It is an important foundation that has grown from the impact of globalization and modern market kinetics. It facilitates an organization streamline technological and Information Technology (IT) strategies achieve tangible synergies and mensurate addition in its business. There ar key tonuss, and milestones involved in the designing and implementation of this model from the corporate current state to a final exam corporate Enterprise Architecture (EA).The steps, standards and guidelines involved in the go-ahead architecture work at are discussed below. However every enterprise has its own unique characteristics heart and soul that there can be no particular model of enterprise architecture that suits all enterprises. The person responsible for the development of the enterprise architecture is the enterprise architect (Feurer, 2007). Step 1 Initiate the EA Program The involvement and approval of the manageme nt of the corporation bears a pivotal role in this process.Therefore the initial step would be to win the good forget and commitment of the management team (Feurer, 2007). Step 2 Establish EA governance Effective governance demands a competent decision-making process that elaborately defines the roles and responsibilities of the parties involved in the process as well as the desire standards to be attained. Enterprise architecture governance has five fundamental viewpoints to wit organization and roles, processes, standards and templates, tools, and key performance indicators (KPIs).The responsibility of the enterprise architect will be to define governance principles, integrating governance into the EA and identifying the relevant governance bodies to hold in the process complies with the defined EA principles (Feurer, 2007). Step 3 Define the Architectural Approach In this step the EA team defines the bridging strategy to close the time out between the current-state and the fi nal-state.There are six major tasks in this step to understand and utilize the enterprises operating model, draw a basic core graphic representation of the organizations operating model that depicts the desired state of the enterprise architecture (this may require a particular template ), definition of the utilization and scope of the EA-this should be in tandem with the organizations strategic plan, collaborate with the various stakeholders of the organization by educating the stakeholders on the benefits of the EA, the identification of the most stamp down EA framework is make at this point and lastly, the implementation of the EA is bound to demand skills that may not be currently in the organization, therefore elaborate educational and skill sweetening programs are developed at this stage (Feurer, 2007). Step 4 Develop the EA In developing the final-state EA, the basic viewpoints will have to be clearly clear up for the purpose of accomplishing the following collecting info rmation and developing an information resource base on enterprise architecture in order to develop appropriate EA products as well as carry out a gap analysis and design the way forward to the final-state, defining the final-state as it would be desired (the to-be state), document the current-state. The current-state assessment document is meant to provide the necessary information to guide the strategy to the final-state (Cashman, 2005.p 8) (See a graphic representation of current-state assessment in appendix A). withal in this step the EA products should be reviewed and updated to comply with the desired state. This is jointly done with the subject matter experts (SMEs) (Feurer, 2007). The gaps between the current-state and final-state are analyzed with the help of a gap analysis. The way forward referred to as the migration path is planned. It will include a step by step process of movement from the current-state to the final-state with a focus on the resources required. Finally the approval and publishing of the EA is done. Step 5 Use the EA The Enterprise architecture is used as a strategic planning model of an organization.It will provide a collaboration platform for the EA team and the people who will implement it. In this step there is the promotion of the use of EA, the utilization of EA in procurement of the appropriate technological infrastructure, and lastly the implementation of the Corporations projects by the use of EA. Step 6 Maintain the EA The EA should be assimilated in the dynamics of the corporations business. It should be periodically reviewed with the view to adapt the necessary changes. Conclusion The evolving of enterprise architecture is a major step in the suppuration opportunities for innovation in any organization that seeks to comply with the global standards.As much as EA enhances the corporate image of an organization it is paramount that the corporation shares the lessons learnt with other organizations (Feurer, 2007). adden dum A The graphic representation above shows the current state of ICT in an organizations department under five separate but interrelate topics (Cashman,2005. p 3). References Cashman, T. (2005). Current State Assessment ICT Strategy Project. Department of Communications, Marine and Natural Resources. Retrieved February 21, 2009 from http//www. dcenr. gov. ie/NR/rdonlyres/C7917512-C6D9-43AB-8FAF-75525AC353B0/0/ICTStrategyCurrentStateAssessment. pdf Feurer, S. , (2007). Putting the Enterprise Architect in Enterprise Architecture.SAP NetWeaver Magazine. Retrieved February 21, 2009 from http//www. netweavermagazine. com/archive/Volume_04_(2008)/Issue_01_(Winter)/v4i1a09. cfm? session Feurer, S. , (2009). Building an Agile Enterprise Architecture. SAP NetWeaver Magazine. Retrieved February 21, 2009 from http//www. sapnetweavermagazine. com/archive/Volume_03_(2007)/Issue_04_(Fall)/v3i4a12. cfm? session Kreizman, G. , & Robertson, B. , (2006). Incorporating security into the Enterprise A rchitecture Process. Retrieved February 21,2009 from http//egovstandards. gov. in/egs/eswg5/enterprise-architecture-working-group-folder/gartners-reports/incorporating_security_into__137028. pdf/download

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.