FEAC Certified
{loadposition certsearch}
{loadposition 10295}
Aggregated enterprise architecture wisdom
{loadposition certsearch}
{loadposition 10295}
Last week I talked about 5 Must-Have Characteristics to Enable Enterprise Architecture Successfully. This week I would like to talk about Data We Can Trust.
Over the last year, I have had the privilege to work with a large organization to help them rea…
By Erwin Oord, Principal Consultant Enterprise Architecture and Managing Partner at Netherlands-based ArchiXL Consultancy Common methods for Enterprise Architecture used at present have been around for ages already. Although these methods have made a strong contribution to the development of … Continue reading →
Total digitization is a big challenge for all companies. It’s also a sizeable investment. Some companies are spending 25% of their operating budget on total digitization, so the stakes are already pretty high. It’s important for firms to implement the right approach to meet their growing digital needs. In the first blog post of this […]
To be a self-sufficient contributor to an organization and/or to provide leadership to others, I feel its important to manage oneself first. I think using a formal/information system aides us in attaining clarity in our minds. That state of shoshin – a beginner’s mind ready for anything. This assertion, coupled with my own OCD around […]
Enterprise architecture “should not only provide value on implementation, but at each stage of the strategy-execution lifecycle.” I’ve recently written “A Step-by-Step Guide to Using Enterprise Patterns,” as an Executive Update for Cutter Consortium. My previous Cutter work has discussed enterprise patterns, and has provided a step-by-step guide to create them. In this Executive Update,…
Guest blog by James Selden It’s no secret that the current healthcare system isn’t working. Though well-intentioned, the original model was not built for today’s complex healthcare environment where fragmentation and integration co-exist (see New Health Economy). Private practice physicians proliferated. As a result, the centralized communication needed to deliver a holistic perspective of the patient’s care that would have managed rising costs, improved patient utilization and provided optional health outcomes was never met. While […]
If you liked this, you might also like:
According to Microsoft, “In today’s corporate environment, enterprise applications are complex, scalable, distributed, component-based, and mission-critical.”
Does this sound like something you should be managing with spreadsheets and guess work?
For most organizations in today’s digital business environment, big enterprise applications actually drive the business. Companies invest a lot of time, resources and money into business critical applications so it makes sense to take the appropriate steps to make sure these applications are providing your organization with the value and service intended and not opening you up to unnecessary risk.
I have walked into large global enterprises still using spreadsheets to track the life cycle of all of their technology, expecting to be able to stay on top of what’s current and still supported and what’s nearing the end of active support. Mismanaging this data can lead to security vulnerabilities, failure of critical processes, corporate compliance issues and much higher cost of support, yet large organizations continue to rely on a method that has proven time and time again to be dangerously error-prone.
It’s hard to argue that a manually updated spreadsheet stored on a shared drive somewhere is a smart way to protect an organization from unnecessary risk and costs. Especially when there are automated, efficient and accurate tools out there to eradicate the issue.
By understanding the current business context, security vulnerabilities and costs associated with each enterprise application (something not possible by spreadsheet alone), an organization can confidently manage the risks, expenses and resources required to ensure your end users are getting what they need and the business is seeing value.
It sounds like common sense, but the first step is simply understanding how your applications support the business – specifically how are they tied to your goals and strategies, your processes, your capabilities, your policies and your organizations? Are the intended users actually using the software? Is it providing a service or gathering virtual dust while you continue to pay money to support it?
Second we need to understand where our applications may have security vulnerabilities. Once a technology reaches end of life and goes out of manufacturer support, no more security patches will be produced, meaning defense from hackers and other outside intrusions is instantly non-existent.
Last but not least, identify the costs of maintaining each application. We often find that the most expensive applications are those built on old unsupported technology. They will have higher support costs, more trouble tickets, are more difficult and expensive to maintain, and often utilize older and more expensive legacy infrastructure.
Once we put all of this data in the enterprise context we can take the guess work out of managing our application end of life program, because we now know what to pay attention to and what to ignore.
Through an integration with BDNA Technopedia, the world’s largest repository of IT software and hardware information, Troux customers use our Enterprise Portfolio Management solutions to make informed decisions around planning, managing and retiring their End-of-Life application software efficiently.
Join our upcoming webinar “Taking the Guesswork out of Managing the End-of-Life for Enterprise Applications” Wednesday, September 10, to see a live demo with Troux and BDNA and learn how to automatically gain visibility into the entire technology asset lifecycle including End-of-Life dates for application software.
I have to declare my position. It will probably come as no surprise to those who read this site that I’m not exactly a fan of TOGAF. But, I have to say one of the best things they have ever done is support ArchiMate. I am a big fan of ArchiMate and use […]
I am very proud to announce that we have published the first version of our IT Core Service Catalogue for our university. We started this process in November 2012 and I described the approach in a post called : Introducing IT Service Management Using a Core Service Catalogue. This post described our approach to building […]
The post Our First IT Core Service Catalogue appeared first on Enterprise Architecture in Higher Education.
The train was full, of course – standing-room only. I made my way down to the onboard cafe-bar, not in the hope of finding a seat, but more of finding some place to stand that wouldn’t result in jostling someone…
By Jose Salamanca, UST Global, and Vicente Aceituno, Inovement In order to prevent duplication of work and maximize the value provided by the Enterprise Architecture and Information Security discipline, it is necessary to find ways to communicate and take advantage … Continue reading →