NATO Architecture Framework and ArchiMate: comparing Defence architecture drivers with Industry

-Kevin Wallis (MOD ISS) & Marc Lankhorst (BiZZdesign) 
In this blog series, we want to update you on the UK Ministry of Defence’s (MOD) use of the ArchiMate modelling language as described in the NATO Architecture Framework version 4, which was officially approved by the NATO Consultation, Command and Control Board (C3B) in January. The document states: “NAF v4 compliant architectures can be created using the following meta-models; The Open Group®’s ArchiMate® and the Object Management Group®’s Unified Architect Framework (UAF)® Domain Meta-Model (DMM)®.” In addition, the approved method for architecture is based on The Open Group’s TOGAF® framework.     Read more

Communicating Architecture with Stakeholders

Previously, I have blogged about stakeholder management and showed you some useful techniques to support this important part of enterprise architecture. In this blog post, I want to address different ways to share architecture information with different types of stakeholders involved in changing your enterprise. 

Read more

How is AI Impacting Your Business?

Artificial Intelligence (AI) seems to be a buzzword lately, promising techniques and tools that could influence our lives, our work and the way we do business. For many designers and enterprise architects, the question becomes: What would be the role of designers on all levels (strategic, EA, BPM, data, technical) in incorporating AI in a company? There are even ethical questions that may arise when instituting AI in a company, which you must take into account before making the change.

Read more

Behavioral Economics & Enterprise Architecture (1): The Case for Slower Decisions

Humans have evolved to make fast decisions. For example, when a stranger approaches you, you know almost instantaneously if they represent a threat, if they are angry, friendly or happy. The cognitive processing involved is mind-boggling if we actually stopped to think about it (which we don’t).

We subconsciously process a myriad of information, such as the person’s stance and their facial expression, and make a decision in a split second about whether this stranger represents a threat or opportunity. Or, in the language of evolution, we decide “Which one of us is lunch?” and “What am I going to do about it?”

Read more

A Pattern for Sizing ArchiMate Diagrams

In my recent blog series, I highlighted the importance of communication for strategic transformations. This affects several functions and various roles in your organization by asking different questions, such as:

Read more

Schaeffler AG and BiZZdesign BV Partner to Unleash the Power of Enterprise Architecture

“DUSSELDORF, Germanyand ENSCHEDE,The Netherlands,May 17, 2018/PRNewswire-PRWeb/ — Schaeffler AG and BiZZdesign BV today announced the execution of a 5-year joint development and innovation agreement between the two companies. The agreement sees the two companies collaborating to further develop BiZZdesign’s award-winning Enterprise Architecture (EA) software for use by Schaeffler in their strategic IT transformation initiatives.”

Read more

Three Key Techniques for Managing Your Stakeholders

Everyone remotely involved with enterprise architecture and similar disciplines knows the importance of knowing your stakeholders. Stakeholder management is a key technique in EA and many methods, including TOGAF, stress its importance. But there is more to management than keeping individual stakeholders happy. In this blog post, I want to introduce three techniques that not only help you ensure stakeholder satisfaction, but also make good use of stakeholders and their influence in achieving business goals. 

Read more

Supporting Large Architectures as a Team

The architectures of large organizations can become quite large and complicated, posing a challenge for the architects developing and maintaining them. In previous discussions, we have addressed a number of techniques for organizing and controlling such large models to keep things manageable. In this installment, we look at the processes and practices you can use to optimize the collaboration between the people working on these architectures. 

Read more

Combine ArchiMate & TOGAF Standards to Support Digital Change Published More ShareEdit

In the first blog of this series, I explained how important it is to raise your digital change capability to become an adaptive enterprise. I also highlighted the role of effective communication, as well as approaches to categorize and visualize enterprise architecture descriptions based on the TOGAF and ArchiMate standardsIn this series, also included guidance on which approach to select for modeling Architecture and Solution Building Blocks (both are types of logical or physical components)To round out this series, I will end by discussing the connection to Deployed Solutions. 

Read more

Protect Your Enterprise Analyze Your Security With Architecture Models

In a previous blog on cybersecurity, I wrote about the essential steps to keep your organization safe in an increasingly dangerous digital environment:

Read more

Cyber Security 5 Steps to Stay Safe in a Dangerous World

Cybersecurity threats are ever increasing. It is sometimes said there are two kinds of organizations: those who know they have been breached, and those who don’t know it yet. To mitigate the risk and damage associated with cybersecurity, it’s important to know how to assess these risks and improve your defenses via security-by-design. It’s also important to plan for what to do if (and when) things do go sideways. 

Read more

How organizations model their acquisition and divestiture – a real life example

In my previous blog I wrote about the importance of models to successfully complete a merger, acquisition or divestiture. Of course, one organization’s divestiture may be another one’s acquisition. In this blog post I’ll share one my personal experiences as a consultant, supporting two government agencies that were in the middle of this process.

Read more

Business Transformation Survey: The Results

Organizations have always had to adapt to change in order to stay relevant. But in today’s fast-paced market, change is more necessary than ever. In a recent survey we found that over 60% of C-level management thinks that changing the business model is the main driver for business transformations. Read more

ArchiMate® Modeling in Practice: Using a Model Repository

In theory, an ArchiMate® model can be created using just pen and pen, or a whiteboard and markers. There are also software platforms that provide an ArchiMate modeling environment, which come with many automated capabilities and analysis functions.

However in this post, we will focus on an important element in maturing into an advanced, mission critical modeling capability: the model repository.

 

Read more

Application Portfolio Management in Local Government

Although Application Portfolio Management (APM) isn’t the newest kid on the block, it has had a tremendous growth in popularity lately. Due to the economic crisis and market pressures in general, IT managers and architects are constantly pushed by their CxO’s to reduce inefficiencies, improve agility of the enterprise and cut costs. The complexity of these tasks leads to an increasing need for tools and structures to help them handle their application landscape. Read more

Information Security in the Boardroom

After a recent presentation on “Security is not an IT problem”, which investigated the lacking relations between policies and measures within many organizations, we decided to have a World Cafe to discuss surrounding topics further. We separated the discussion into four topics, and had a debate on each one. In my previous blog in this series, I wrote about the 7 worst practices in Information Security. In this blog, I will present the outcomes of the discussion on Information Security in the Boardroom. Feel free to share your thoughts with us in the comments section below.

Read more

Reference Architecture Models with ArchiMate

In a previous blog by Marc Lankhorst, the value of reference architectures was highlighted, including the why and how. In this blog, I want to dive a little deeper, focusing on the ‘product’ that we (or some of us) are familiar with – the reference model, using ArchiMate as the language.

Read more

Information Security: 7 Worst Practices

Sharing knowledge and good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round tables. After presentations on “Security is not an IT problem”, which discussed the lacking relations between security policies and measures in many organizations, we continued the debate in the form of a World Café. My last blog post was about building awareness around Information Security. In this blog post, I want to 7 seven worst practices we learned from the participants of our seminar. Please share your best and worst practices in the comments section below.

Read more

Information Security: What Really Works to Build Awareness

One of our core values at BiZZdesign is sharing knowledge and best practices. That’s why we regularly organize and contribute to online and offline seminars, conferences, and round tables. After a presentation entitled “Security is not an IT problem”, which illustrated the often lacking connection between policies and measures within organizations, we decided to have a World Cafe to discuss a number of topics surrounding this. The last blog post in the series tackled the question of how to communicate about information security. In this blog post, I will present the outcome of a debate on what really works to build information security awareness? Feel free to share your thoughts in the comment section below.

Read more

Information Security: 7 Communication Tips to Involve Your Business

Earlier this month, I wrote the first blog post in a series based on a World Cafe discussion we had around the lacking relations between policies and measures in many organizations. The discussion took place in the form of 4 debate rounds. In the previous blog post, I presented Information Security as a necessity of life. There is no doubt that Information Security is a very important topic for most organizations, but during the debate, many participants were uncertain as to whether, and how to communicate to the rest of the company about it. In this blog post, I will present the conclusions of this discussion.

Read more