Free Essay

Togaf Analysis

In: Computers and Technology

Submitted By termpapera123456
Words 5320
Pages 22
21 principles of enterprise architecture for the financial sector Thiago Souza Mendes Guimarães (tmendesg@br.ibm.com
)
IT Architect
IBM China

20 November 2012

The article lists the most relevant architectural principles for an IT department to follow in the financial market, with details about each principle. These principles are essential for an IT department to take on a strategic role in the company and to indicate actual value generation in
IT decisions within an environment where pressure and business decisions are critical.

Structure of these principles
This article was developed with the purpose of proposing certain principles that must drive an enterprise architecture initiative. The main motivation that led to the development of this list is the difficulty of implementing enterprise architecture in an environment as hostile as the financial market. There is great pressure on the technology segment, which is usually not perceived as strategic. An even greater challenge is showing that IT decisions can add value and differentials to businesses. This list was organized and developed based on the selection and adjustment of the most relevant principles established throughout my experience in the financial market. Despite being selected within the financial segment context, most of these principles apply to any type of industry after only a few minor adjustments.

Definitions
Principles are high-level definitions of fundamental values that guide the IT decision-making process, serving as a base for the IT architecture, development policies, and standards.
The principles of architecture define general rules and guidelines to use and implement all information technology (IT) resources and assets throughout a company. They must reflect a level of consensus between several corporate components and areas, constituting the basis for future
IT decisions.
Each architecture principle must focus mainly on business goals and key architecture applications.
© Copyright IBM Corporation 2012
21 principles of enterprise architecture for the financial sector

Trademarks
Page 1 of 19

developerWorks®

ibm.com/developerWorks/

Format of each principle
Each principle must be formally stated. Some suggestions regarding the format in which principles must be stated are available in related literature. This article follows the format suggested by The
Open Group Architecture Framework (TOGAF), in which each principle is presented according to the following format:
Name
The name must represent the essence of the rule and be easy to remember. Specific technology platforms must not be mentioned in a principle's name or description.
Description
The description must succinctly and directly convey the fundamental rule. Most information management principle descriptions are similar among different companies.
Rationale
This must highlight business benefits generated by adhering to the principle, using business terminology. It must emphasize the similarity between information and technology principles and those that regulate business operations. The rationale must also describe its relationship to other principles and intentions compared to a balanced interpretation. It should describe situations in which a certain principle would outweigh another in the decision-making process.
Implications
This item must highlight requirements, both for businesses and IT, to comply with the principle regarding resources, costs, and activities or tasks. The impacts in businesses and consequences of adopting a principle must be detailed. Readers must be able to easily answer the following question: "How does this affect me?" It is important not to simplify, trivialize, or question the merit of such impacts. Some implications are exclusively identified as potential impacts, with a speculative characteristic as opposed to being fully analyzed.

Four categories of principles
Deploy with confidence
Consistently deliver high-quality software faster using DevOps services on IBM Bluemix.
Sign up for a free Bluemix cloud trial, and get started.

Usually, there are around 20 enterprise architecture principles that must be followed. A very short list contains more generic and ethereal principles, hindering practical applications. On the other hand, an excessively extensive list is too specific and generates inconsistencies and conflicts between principles and changes resulting from technological, environmental, and contextual evolution. The following list has 21 principles, organized in four categories.





General principles
Information principles
Application principles
Technology principles

21 principles of enterprise architecture for the financial sector

Page 2 of 19

ibm.com/developerWorks/

developerWorks®

General principles
Principle 1. IT and business alignment
Description
Information management decisions are always made under the business alignment perspective in order to generate maximum benefits for the company as a whole.
Rationale
This principle means "service above all." A better alignment between IT and the business must generate a competitive edge for the financial institution.
Decisions based on the corporate perspective have greater long-term value than decisions based on a certain perspective of a group with a specific interest. An optimal ROI requires information management decisions to be aligned with the company's priorities and positioning. No single area must affect the benefit of the company. This principle, however, must not prevent anyone from performing tasks and activities.
Implications
Aligning IT with the business and promoting optimal corporate benefits requires changes in how information is planned and managed. Technology alone is not enough to promote such changes.
IT must direct its processes towards the front office.
IT cost management must focus on IT services directed toward establishing a competitive edge.
IT management must add responsiveness and availability indicators.
IT architecture must implement a complete IT vision that is focused on business.
Some areas might need to waive their specific preferences to benefit the company as a whole.
Application development priorities must be established by and for the entire company.
Application components must be shared among all areas of the financial institution.
Information management initiatives must be conducted based on a corporate plan. Individual areas must follow information management initiatives in accordance with corporate plans and priorities.
Planning is modified whenever necessary.
As new needs arise, priorities must be adjusted proportionally. A corporate representation committee must make such decisions.

Principle 2. Maximum benefits at the lowest costs and risks
Description
21 principles of enterprise architecture for the financial sector

Page 3 of 19

developerWorks®

ibm.com/developerWorks/

Strategic decisions for solutions must always strive to maximize benefits generated for the business at the lowest long-term risks and costs.
Rationale
Decisions must not be made based solely on reaching lower solution costs. Every strategic decision must be assessed based on cost, risk, and benefit perspectives. Lower costs often represent greater risks and, perhaps, fewer benefits.
Implications
A solution must be selected based on a qualitative or quantitative cost, risk, and benefit assessment Most times, quantitative assessments are simpler based on cost perspective but more complex for risks and even more intricate for benefits. The quantitative assessment must always be conducted whenever possible and sufficient.
A qualitative assessment of one or two perspectives is sufficient when a quantitative assessment of other perspectives (for example, cost) is properly conducted and already leads to a decision.
Operating risks must be quantified whenever possible.
IT infrastructure must also be optimized based on business requirements and technological capacity to generate lower costs and risks, thus benefiting the focus of the company.

Principle 3. Business continuity
Description
Corporate activities must be maintained, despite system interruptions.
Rationale
As system operations become more inherent, we become more dependent of them. Therefore, we must consider the reliability of such systems throughout their entire conception and application.
Business areas throughout the entire company must be able to continue conducting their normal activities, regardless of external events. Hardware failures, natural disasters, and lack of data integrity must not interrupt business activities. Business activities must be able to employ alternative mechanisms to convey information.
Implications
Dependence on shared applications implies that business interruption risks must be expected and managed in advance. Management includes, but is not limited to, periodic revisions, vulnerability and exposure tests, or designing mission-critical services to ensure continuity through redundancies or alternative resources.
21 principles of enterprise architecture for the financial sector

Page 4 of 19

ibm.com/developerWorks/

developerWorks®

Recoverability, redundancy, and maintenance must be approached at inception.
Applications must be assessed regarding criticality and impact on the company's mission to determine which continuity level is required and which corresponding recovery plan must be implemented. Principle 4. Compliance with standards and policies
Description
Corporate information management processes must comply with all applicable internal policies and regulations.
Rationale
The information management corporate policy must comply with internal policies and regulations.
This does not prevent improving corporate processes that conduct policy and regulation changes.
Implications
The company must ensure compliance with all internal policies and regulations regarding data conveyance, retention, and management.
It must inform and provide access to all applicable rules. Efficiency, need, and common sense are not the only incentives. Changes in standards and regulations might lead to changes in processes or application.

Principle 5. Adoption of the best practices for the market
Description
IT activities must always be aligned with the best practices for the market regarding IT governance, processing, and management.
Rationale
A company always strives to adopt the best practices from its industry in its business activities. A company's IT area must follow the same strategy to enhance business activities. The IT area must deliver projects and service-level agreements (SLAs) on progressively shorter deadlines and with increasingly higher quality within an effective cost-control process.
Implications
Best practices for IT disciplines must be identified and studied to implement them properly. These areas, among others, must follow best practices:
• IT processes must be certifiable and use established metrics.
• There must be a global risk perspective, focused on failure 0, and records of incidents and events. 21 principles of enterprise architecture for the financial sector

Page 5 of 19

developerWorks®

ibm.com/developerWorks/

• The management of IT costs per service (revenues and expenses), must be financially comparable to those of the market.
• IT management must be focused on indicators and a program perspective.
• Personnel must be increasingly qualified and motivated.
• The established IT architecture must be effectively applied in projects.

Information principles

Principle 6. Information treated as an asset
Description
Information is a valuable asset to the company and is managed based on this concept.
Rationale
Information represents a valuable corporate resource, with actual and measurable value.
Information is the basis of the decision-making process. Therefore, it must be carefully managed to ensure constant awareness of its location, reliability of its contents, and access whenever and wherever necessary.
Implications
This is one of three closely related principles regarding information:
• Information is an asset
• Information is shared
• Information is easily accessible
The implication alludes to an awareness task implemented to ensure that all areas within the company understand the relationship between the value of information, sharing, and accessibility.

Principle 7. Shared information
Description
Users have access to information that is necessary for performance of their respective tasks.
Therefore, information is shared between different corporate areas and positions, depending on the security levels established for that particular set of information.
Rationale
Necessary access to accurate information is essential to improve the quality and efficiency of the decision-making process of the financial institution. It is less expensive to maintain integral information in a single application and share that than to maintain duplicate information in multiple applications. The company has plenty of information, but it is stored in hundreds of incompatible databases.
The speed in which information is obtained, created, transferred, and absorbed is driven by the organization's capacity to effectively share these information islands throughout the company.
21 principles of enterprise architecture for the financial sector

Page 6 of 19

ibm.com/developerWorks/

developerWorks®

Shared information promotes better decisions because they are less dependent of less-reliable sources and information managed in the decision-making process.
Implications
To enable information sharing, a common set of policies, procedures, and standards must be developed and followed to regulate information management and both short-term and long-term access. In the short term, to preserve a significant investment in existing systems, investments in software capable of migrating information from an existing system into a shared information environment are required.
Normalized data models and metadata that define such shared environments must be developed, in addition to a repository to store the metadata and make it accessible.
As existing systems are replaced, common information access and developer guidelines must be adopted and implemented to ensure that all information in new applications remains available in the shared environment.
In both short and long-term, common methods and tools to create, maintain, and access shared information must be adopted throughout the company.
Information sharing implies a significant cultural shift.
The information-sharing principle is constantly confronted with the information security principle. Information sharing must not compromise the confidentiality of information under any circumstance. Shared information must be used by all collaborators to perform their respective tasks. This ensures that only the most up-to-date and accurate information is used in the decision-making process. Shared information shall become the only virtual source of corporate information.

Principle 8. Accessible information
Description
Information is accessible for users to perform their respective duties.
Rationale
Unrestricted access to information increases the efficiency and efficacy of the decision-making process, low response turnaround time for information requests and service deliveries. Employee time is saved and the consistency of information is enhanced.
Implications
Accessibility involves the facility with which users obtain information.
21 principles of enterprise architecture for the financial sector

Page 7 of 19

developerWorks®

ibm.com/developerWorks/

The manner in which information is accessed and made available must be sufficiently flexible to satisfy a wide array of corporate users and their respective access methods.
Access to information does not necessarily mean granting access privileges to users to modify or disclose it. This requires an educational process and changing the company's culture.

Principle 9. Common terminology and data definitions
Description
Data is defined coherently throughout the company, and definitions are comprehensible and accessible by all users.
Rationale
The data employed in the development of applications must have a common definition so that the data can be shared. A common terminology facilitates communication and promotes efficient dialogs. Additionally, data and interfaces must be shared among different systems.
Implications
We are inclined to believe that this issue is handled appropriately, since there are individuals with "data administration" functions and stated responsibilities. However, an additional significant energy is required, in addition to resources applied in this task. This is essential to develop the information environment.
The company must first establish a common terminology for business activities. Such definitions must be uniformly used throughout the company.
Whenever a new data definition is required, efforts regarding such definition must be coordinated and reconciled with the corporate data description "glossary." The company's data administrator needs to be responsible for such coordination.
Ambiguities arising from multiple data definitions must be replaced by a definition that is accepted and understood by the entire company.
Several data normalization initiatives must be coordinated.
Functional data administration responsibilities must be assigned.

Principle 10. Information security
Description
Information is protected based on integrity, availability, confidentiality, incontestability, and authenticity. Every piece of information is submitted to a security assessment based on those five factors. 21 principles of enterprise architecture for the financial sector

Page 8 of 19

ibm.com/developerWorks/

developerWorks®

Security traceability includes proper inception and application of the auditing system and monitoring tools.
Rationale
Open information sharing and disclosure must be balanced with the need to restrict the availability of confidential, proprietary, and sensitive information.
Current laws and regulations require data privacy and, simultaneously, allow free and unrestricted access. Temporary information (ongoing projects for which disclosure is still not authorized) must be protected to prevent unjustified speculation, misinterpretations, and improper use.
Implications
The addition of confidential and non-confidential data requires "de-confidentiality" analyses and procedures to maintain proper control. Data proprietors and functional users must determine whether the addition increases the level of confidentiality. Adequate policies and procedures to handle such revision must be implemented, including for the "de-confidentiality" process.
Current practices that involve the use of separate systems for different confidentiality levels must be reconsidered. Is there a software solution to separate confidential and non-confidential data?
It is more expensive to manage non-confidential data in a confidential system. Currently, the only way to combine both is to place non-confidential data in the confidential system, where it remains.
To provide appropriate access to open information yet maintain security, the security restrictions must be identified and implemented at the data level, not at the application level.
Data security can be applied to restrict access to read-only or no-reading statuses. Sensitivity labels must be established for access to temporary, decisive, confidential, sensitive, or proprietary information. Security must be planned in data elements from the beginning, rather than added later. Systems, data, and technologies must be protected against unauthorized access and handling. The source of information must be protected against unauthorized or accidental modifications, fraud, catastrophes, or disclosure.
Information must be rated regarding the five factors established in this principle. It is essential to quantify the financial impact of violating each one for more critical information.

Application principles
Principle 11. Technological independence
Description
Applications do not depend on specific technological options and, therefore, can function on different technology platforms. The IT architecture must be planned to reduce the impact of technological changes in the business.
21 principles of enterprise architecture for the financial sector

Page 9 of 19

developerWorks®

ibm.com/developerWorks/

Rationale
The independence of technological applications allows them to be developed, adapted, and operated under the best cost-to-benefit ratio. Alternatively, technology (which is subject to supplier dependence and obsolescence) becomes the users' motivation, rather than their requirements.
This principle is based on the concept that each IT decision renders us dependent of such technology. The purpose of this principle is to ensure that the software is not dependent on specific operating system software or particular hardware.
Implications
This principle requires standards that support portability, which are often called open standards.
Application program interfaces (APIs) must be developed to integrate existing applications with operating environments and applications developed based on the enterprise architecture.
Middleware must be employed to disassociate applications from specific software solutions.

Principle 12. Easy-to-use applications
Description
Applications are easy to use. The technology is transparent to users, so it enables them to concentrate on their tasks, rather than on system operation issues.
Rationale
The more that users need to understand the technology employed, the less productive they will be. The easy-to-use concept is a positive reinforcement for using applications. It encourages users to work within the integrated information environment rather than developing isolated systems to perform tasks outside of the integrated corporate environment. Most of the knowledge required to operate systems is very similar. Formatting is limited to a minimum, and system misuse risks are low. Using an application must be as intuitive as driving a car from another brand.
Implications
All applications must have the same appearance and layout. Thus, a standard layout must be developed and usability testing criteria must be implemented.

Principle 13. Component reusability and simplicity
Description
The enterprise architecture is built over low-coupling, reusable, modular components that implement services.
21 principles of enterprise architecture for the financial sector

Page 10 of 19

ibm.com/developerWorks/

developerWorks®

Systems architecture must be as simple as possible to maintain yet meet all business and corporate requirements. Whenever complexity is required, it must be encapsulated to promote simplicity of solutions built on the architecture.
Rationale
Reusable components represent opportunities to reduce IT development times and costs.
Reusable components leverage investments in current systems. Modular components increase the systems' capacities to adapt to different evolution needs, because the change is isolated from affected modules.
Implications
The architecture establishes standards and guidelines to develop system components.

Principle 14. Adaptability and flexibility
Description

IT systems are conceived to generate change, and they reflect alterations in laws, social needs, or other types of changes.
Adaptability and flexibility reduce the complexity and promote integration, which improves the company's business activities.
Excessive customization increases costs and reduces the ability to adapt.
Rationale
Adhering to this principle has several benefits:
• Allows the infrastructure to support changes that frequently occur in business processes within the company.
• Renders the infrastructure more adaptable to IT changes and IT market strengths.
• Allows the improvement of business processes.
• Promotes a simpler and faster system integration process, with less revision processes
• Allows systems to evolve to meet business needs and changes
Complex systems with several data and transactional functions are difficult to manage and make changes extremely risky.
The goal is to avoid dependency failures that can result from highly coupled applications.
Implications
Initially, the systems might require more time to conceive and greater systemic consideration as operations go beyond the systems' traditional boundaries.
Initial costs might be higher, but the integration process will be less expensive.
21 principles of enterprise architecture for the financial sector

Page 11 of 19

developerWorks®

ibm.com/developerWorks/

Systems will last longer; therefore, the return will be greater.
A system can be suboptimal in the short-term but present optimization gains in the long term.
Adaptability and flexibility performance metrics must be established.
The development of applications based on components must be promoted and facilitated.
A minimum number of suppliers, products, and configurations must be maintained to allow maximum flexibility when implementing changes.
Excessively complex configurations of components, undue customized tuning, and hardware and software customization based on transient, local, or other conditions must all be avoided.
The discipline of configuration must be maintained, sacrificing performance and functionality in some cases.
Resource restrictions must be considered.

Principle 15. Convergence with the enterprise architecture
Description
The convergence with the enterprise architecture is promoted in the right time, and in line with the company's investment strategy.
The convergence with the enterprise architecture takes place as new applications are built, new technologies are implemented, and older systems are updated or decommissioned. Exceptions to the enterprise architecture might be supported for specific cases if there is a consensus that the benefits of using a solution from a specific technology exceed those arising from the adoption of the enterprise architecture.
Rationale
Convergence offers several advantages:
• It allows the enterprise architecture to evolve and accommodate changes in business and technologies. • It avoids conversions of obsolete systems, which are extremely expensive.
• Over time, it preserves the investment while promoting the benefits of the enterprise architecture. Implications
Delayed convergence could reduce the benefits of the enterprise architecture.
Convergence requires a realistic and tangible approach to migration to the enterprise architecture.
It requires an explicit transition strategy for current systems after the target technology is identified.
21 principles of enterprise architecture for the financial sector

Page 12 of 19

ibm.com/developerWorks/

developerWorks®

Allows decommissioning a system sooner when that is appropriate.
Convergence does not allow waiting indefinitely. It requires a business case for exceptions, an exception process, and an exit strategy. It must establish temporary or permanent exceptions, as well as exit strategies for temporary exceptions.
Convergence requires sponsorship to replace obsolete technologies.

Principle 16. Enterprise architecture also applies to external applications
Description
As new outsourcing contracts and agreements are entered into, they must reflect and incorporate the enterprise architecture principles.
This is one of the ways to keep enterprise architecture in line with the business. Outsourced activities must not be exceptions to the enterprise architecture simply because they are outsourced. Rationale
To be successful, enterprise architecture must be integrated with all stages of IT projects: inception, planning, and acquisition.
Implications
Procurement areas must receive enterprise architecture training
This requires partnerships and efficient communication between business, acquisitions, contract management, and IT areas to get the benefits offered by the enterprise architecture.
IT acquisitions must include requirements based on the enterprise architecture.
The investment vision for the business must include IT requirements.

Principle 17. Low-coupling interfaces
Description
Interfaces have low coupling, are self--described, and offer low impact on the financial institution in case of changes.
Rationale
Low-coupling interfaces are preferable, because when interfaces between independent applications are highly coupled, they are less generic and more susceptible to causing unwanted, secondary effects when they are changed.
Implications
21 principles of enterprise architecture for the financial sector

Page 13 of 19

developerWorks®

ibm.com/developerWorks/

Low coupling means that the services (corporate APIs, for example) are conceived with no affinity to a certain service consumer.
Therefore, the service is completely uncoupled to a service consumer. However, the service consumer is dependent of the service (that is, contains references for service interfaces).
The service is also responsible for exception treatment. The result is a low-coupling architecture.

Principle 18. Adherence to functional domains
Description
The business rules and functionality of a system are consistent with the mission of that system.
There is complete adherence to the functional domain in which the system is located.
Rationale
The purpose of this principle is to avoid functional redundancy between systems.
Functional redundancy can cause loss of data integrity and increase maintenance costs related to the redundant business rule.
Implications
Systems must be located in proper functional domains, with explicit definition of the manager in charge of the functional domain.
Each new functionality request must be submitted to the respective manager.
Applications that are already in production with functional redundancy should be replaced entirely or partially in a timely manner. The functional redundancy of such applications must not be promoted. Technology principles
Principle 19. Changes based on requirements
Description
Changes in applications and technologies are implemented only to meet business needs.
Rationale
This principle promotes an atmosphere where the information environment changes to reflect business needs, rather than changing the business to reflect IT changes. This ensures that the business operation is the basis for any change proposal.
Involuntary effects on businesses resulting from IT changes are mitigated.
21 principles of enterprise architecture for the financial sector

Page 14 of 19

ibm.com/developerWorks/

developerWorks®

Technology changes can generate opportunities to improve the business process and, subsequently, alter business needs.
Implications
Changes in implementation follow a complete assessment of proposed changes, based on the enterprise architecture.
A system development or technical improvement is not implemented unless there is a documented business need.
A business need must be considered, but it must also be aligned with other enterprise architecture principles. There must be a balance between business needs and IT operations.

Principle 20. Control of technical diversity and suppliers
Description
Technological diversity is controlled to minimize significant costs related to the maintenance of expertise and connectivity between several different processing environments.
Supplier management must focus on the lowest number of suppliers possible to meet business needs and reduce risks.
Rationale
There is a real and significant cost related to the infrastructure required to support alternative technologies for processing environments. There are other infrastructure costs to maintain the architecture of multiple interconnected processors.
Limiting the number of supported components and suppliers simplifies and reduces maintenance and management costs.
A smaller number of suppliers and software packages represent a greater ease and lower integration costs.
Business advantages of minimum technical diversity include:






Standard component packaging
Predictable implementation impact
Predictable returns and validations
Defined tests
Greater flexibility to accommodate technological advances

A common technology throughout the entire company generates scalable economic savings for the company. Technical management and support costs are better controlled when limited resources focus exclusively on this shared technology set.
21 principles of enterprise architecture for the financial sector

Page 15 of 19

developerWorks®

ibm.com/developerWorks/

Implications
Policies, standards, and procedures that regulate the acquisition of technology or contracting with new suppliers must be directly bound to this principle.
Technology decisions are guided by the technological blueprint.
Procedures to increase the set of acceptable technologies to meet evolved requirements must be developed and implemented.
This principle does not require freezing the technological baseline. Technological advances are welcome and incorporated into the technological blueprint when they are compatible with current infrastructures, are likely to improve operating efficiency, or there is a need to increase capacity.
The selection of contracted suppliers must be a strategic decision, always considering other types of services that could be provided by the same supplier.

Principle 21. Interoperability
Description
Software and hardware must follow established standards that promote data, application, and technology interoperability.
Rationale
Standards help ensure coherence, thus improving the ability to manage systems, raise user satisfaction, and protect current IT investments, thus maximizing return on investment and reducing costs.
Interoperability standards also help ensure support from several suppliers to their respective products, thus facilitating integration.
Implications
Interoperability and industry standards must be followed unless there is a mandatory business reason to implement a non-standard solution.
A process to establish standards, periodic revision, and exceptions must be established.
Current IT platforms must be identified and documented.

Summary of the principles
General principles
1. IT and business alignment
2. Maximum benefits at the lowest cost and risk
21 principles of enterprise architecture for the financial sector

Page 16 of 19

ibm.com/developerWorks/

developerWorks®

3. Business continuity
4. Compliance with standards and policies
5. Adoption of the best practices for the market

Information principles
6. Information treated as an asset
7. Shared information
8. Accessible information
9. Common terminology and data definitions
10. Information security

Application principles
11. Technological independence
12. Easy-to-use applications
13. Component reusability and simplicity
14. Adaptability and flexibility
15. Convergence with the enterprise architecture
16. Enterprise architecture also applies to external applications
17. Low-coupling interfaces
18. Adherence to functional domains

Technology principles
19. Changes based on requirements
20. Control of technical diversity and suppliers
21. Interoperability

21 principles of enterprise architecture for the financial sector

Page 17 of 19

developerWorks®

ibm.com/developerWorks/

Resources
Learn
• For more information related to this article, check these resources:
• Architecture principles: Creating the foundation for robust architecture by March Schultz
(IBM developerWorks, March 2007)
• The Open Group Architecture Framework (TOGAF).
• Improve quality and increase your business agility with automated testing: Test automation solutions for financial services organizations, an IBM Solution Brief (PDF format). • Service virtualization - Financial services, IBM video on YouTube (1:15)
• Explore the Rational software area on developerWorks for technical resources, best practices, and information about Rational collaborative and integrated solutions for software and systems delivery.
• Stay current with developerWorks technical events and webcasts focused on a variety of IBM products and IT industry topics.
• Attend a free developerWorks Live! briefing to get up-to-speed quickly on IBM products and tools, as well as IT industry trends.
• Watch developerWorks on-demand demos, ranging from product installation and setup demos for beginners to advanced functionality for experienced developers.
Get products and technologies
• Download a free trial version of Rational software.
• Evaluate other IBM software in the way that suits you best: Download it for a trial, try it online, use it in a cloud environment, or spend a few hours in the SOA Sandbox learning how to implement service-oriented architecture efficiently.
• Try building and deploying your next project on the IBM Bluemix cloud platform, where you can take advantage of pre-built services, runtimes, frameworks, application lifecycle management, and continuous integration.
Discuss
• Join the Rational software forums to ask questions and participate in discussions.
• Ask and answer questions and increase your expertise when you get involved in the Rational forums, cafés, and wikis.
• Join the Rational community to share your Rational software expertise and get connected with your peers.
• Rate or review Rational software. It's quick and easy.

21 principles of enterprise architecture for the financial sector

Page 18 of 19

ibm.com/developerWorks/

developerWorks®

About the author
Thiago Souza Mendes Guimarães
Thiago Guimarães worked for six years in the IT department of an investment bank.
During half of that time, he was an enterprise architect. He is now an IT architect in the ISV and Developer Relations area of IBM, in Brazil, with emphasis on the financial sector. © Copyright IBM Corporation 2012
(www.ibm.com/legal/copytrade.shtml)
Trademarks
(www.ibm.com/developerworks/ibm/trademarks/)

21 principles of enterprise architecture for the financial sector

Page 19 of 19

Similar Documents

Premium Essay

Marketing

...QA Concept Introducing LoadRunner  • Why should you automate performance testing?  • What are the LoadRunner components?  • Understanding LoadRunner Terminology  • What is the load testing process?  • Getting Familiar with HP Web Tours  • Application Requirements  The Power of LoadRunner  • Creating the Load Test  • Running the Load Test  • Monitoring the Load Test  • Analyzing Results  Building Scripts  • Introducing the Virtual User Generator (VuGen)  • How do I start recording user activities?  • Using VuGen’s Wizard mode  • How do I record a business process to create a script?  • How do I view the script?  Playing Back Your Script  • How do I set the run-time behavior?  • How do I watch my script running in real time?  • Where can I view information about the replay?  • How do I know if my test passed?  • How do I search or filter the results?  Solving Common Playback Problems  • Preparing HP Web tours for playback errors  • How do I work with unique server values?  Preparing a Script for Load Testing  • How do I measure business processes?  • How do I emulate multiple users?  • How do I verify Web page content?  • How can I produce debugging information?  • Did my test succeed?  Creating a Load Testing Scenario  • Introducing the LoadRunner Controller  • How do I start the Controller?  • The Controller window at a glance  • How do I modify the script details?  • How do I generate a heavy load?  • How do I emulate real load...

Words: 468 - Pages: 2

Free Essay

Preparing Business Scenario Analyses

...Preparing Business Scenario Analyses The following general guidelines may be used in preparing for an oral or written business scenario analysis and presentation. There may be several feasible courses of action regarding the solution to any case. It is more important to concern yourself with the process of problem definition and isolation, analysis, and evaluation of alternatives, and the choice of one or more recommendations, rather than trying to find a single answer. Very often, the right answer is the one that you can propose, explain, defend, and make work. • The Process of Analyzing a Case 1. Read and study the scenario thoroughly and efficiently. Read the scenario once for familiarity, noting issues that come to the forefront. Read the scenario again. Determine all the facts, making notes about symptoms of problems, root problems, unresolved issues, and roles of key players. Watch for issues beneath the surface. 2. Isolate the problem(s). Get a feel for the overall environment by putting yourself in the position of one of the key players. Seek out the pertinent issues and problems. 3. Analyze and evaluate alternatives. a. Once the problems and issues are isolated, work at gaining a better understanding of causes. In what area of the unit do the problems exist? Why? What caused them? Examine and evaluate the strengths and weaknesses of the unit’s processes (e.g., planning, communication), human behaviors, and/or exhibits (e.g., financial statements,...

Words: 505 - Pages: 3

Free Essay

Pest Analysis

...PEST Analysis One way of planning your business is to undertake a PEST analysis.1 PEST analysis involves looking at the Political, Economic, Socio-cultural and Technological factors that could affect your business. Every business needs to consider a range of external forces in order to take decisions. For many people imagination is very limited and is coloured solely by their own experience and personal beliefs. This can lead to wish fulfilment or a refusal to see reality or recognise the critical changes that are happening in the world around them. It can also lead to grabbing short-term solutions that, if they do not exacerbate problems, certainly ignore the longer term. In the business world pressure is often applied to take decisions quickly, acting on judgement and instinct rather than careful analysis. There are many driving forces in the external environment that might impact on your business. These can be categorised as: • Social; • Technological; • Economic; • Environmental; and • Political. Social forces Social forces include, for example, changing demography and education, etc. The population in Western Europe is relatively static, but the age bands are changing. The number of older people, for example, is growing rapidly. Technological forces Technological forces are changing dramatically quickly. What effects will this have on your production, marketing and distribution plans? Depending on your market, technology might either raise or lower entry barriers...

Words: 371 - Pages: 2

Free Essay

Anaylsis for Emc

...Fall 2015: Industry Analysis in Emerging Markets Your role in this analysis is to work with your team and to look at emerging technologies. From autonomous drones to emergent AI to 3D printers, you are going to research and get a better understanding of our fast-approaching technological future. Scientific American compiled the Top 10 List of Emerging Technologies for 2015. You can start here, but you are not limited to these technologies. You must choose an emerging industry, and will analyze the history of this technology and its industry, the trajectories of the technology, the key competitors, and the trends in the market. The end goal is to develop a comprehensive understanding of the industry, the competitive landscape, emerging trends to watch in the future, and an overall assessment as to the attractiveness of this industry. Your final deliverable for this project will be an in-class presentation, due April 26th. 1) What SIC/NAICS code does your industry fall under? 2) Describe your industry- a. Provide a brief history of your industry. (You may use a timeline in a separate appendix) b.  List and describe the characteristics of the products your industry offers in the marketplace. c. Who are the key competitors in the industry? d. What are the main differences between the products offered by key competitors? e. What strengths & weaknesses (capabilities, complementary resources, related intellectual property, etc.)...

Words: 430 - Pages: 2

Premium Essay

Service Marketing

...http://www.mysensex.comPESTLE « Pestle Summary: India | Main | Pestle summary: USA » 03/28/2009 Pestle Summary China Well, I guess this is where I get controversial, at least a bit. There are others who have predicted that China was in for a tough ride over the past few years, but they mostly got ignored, or were proven wrong by events. And, to a certain extent, if you cry doom long enough you'll always get proved right, given the laws of entropy. So this is a bit 'faux' controversy... This is the introductory note taking exercise for a Pestle analysis of China, drawn on conventional internet sources such as Wikipedia, the CIA World Factbook and Nationmaster. China is the most populous country in the world, with 1.34 billion people. It has the third largest GDP, with $4.84 trillion, behind Japan and the U.S. Like India, the currency and conditions make it useful to look at some statistics using Purchasing Power Parity, which bumps up China's GDP to $7.8 trillion, which would move it ahead of Japan. It also is the second in the world in annual military spending, although that needs a bit of context, as the world's number two spends about 15% of what the world number one (USA) spends. But with PPP, that looks like more money, and insofar as it is used to pay salaries, rather than buy Israeli rocket parts, PPP is valid in this context too. China is badly governed by the Communist Party, and in my five-year Pestle forecast I will be making the case that misgovernance will...

Words: 1059 - Pages: 5

Free Essay

Bsa/375

...McCauley, COO * Hugh McCauley, COO of Riordan has sent a service request to us. The service request SR-rm-022 stats that Riordan wants to make improvement on their current HR tools. They are currently using a variety of HR tools and would want’s us create one integrated application. To do this we will have to do a system analysis of their current system. An analysis will be made with recommendations to upgrade and consolidate their system. * The service request is basically a project statement. This is a document from the customer who clearly states what the project should deliver and outline the high-level work required for completing this project * (SR-rm-022). Riordan Manufacturing has 550 employees worldwide and has projected earnings of $46 million. It is a fortune 1000 enterprise with $1 billion in excess revenues. It is wholly owned by Riordon Industries and based in San Jose , California. * . We will use the joint application design (JAD) for our system analysis, this should help keep the analysis efforts to a minimum. Fact finding is at the core of system analysis. Interviewing of individuals who understand the current system and any known issues, including future activities needed. To do this observation of how data is handled and how this is used for their jobs. Through study of the documents, policies, and procedures in reference to the system. * Interviewing and gathering...

Words: 397 - Pages: 2

Free Essay

Hr Stratgey

...29th, 2013 Angela Lucente Planning For People Job analysis is an important process, any organization used to use it in order to collect information and data about required skills, level of education, work environment, responsibilities, and the duties to create a job description, recruiting plans, and performance development planning (Susan M. Heatfield, 2013). Once job analyses are updated as described, a summary of the results is normally prepared in writing in the form of a job description (Wayne F. Cascio, 2010). According to my reading chapter five about job analysis process. There are some topics I felt comfortable with, such as alternative perspectives on jobs. This topic add to my knowledge many information and explained how jobs are important to organizations, what is the highly unusual jobs that some organizations required it, and distinguish job analysis form job design (Wayne F. Cascio, 2010). On the other hand, I struggled with topic job requirements because there are many methods created in order to study job requirements and none of them alone is sufficient. Thus, it is essential to integrate this methods to obtain the results of the tasks and duties of a job (Wayne F. Cascio, 2010). It is not that easy to implement the methods of job analysis, such as job performance, observation, interview, critical incidents, and structured questionnaire, those are the most five common methods of job analysis and each one of those takes time and effort to achieve desirable...

Words: 321 - Pages: 2

Premium Essay

Job Analysis Examination

...------------------------------------------------- Running header: Job Analysis Methods ------------------------------------------------- Abstract Examination of different methods utilized to create a comprehensive job analysis, including advantages and disadvantages of all approaches. There are several methods that can be utilized to create a comprehensive job analysis. A job analysis provides a better understanding of the positions within an organization, which will allow the recruitment process to be more focused, consistent and thorough. The first method that can be employed to create an effective job analysis is the Critical Incidents Technique. This technique identifies circumstances that arise in a current position, what action was taken, and the consequences of the action, to identify the effective and ineffective behaviors in job performance. These critical situations are documented by interviewing former jobholders, supervisors, or by reviewing documents and logs from the job. Job duties are examined, and then critical incidents are identified to determine poor or good performance issues related to a specific job requirement. This technique is useful for covering job events that may not be covered in a general job description. Identifying atypical circumstances that may arise in a position can aid in finding a candidate that would be an ideal fit. Reviewing these critical incidents also enable the recruitment process to be shaped to include more pointed questions...

Words: 916 - Pages: 4

Premium Essay

Google Car

...to accomplish that soon, also technology is to expensive. Other companies building autonomous cars said that they are working on vehicles that will be able to safely make that switch. Volvo says that it expects to have its cars tested on city streets by 2020. The Google management team faced several questions. Should Google continue to invest in the technology behind self-driving cars? How could Google's core software-based and search business benefit from self-driving car technology? As large auto manufacturers began to invest in automotive technology themselves, could Google compete? Was this investment of time and resources worth it for Google? Environmental Scanning (external and internal analysis): PEST Analysis After reading the case study Google car I have used the PEST analysis model in which the following was concluded: 1. Political Factors: Government’s regulations on automobile transportation are one of the major aspects in Google's car that have legal barriers. Due to that most of the governments do not have specific laws for self-driving vehicle and there are no federal standards for autonomous cars special permission in all US states adjusted for road test. Laws need to be adapted to accidents liability for insurance purposes. 2. Economic Factors: Cost is a concern, due to the investment in technology required to be adapted to cars an estimated of $150,000 in equipment. The consumers are not willing to spend more than $3,000 for autonomous driving applications...

Words: 479 - Pages: 2

Free Essay

Vaan Lan

...implementation actions you recommend should be explicit and thoroughly explained. Occasionally, careful evaluation of implementation actions may show the strategy to be less favorable than you thought originally. A strategy is only as good as the firm's ability to implement it effectively. Therefore, effort to determine effective implementation is important. Process Issues You should ensure that your presentation (either oral or written) has logical consistency throughout. For example, if your presentation identifies one purpose, but your analysis focuses on issues that differ from the stated purpose, the logical inconsistency will be apparent. Likewise, your alternatives should flow from the configuration of strengths, weaknesses, opportunities, and threats you identified by the internal and external analyses. Thoroughness and clarity also are critical to an effective presentation. Thoroughness is represented by the comprehensiveness of the analysis and alternative generation. Furthermore, clarity in the results of the analyses, selection of the best alternative strategy, and design of implementation actions are important. For example, your statement of the strengths and weaknesses should flow clearly and logically from the internal analyses presented. Presentations (oral or...

Words: 305 - Pages: 2

Premium Essay

Pest Analysis Italy

...BLEND TWO COUNTRY ANALYSIS ITALY Task: You will carry out an analysis of Italy today in order to have a general idea of its current state of affairs. To do this you will visit several sites to gather the necessary information. This information should then be transferred in note-form onto the table below. You will then use these notes to give a short, informal presentation during the following class session. Procedure: You will use a well-known analytical tool: THE PEST ANALYSIS. Although this tool was originally created for the business environment, it is now used in many sectors to analyse organisations, projects and systems. STEP ONE: WHAT IS A PEST ANALYSIS 1. First you need to find out what a PEST analysis is: Go to http://www.rapidbi.com/created/the-PESTLE-analysis-tool.html#political Read quickly through the information and write short answers to the following questions: What sort of picture does a Pest analysis offer? Why is it important to take these factors into account? What are some common uses of the Pest? In what situation might you use a Pest in your own professional context? The Table below gives some of the indicators which may be relevant for each category. Can you think of any other factors to consider? Add them to the corresponding column. PEST ANALYSIS TEMPLATE Political / Legal Economic Social Technological - Government organisation / attitude - Economic growth (overall; by industry sector) - Income...

Words: 615 - Pages: 3

Premium Essay

Philosophy

...participated voluntarily in the study? * Was institutional review board approval obtained from the agency in which the study was conducted? Data Collection * Are the major variables (independent and dependent variables) identified and defined? What were these variables? * How were data collected in this study? * What rationale did the author provide for using this data collection method? * Identify the time period for data collection of the study. * Describe the sequence of data collection events for a participant. Data Management and Analysis * Describe the data management and analysis methods used in the study. * Did the author discuss how the rigor of the process was assured? For example, does the author describe maintaining a paper trail of critical decisions that were made during the analysis of the data? Was statistical software used to ensure accuracy of the analysis? * What measures were used to minimize the effects of researcher bias (their experiences and perspectives)? For example, did two researchers independently analyze the data and compare their analyses? Findings / Interpretation of Findings * What is the researcher’s interpretation of...

Words: 363 - Pages: 2

Free Essay

Ecn 400 Week 6 Macroeconomic Indices

...com/product/ecn-400-week-6-macroeconomic-indices/ Contact us at: SUPPORT@ACTIVITYMODE.COM ECN 400 WEEK 6 MACROECONOMIC INDICES ECN 400 Week 6 Critical Thinking: Macroeconomic Indices Critical Thinking: Macroeconomic Indices (70) Begin working on your Portfolio Project by researching and selecting an article for your analysis. Appropriate articles are those that: • Are no older than six months old • Contain at least three general economic principles • Contain at least three to five macroeconomic indices. • Submit an outline that provides information on your article and the three general economic principles and the three to five macroeconomic indices you will be discussing in your Project. ECN 400 WEEK 6 MACROECONOMIC INDICES To purchase this visit following link: http://www.activitymode.com/product/ecn-400-week-6-macroeconomic-indices/ Contact us at: SUPPORT@ACTIVITYMODE.COM ECN 400 WEEK 6 MACROECONOMIC INDICES ECN 400 Week 6 Critical Thinking: Macroeconomic Indices Critical Thinking: Macroeconomic Indices (70) Begin working on your Portfolio Project by researching and selecting an article for your analysis. Appropriate articles are those that: • Are no older than six months old • Contain at least three general economic principles • Contain at least three to five macroeconomic indices. • Submit an outline that provides information on your article and the three general economic principles and the three to five macroeconomic...

Words: 834 - Pages: 4

Premium Essay

Kenyan Problem

...[u06a1] Unit 6 Assignment 1 Systems Theory and Conflict Resolution Resources * Systems Theory and Conflict Resolution Scoring Guide. * APA (6th edition) Style and Formatting. * Webuwrite Academy Simulation. By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria: * Competency 5: Implement a strategy for reducing conflict. * Propose strategies for reducing conflict based on a systems analysis. * Competency 7: Communicate effectively in a variety of formats. * Communicate in a manner that respects the dignity, cultural and ethnic backgrounds, and individual uniqueness of others. For this assignment, you will analyze the conflicts at Webuwrite Academy using systems theory, as described by Wilmot and Hocker in Chapter 7. When people think of conflict, they often tend to think only about the actual conflict itself. They often fail tocontextualize that conflict within the norms and background of a larger organization or group. This type of contextualization is an important part of understanding a conflict more fully, and of better understanding how to resolve the conflict. Systems theory is a method of analyzing conflict that goes beyond looking at individual behavior and goals, and instead focuses on the patterns of interactions between individuals as a part of a whole organization. Systems theory also focuses on the roles that individuals play within organizations. For...

Words: 433 - Pages: 2

Premium Essay

P-Political Factors Affecting The Healthcare Environment

...PEST Analysis P- Political Factors affecting the healthcare environment Insurance mandates, such as the individual mandate, are an element in the political sphere that could have an impact on healthcare. The individual mandate requires that individuals or families have health insurance or pay a penalty. Although it has recently been repealed, it continues to affect the healthcare environment, as many will continue to be uninsured. E- Economic Factors affecting the healthcare environment Unemployment is an example of how economic factors affect the healthcare environment. If people are losing their jobs this means there will be a greater loss of health insurance coverage, which will affect the type of health services people receive. S- Sociocultural Factors Demographics, values, and beliefs of various consumer groups should be identified in a PEST analysis. Organizations should be knowledgeable about the community it serves to avoid violating community values. For example, the Hispanic population is a growing population and as of 2017, the percentage of Hispanics in the United States is 17.8 (census.gov). T- Technological Factors...

Words: 460 - Pages: 2