Kim Cameron’s 7 Laws of Identity

1. User Control and Consent:
Digital identity systems must only reveal information identifying a user with the user’s consent. 
2. Limited Disclosure for Limited Use
The solution which discloses the least identifying informat…

Categories Uncategorized

Simple is Better: How EA is Boosting Business Agility at Dell

 
Dell’s entrepreneurial culture helped it grow into a global enterprise. But as Dell grew, disparate applications and processes made it harder to meet competitive challenges and comply with stricter financial regulations.
Using a “sim…

Categories Uncategorized

Tweets from Open Group conference, Austin

A selection of Tweets from various folks – with an especial thank-you to @systemsflow and @theopengroup – from the Open Group conference, Austin, Texas, 18-20 July 2011, via the Twitter hashtag #ogaus. (Selected in the sense that most of the Tweets I’ve included are on business-architecture and enterprise-architecture – I haven’t included much on Cloud, […]

Passing TOGAF

Well, I passed the TOGAF Certification Exam.  Super happy.  Here is some advice that I passed on to someone who saw my previous post:
I recommend the class led by Architecting the Enterprise.  That will get you familiar with the materi…

More on business-models

Back on business-models again, this time with more of an emphasis on the implications for enterprise-architecture, rather than solely for business-architecture.
The initial challenge posed by my colleague was to describe my own business model, by which he meant “how do I make money?”. But there’s a bit more to it than that, which is what […]

Passing TOGAF

Well, I passed the TOGAF Certification Exam.  Super happy.  Here is some advice that I passed on to someone who saw my previous post:
I recommend the class led by Architecting the Enterprise.  That will get you familiar with the materi…