In previous blogs, we have written about the combination of structure and data to create novel insights into your enterprise, and about how this can support creating a Digital Twin of your organization. To reiterate, a digital twin is a digital representation of a real-world entity or system.
Application Portfolio Management
Application Programming Interfaces (APIs) have emerged in recent years as a key enabler of digital transformation and enterprise agility.
In my recent blog post on stakeholder communication, I described various basic forms of communication about architecture, with diagrams, tables, heatmaps and the like. What I did not touch upon in that post is how you can enrich your architecture (and other) models with additional data and display the results in various dashboards. That is the topic of this post.
Everyone remotely involved with enterprise architecture and similar disciplines knows the importance of knowing your stakeholders. Stakeholder management is a key technique in EA and many methods, including TOGAF, stress its importance. But there is more to management than keeping individual stakeholders happy. In this blog post, I want to introduce three techniques that not only help you ensure stakeholder satisfaction, but also make good use of stakeholders and their influence in achieving business goals.
In modern enterprises, change is no longer a simple, top-down affair. All levels of the organization need to be involved, and everyone from shop-floor employees to the CEO need to work on local improvements to business processes. Lean projects and agile product development teams must rapidly innovate digital environments, strategists need to invent and experiment with new business models, project and program portfolio managers have to decide on investment allocations, and those responsible for domains like risk management and regulatory compliance have to do their part. This “all hands on deck” approach requires enterprise-wide transparency and visibility of plans, structures, opportunities and constraints.
In my previous post, I discussed how you can analyze the business and technical value of your applications, and how architecture models are key in calculating metrics such as the business criticality or strategic value of applications. In this post, I want to focus on financial analysis, and in particular on cost models.
In the previous installment in this blog series, we looked into planning and analyzing change in the enterprise by linking the life cycles of elements such as applications and projects. But how do you decide what to do with, for example, your application landscape? Which applications need to be improved, re-platformed, functionally upgraded, or phased out?
In recent years, we see the audience and attention for business architecture steadily increase. A business architecture provides a business-oriented abstraction of the enterprise in its ecosystem, which helps the organization in decision-making and direction-setting. This maturation of the business architecture discipline makes the role of model-based support for design, analysis and decision-making also increasingly important. In this series of posts we will introduce you to useful techniques for business architecture modeling and how they are supported by BiZZdesign Enterprise Studio. Read more
Strategists, architects, process experts, software developers, data managers and other professionals involved in changing the enterprise often put substantial effort in creating all kinds of useful models of their designs. In many cases, such business models, enterprise architecture models, business process models, software models, data models and more are only used to specify some design, i.e., to describe what should be built. But there is much more value to be had from these models, by using powerful analysis techniques to create new insights. Read more
Organizations involved in major strategic changes such as mergers, acquisitions and divestitures often focus mostly on the financial and market aspects of the change. What is the impact on your market share? How can you increase buying power from your suppliers? What cost savings can be realized by exploiting synergies? Read more
In my previous blog post, I described the new EU General Data Protection Regulation (GDPR) that will go into effect in May 2018, and I outlined its profound effects on organizations, not just in Europe but around the globe. This regulation, and related EU Directives such as the ePrivacy Directive and the Network and Information System Security (NIS) Directive, force organizations to rethink how they deal with personal, privacy-sensitive data. In this blog, I want to address the steps you can take as an architect to help your organization comply with these regulations.
In this blog post, we discuss the value of an integrated approach to managing risk, compliance and security in the enterprise, using enterprise architecture as a backbone.
Many organizations with large legacy application landscapes can no longer postpone a major overhaul of their IT. But how do you avoid creating tomorrow’s legacy today all over again? And how do you spend your IT budget in the most sensible way? Next to appropriate design and development practices (e.g. enterprise architecture, agile and DevOps, as we addressed in our previous blog) you need to manage your application portfolio as a whole, to decide where it is most important to invest.
In a recent article by McKinsey, they eloquently argued the importance of enterprise architecture for digital transformations. But they also provide some important criticism of the state of practice. To be really effective at supporting digital transformations, many enterprise architecture practices need to change their behavior.
In our previous blog, we briefly outlined the two strategic options that our example insurance company ArchiSurance is exploring. By analyzing the operational excellence strategy, they have benchmarked their efficiency against the industry average: average capabilities are shown in blue, above-average capabilities in green and below-average capabilities in red (Figure 1). Read more
In our previous blog, we outlined the relationship between business strategy and capabilities at a high level. But we have not given you any guidance yet as to how to create a good overview of your capabilities. In this blog we look at why identifying capabilities is important for organizations, how they can be defined, how to classify them, and how to include them in a capability map.
In many organizations a mythical creature lays deep down in the catacombs, otherwise known as the server rooms. This dark monster has an obsessive-compulsive disorder. Normally these creatures are in search of gold. However, this kind doesn’t fancy gold, this one hoards applications!
Although Application Portfolio Management (APM) isn’t the newest kid on the block, it has had a tremendous growth in popularity lately. Due to the economic crisis and market pressures in general, IT managers and architects are constantly pushed by their CxO’s to reduce inefficiencies, improve agility of the enterprise and cut costs. The complexity of these tasks leads to an increasing need for tools and structures to help them handle their application landscape. Read more