ISD Summaryv2
ISD Summaryv2
TABLE OF CONTENTS
Lecture 1 : Architecture thinking in digital transformation. .................................... 5
What is an architecture ? ............................................................................................. 5
Stakeholder perspective ............................................................................................................... 5
Systems architecture vs enterprise architecture ............................................................................ 6
Exercices .......................................................................................................... 83
Open Questions ........................................................................................................ 83
Q1 ............................................................................................................................................. 83
Q2 ............................................................................................................................................. 83
Q3 ............................................................................................................................................. 84
Q4 ............................................................................................................................................. 85
Ressources ....................................................................................................... 86
Default capability map .............................................................................................. 86
LECTURE 1 : ARCHITECTURE THINKING IN DIGITAL TRANSFORMATION.
This is the beginning of the Part I of the course, named Motivation: Architecture Thinking in Digital
Transformation.
WHAT IS AN ARCHITECTURE ?
An architecture is the art and science of designing complex structures.
Architecture defines the rationale behind the components and the structure
• Hardest to change
STAKEHOLDER PERSPECTIVE
3. Specialized Roles (Mason, Carpenter, Electrician, Interior Designer, etc.): These roles are
represented by the descending arrow, indicating their execution of the architect's plans. Each
specialist contributes specific skills.
Models help people to communicate: A model is more precise than written language.
Models explain and make predictions: A model relates primitive system components to one another
and to complex components, providing explanation and predictions about the behavior of the system.
Models help mediate among multiple viewpoints : Two people frequently won’t agree with what
they want to know about a component; models represent their commonalities while allowing the
differences to be explored.
SYSTEMS ARCHITECTURE VS ENTERPRISE ARCHITECTURE
ENTERPRISE ARCHITECTURE
Video explanation
EA is used to guide the transition from the current state (as-is architecture) to the future state (to-be
architecture) of the organization, aiming to optimize often fragmented legacy processes into an
integrated environment that is responsive to change and supportive of the delivery of the business
strategy.
• The strategy (customers, markets, products and services, business goals, capabilities)
• The processes (activities, roles, ...) and organisation (organizational units and hierarchy,...) The
information systems:
Initial Transformation and Business Restructuring: In 2004, Jørgen Vig Knudstorp was appointed
CEO, marking the beginning of significant changes at LEGO. His strategy focused on addressing supply
chain inefficiencies and re-centering the business around the LEGO brick. This involved cutting down
the number of unique elements produced and reducing the supplier base, which streamlined
operations and reduced costs.
Building a Core Enterprise Platform: Around 2000, LEGO initiated "LEGO Light" to implement SAP
and standardize processes, which was pivotal in restoring financial health. By 2005, these measures
had turned the company's fortunes around, showing a profit.
Extending the Platform: Post-initial success, LEGO continued to enhance its enterprise platform by
integrating HR systems, developing a global manufacturing platform, and implementing a product
lifecycle management system. These efforts facilitated global expansion and faster product
development, contributing to robust growth during the global recession of 2008-2009.
Digital Strategy and Transformation: By 2015, LEGO no longer viewed digital as a separate strategy
but as an integral part of its business operations. This shift was embodied in the adoption of digital
tools and platforms across the company, enhancing decision-making and operational efficiency.
Digital Engagement and New Products: LEGO ventured into digital-enhanced products like the "Life
of George" and "LEGO Fusion," which combined physical bricks with digital play. They also launched
"LEGO Ideas," a platform allowing customers to propose new LEGO sets, accelerating product
innovation and involving consumers in product development.
Challenges and Future Directions: Despite these successes, LEGO continued to face challenges in
adapting to rapidly changing digital landscapes and consumer behaviors. The company recognized the
need for a digital workforce and more agile, innovative business processes that could leverage digital
technologies effectively.
Conclusion: As of early 2016, LEGO was well on its way to becoming a digital enterprise but
acknowledged that this transformation would be a continuous journey. The leadership was focused on
leveraging digital capabilities to maintain its competitive edge and relevance in the increasingly digital
world.
ZACHMAN FRAMEWORK
It is the first EA framework.
FRAMEWORK STRUCTURE
The Zachman Framework is structured as a matrix comprising six rows (perspectives) and six columns
(abstractions), where each cell represents a specific focus area. All cells need to be filled in order to
define a system architecture.
PERSPECTIVES : ROWS
They represent concern relevant to each stakeholder in the organization.
Each row addresses the architecture from a different perspective, aligning with various roles within the
organization:
ABSTRACTIONS : COLUMNS
Each column represents a different aspect of the enterprise, asking key questions:
IMPLEMENTATION
Each cell within the matrix is filled with specific artifacts related to both the row's perspective and the
column's abstraction. This comprehensive approach ensures that every aspect of the architecture is
addressed in detail, aiding in decision-making and strategic planning. The goal is to provide a holistic
view of the entire enterprise from abstract concepts to concrete implementations.
• Lack of a well-defined respository storing the framework in accordance with integrity rules
Intuitive: Easy to understand and apply to No design process: Does not support the design
various types of architectural documentation. process itself, limiting its application in practical
scenarios.
• The Application layer is about software applications that “support the components in the
business with application services”.
• The Technology layer deals with “the hardware and communication infrastructure to support
the Application Layer. This layer offers infrastructural services needed to run applications,
realized by computer and communication hardware and system software”.
• The Strategy layer helps to incorporate the strategic dimensions and goals.
• The Physical layer is about “physical equipment, materials, and distribution networks”.
FILLING THE ZACHMAN FRAMEWORK WITH ARCHIMATE
ARCHIMATE NOTATION
BUT: Not everyone needs to know everything! As we said, there are different stakeholders in the
modeling process.
In ArchiMate, architects and other stakeholders can define their own views on the enterprise
architecture.
• A viewpoint in ArchiMate is a relevant subset of the ArchiMate concepts and their relationships:
• It can be used to view certain aspects in isolation, and to relate two or more aspects.
• It is specified by viewpoints.
So the viewpoint is essentially a template of specification to construct a view. The view is the actual
represantation of the viewpoints in archimate.
An architecture description comprises multiple views, each addressing specific stakeholder concerns
according to certain viewpoints. Each viewpoint frames stakeholder concerns and sets conventions
for views, such as notations and modeling methods. A view, governed by its viewpoint, consists of
architecture models that use these conventions to address relevant concerns effectively.
EXAMPLES OF ELEMENTS
What are business interfaces to communicate with the customer?
• Website and Mobile App: Digital platforms where customers can browse products, place
orders, and manage their accounts.
• Customer Service Desk: A physical or virtual interface for addressing customer inquiries,
complaints, or service requests.
• Email and Social Media Platforms: Used for marketing communications, customer support,
and engagement.
• Point of Sale (POS) Systems: In physical stores, interfaces such as checkout counters where
transactions are processed.
What business services does the business process offer/provide to the customer?
• Order Management: Processing customer orders, including order receipt, validation, and
confirmation.
• Delivery Services: Ensuring the physical or digital delivery of products to the customer.
• Customer Support and Service: Offering post-purchase support, handling returns, and
resolving issues.
• Payment Processing: Services to handle transactions securely, including credit, debit, and
digital payments.
• Order Placement: A customer places an order through one of the business interfaces.
• Shipping Notice: Documentation that accompanies the goods shipped to the customer.
• Business Role: Defines a set of behaviors or responsibilities within a business process. For
example, a "Sales Representative" role entails promoting and selling products.
• Business Actor: Refers to a specific entity (person or system) that performs roles in the
business process. For example, "John Doe" as a Sales Representative or "CRM System" as a
sales processing actor.
ARCHIMATE VIEWPOINTS
RELATIONSHIPS SUMMARY
Sharp corners: structure
Definitions
Examples
APPLICATION LAYER
Target: Enterprise, process, application, and domain architects
Concerns: Application structure, consistency and completeness, reduction of complexity
Note: in the Application Layer, Data and Applications are not represented as computer system but as
logical group of capabilities that manage data objects.
Examples
TECHNOLOGY LAYER
Target: Infrastructure architects, operational managers
Concerns: Stability, security, dependencies, costs of the infrastructure
Definitions
Examples
Note: the latter example shows how to integrate the pechnology layer with the application layer.
Integrating those applications need things like a network (example: Internet, TCP/IP) and
communication path (example: SSL) that connect the nodes (servers, devices, etc.)
LAYERED VIEWPOINT
The Layered Viewpoint is designed to show the dependencies and relationships across different layers
of an organization’s architecture. It helps in identifying how applications are supported by underlying
technologies and how these applications enable business processes.
You basically stack the business, application and technology viewpoints and you highlight the relations
they have with eachother, while placing the relevant services between them.
Target: It is relevant for a wide range of stakeholders including CIOs, IT Managers, System Architects,
Business Process Managers, and anyone involved in overseeing, planning, or implementing strategic
business initiatives and IT infrastructure.
Example
ADDITIONNAL VIEWPOINTS
• Target Users: Business analysts, user experience designers, and application developers who
are involved in designing applications that are user-friendly and effectively support business
operations.
APPLICATION STRUCTURE VIEWPOINT
The application structure viewpoint provides an overview of the architecture of one or more
applications or components, along with their associated data. This perspective is instrumental for
designers and developers who need to deconstruct the architecture of a system under development or
identify parts of legacy systems that are suitable for migration or integration.
• Target Users: Enterprise architects, process architects, application architects, and domain
architects who need to design or modify the application architecture.
• Focus: It highlights the interfaces and integrations between various applications, showing how
data and control flow between them to support business processes.
• Target Users: Architects who need to understand or improve the interactions between
different applications to enhance process efficiencies or integration.
Challenges
• Applications that are being built independently differ in programming languages, operating
platforms, data models and formats.
• An integration solution needs to be able to interface with all these different applications and
transform information from source to consumer applications.
• Integration solutions have to transport data from one computer to another across networks (LAN
segments, routers, switches, public networks, and satellite links).
• An integration solution needs to minimize the dependencies from one system to another by using
loose coupling between applications.
Shared database
Multiple applications share the same database schema, located in a single physical database.
Because there is no duplicate data storage, no data has to be transferred from one application to the
other.
• Focus: This viewpoint shows the underlying software and hardware components, such as
servers, databases, network devices, and operating systems that are necessary to deploy and
run the applications.
• Target Users: Infrastructure architects, IT operations managers, and technical support teams
who manage and optimize the hardware and software resources needed to ensure the smooth
operation of applications.
ASSESSING THE QUALITY OF AN EA MODEL
The quality of models can be evaluated along three dimensions
MAIN REQUIREMENTS
1. Firmitas (firmness, structural soundness). That means that the architecture should be “strong”
and consistent.
2. Utilitas (commodity, usefulness). Means that what has been modelled is useful/relevant for the
business.
3. Venustas (grace, elegance). Means that it is more or less readable.
Example: Ensure that all statements in your model conform to the syntax rules of the modeling
language (like ArchiMate). For instance, "Application services are realized by application functions, not
by components."
Examples:
More generally, the syntactic quality focus on the correctness of the function that you use to
modelize.
Example: Your model should contain all relevant and correct statements about the problem domain.
For example, if you are modeling an e-commerce system, the model should correctly represent how
orders, customers, and products interact.
• Validity: all statements made by the model are correct and relevant to the problem
• Completeness: model contains all the statements which would be correct and relevant about the
problem domain
Example: Consider the audience's perspective—use clear hierarchies, relevant viewpoints, and well-
organized elements to ensure the model is easy to understand. For instance, creating model
hierarchies and views that aren't overloaded and choosing viewpoints relevant to the audience.
The degree to which the model has been understood by the audience.
VALIDATION BY META-MODEL
Another method of validating a model is using a meta-model. A meta model (MM) is an explicit
description (constructs and rules) of how a domain specific model is built:
• Describes the basic model elements and the relationships between the model elements as well
as their semantics;
• Defines rules for the use and specialization of model elements and relationships;
• Might be expressed using one or more modeling techniques.
PRINCIPLES VIEWPOINT
The Principles viewpoint allows the analyst or designer to model the principles that are relevant to
the design problem at hand, including the goals that motivate these principles. In addition,
relationships between principles, and their goals, can be modeled. For example, principles may
influence each other positively or negatively.
So basically we have some principles but we need the goals that motivate them otherwise they might
be useless principles.
GOAL REFINEMENT VIEWPOINT
The Goal Refinement viewpoint allows a designer to model the refinement of high-level goals into
more concrete goals, and the refinement of concrete goals into requirements or constraints that
describe the properties that are needed to realize the goals. The refinement of goals into sub-goals is
modeled using the aggregation relationship. The refinement of goals into requirements is modeled
using the realization relationship.
• The end results realized by capabilities that realize these goals are outcomes
• Develop Target Business Architecture Description: Develop a Target Description for the Business
Architecture, to the extent necessary to support the Architecture Vision.
• Develop the Baseline and Target Application Architecture Description: define the major kinds of
application system necessary to process the data and support the business.
• The applications are not described as computer systems, but as logical groups of
capabilities that manage the data objects (Data Architecture) and support the business
functions (Business Architecture).
• The applications and their capabilities are defined without reference to particular
technologies. -> This will come in the next step (Technology Architecture)
• A key process in the creation of a broad architectural model of the target system is the
conceptualization of building blocks.
• Architecture Building Blocks (ABBs) describe the functionality and how they may be
implemented without the detail introduced by configuration or detailed design.
Objective: Creation of a viable Implementation and Migration Plan in cooperation with the portfolio and
project managers
The step F in the TOGAF Migration Planning process involves creating a structured approach to
transitioning from an existing architecture to a desired future architecture. Here’s a breakdown of what
each bullet point involves:
1. Creation of a viable Implementation and Migration Plan in cooperation with the portfolio
and project managers: This step is about developing a realistic and detailed plan to move
from the current architecture to the new one, ensuring it aligns with overall business strategies
and objectives. This includes deciding on the projects and activities needed for the transition.
2. Assign a Business Value to Each Work Package: This involves quantifying the expected
benefits (such as cost savings, improved efficiency, or enhanced capabilities) each project or
work package will bring. This helps prioritize efforts based on their potential business impact.
4. Prioritize the migration projects through the conduct of a cost/benefit assessment and
risk validation: This step involves evaluating each project to balance the benefits against the
costs and risks. Projects with a favorable balance are prioritized.
o Describes the enterprise at various incremental stages which occur between the
current (Baseline) and the desired future (Target) architectures. This means breaking
down the entire transformation into smaller, more manageable stages or states that
the organization transitions through.
o These architectures are used to organize and manage work across different projects
or programs, helping to map out and track the changes needed to reach the target
architecture. This structured approach helps in assessing and demonstrating the
business value and progress at each stage of the transformation.
o Definition of transition states: Each state or phase in the transition process is clearly
defined, often with goals or outcomes that need to be achieved before moving to the
next phase.
o Business Architecture for each transition state: Details how business operations,
processes, and organizational structures will change or be configured in each phase.
o Data Architecture for each transition state: Outlines how data assets will be
managed and structured through the transition, ensuring that data remains consistent,
secure, and fit for purpose.
o Application Architecture for each transition state: Describes the applications and
software solutions that will be used or need to be developed to support business
functions in each transition phase.
o Technology Architecture for each transition state: Specifies the hardware,
networks, and technological infrastructure required to support the transition at each
stage.
A framework defines what you should do but does not define how or with which tools you should do it.
And it should be vendor-neutral.
In reality – A mixture:
• Frameworks with guidelines (methods) to assess existing enterprise architectures and build
new models
An Architecture Framework establishes a common practice for creating, interpreting, analyzing and
using architecture descriptions within a particular domain of application or stakeholder community.
• Strategic planning (analyze business strategy and requirements using capability maps,
assess situation and plan architecture accordingly)
• Programs and projects (connect architecture with agile practices using the SAFe Scaled Agile
Framework; analyze requirements, evaluate and design solution architectures)
EA IN PRACTICE
TOGAF is the most used EA framework but is rarely applied as-is. Indeed there are practical
challenges such as the entry barriers and lack of speed, the ivory tower (Architects work is
disconnected from the activities that change the EA (investment planning, program and portfolio
management, project delivery, etc.)) and the implementation gap (where the target EA is never
realized).
There is an analogy between city planning and IT systems management, highlighting the importance of
architectural thinking in the lifecycle of IT systems, which includes:
1. Planning: Similar to city planners designing urban layouts, IT planners design the architecture
of systems.
2. Construction Plan: Detailed blueprints are developed, akin to construction plans in urban
development.
3. Building: The actual construction of IT infrastructure occurs, mirroring the building of city
infrastructure.
4. Operating and Further Development: Once built, the IT system is operated and continually
improved, paralleling the ongoing development and maintenance of a city.
This analogy emphasizes that, just like in urban planning where plans are realized, inhabited, and
evolved, IT systems require thoughtful planning, careful building, and continuous improvement to
serve their intended functions effectively.
o The strategic planning process operates at the enterprise level, often likened to "city
planning" for its comprehensive and foundational role.
o Budget and investment planning occur typically on a yearly basis, underpinning the
financial commitment needed to support the architectural vision and projects.
o Roadmap Development: Roadmaps are defined to guide the transition from the
current state to the desired future state, creating a shared understanding of and
commitment to the strategic plan.
3. Architecture Artifacts:
o Maps: Various types of maps (e.g., capability, process, application maps) are used as
tools to visualize and manage the complexity of enterprise architecture.
o Detailed Models: These are created for selected aspects of the architecture to
provide detailed guidance and specifications where necessary.
BUSINESS ARCHITECTURE
The business architecture is:
• A prerequisite for architecture work in any other domain (Data, Application, Technology)
• The first architecture activity that needs to be undertaken, if not catered for already in other
organizational processes (enterprise planning, strategic business planning, business process
re-engineering, etc.)
So, this means that the business architecture is the first thing that must be done.
WHICH ARCHITECTURE VIEWS AND ARTIFACTS CONSTITUTE THE BUSINESS ARCHITECTURE?
Zachman
Planner and Owner View (e.g. business goals, business processes, information objects, locations,
people and stakeholders, events)
ArchiMate
Business service, business object, business process, business role (IT-driven) EA approaches use the
term business architecture to describe business processes, locations and data objects.
However, strategy-led EA literature link up business architecture with strategic planning and higher
level concepts. In this broader sense, it comprises also the business strategy’s core elements, such
as:
• Business models
• Business capabilities
• Operating models
Capability Map
Describes a company’s capacity to perform specific tasks arising from a combination of physical,
human and technological resources
-> Alignment of resources with business strategy
Operating Model
It is the abstract representation of how an organization operates across process, organization,
technology domains in order to deliver value defined by the organization in scope.
-> Operations strategy
BUSINESS MODEL
As said earlier, it focuses on the value creation logic for the enterprise.
VALUE STREAMS
A value stream is a sequence of value-adding activities that achieve a specific result that is of
value to a stakeholder.
• A value stream focuses on the overall value-creating behavior from the perspective of the
importance, worth, or usefulness of what is produced, and is not a description of time-ordered
tasks for individual cases.
It may describe alternative paths and decision points (modeled with junctions).
Link between value streams and capabilities: Capabilities can serve (i.e., enable) a value stream.
The Center of Information Systems Research at MIT Sloan School of Management has defined an
operating model as the desired level of process standardization and process integration.
1. Process standardization:
• Defining exactly how a business process will be executed regardless of who is performing the
business process or where it is completed
• Tradeoff between reductions in variability, efficiency, predictability vs local innovation
2. Process integration:
• Between processes to enable end-to-end transaction processing across processes to allow the
company to present a single face to the customer
Coordination
This model is used by companies with multiple business units that operate independently but need
to share information seamlessly. The emphasis is on enabling these units to access and exchange
data efficiently without merging their operations entirely. It helps manage complex interdependencies
within the company.
Unification
In this model, a single company operates globally with uniform processes and data access across all
locations. The focus is on having consistent and standardized procedures everywhere, supported by
centralized IT systems. This model is efficient for organizations wanting a coherent brand and service
quality worldwide.
Divresification
Companies operating under this model have various business units that function independently and
focus on different markets or products. The central entity provides support and may achieve
economies of scale, but each unit operates autonomously to best serve its specific market.
Replication
This model involves independent businesses under the same umbrella following a standard set of
processes. Each unit operates independently but uses a common framework and practices optimized
from one another, aiming to replicate success across multiple scenarios.
Summary
CAPABILITY MODELS AND MAPS
What are capabilities?
Capabilities describe the firm’s capacities (What?). They provide a high-level view, and are more
stable over time.
Capabilities are realized by people, processes, technology (and data). They can be linked to
resources
Business capabilities:
Capability Maps:
7. Capabilities map to, but are not the same as, an LOB, business unit, business process, or
value stream.
10. Capabilities are of most value when incorporated into a larger view of an enterprise's
ecosystem.
• Differentiating, customer facing capabilities are core and are seldom outsourced
• Strategic, innovating capabilities are important for the long-term future of an enterprise and are
often assigned
a separate budget, to avoid the “innovation squeeze”, where the core, operational capabilities eat
up all the budget
• Non-core, commodity or supporting capabilities are good candidates for outsourcing to partners
that have these as their core, differentiating capabilities
CAPABILITY HEAT-MAP
Creating a heat-map is useful to depict the gaps between the as-is and the to-be in our capabilities.
ROAD-MAPPING AND MIGRATION PLANNING
The core purpose of a capability realization model is to link an organization's business capabilities (the
"what" it can do) to the resources, processes, and technologies (the "how") that enable those
capabilities.
BASIC EXAMPLE
LECTURE 8 : FROM STRATEGIC PLANNING TO PROGRAMS &
PROJECTS (SP 2)
This is where we are at in our strategic planning.
The problem with Agile is that is mostly fits small, co-located teams developing non-life-critical
projects.
Scaled Agile Framework (SAFe) is a framework for applying Lean and Agile practices at enterprise
scale. It Synchronizes alignment, collaboration and delivery for large numbers of teams.
PORTFOLIO
Themes with a life span of 6-12 months
Epic: “An Epic is a container for a Solution development initiative large enough to require analysis, the
definition of a Minimum Viable Product (MVP), and financial approval before implementation.”
AGILE RELEASE TRAIN (ART)
5-10 teams, potentially shippable increment (PSI) every 10 weeks (5 iterations)
Feature: “A Feature is a service that fulfills a stakeholder need. Each feature includes a benefit
hypothesis and acceptance criteria and is sized or split as necessary to be delivered by a single Agile
Release Train (ART) in a Program Increment (PI).”
User Story: “Stories are short descriptions of a small piece of desired functionality, written in the
user’s language ... User stories deliver functionality directly to the end user. Enabler stories bring
visibility to the work items needed to support exploration, architecture, infrastructure, and
compliance.”
MAPPED IN ARCHIMATE
Emergent design is defining and extending the architecture only as necessary to deliver the next
increment of functionality.
Organizations overcome these problems by balancing emergent design with intentional architecture,
which requires some centralized planning and cross-team coordination.
ARCHITECTURAL RUNWAY
The term "architectural runway" in the context of the Scaled Agile Framework (SAFe) refers to the
existing code, components, and technical infrastructure needed to implement near-term features
without excessive redesign and delay.
Example:
Imagine you're developing an e-commerce application. If you foresee the need to handle many
different types of payments in the future:
• Without an architectural runway: You might develop the payment system to handle only
credit cards. Later, adding support for digital wallets or bank transfers could require major
changes to how payments are processed, possibly even redesigning the whole payment
module.
• With an architectural runway: You would design the payment system from the start to easily
accommodate multiple types of payments. This means when it’s time to add a new payment
method, the system is already prepared for this expansion, making it quicker and easier to
implement.
SCRUM
Short video explaining it
LECTURE 9: LEANIX
One of the goals of LeanIX is not to make it only accessible for experts but for everyone in the
organisation to input what they think of it, they do that to have a better data-driven enterprise
architecture.
SHADOW IT
LeanIX wants to stop Shadow IT and make it more Business-Managed IT.
4. Bring Your Own Device (BYOD) policies enable personal device usage
RISKS OF SHADOW IT
1. Loss of visibility and control for IT over vulnerabilities and security
SIMPLE EA METAMODEL
DATA-DRIVEN ENTERPRISE ARCHITECTURE
Data-driven enterprise architecture (EA) is an approach that leverages data and analytics to drive
decision-making and optimize the alignment between business and IT within an organization. Some
key points about data-driven EA:
Data as a Foundation
• EA models, processes, and artifacts are driven by actual data rather than assumptions or
static documentation
• Continuous data collection and integration across the enterprise enables up-to-date visibility
Benefits
• Aligns data governance and analytics initiatives with the overall enterprise architecture
The TOGAF Architecture Development Method (ADM) can support data-driven EA practices,
especially in phases like Data Architecture, Application Architecture, and Technology Architecture
definition. Overall, data-driven EA empowers organizations to make better decisions and optimize
business/IT alignment through data-driven insights and modeling capabilities.
USE-CASES
This tool helps companies see how data moves around in their system. It’s like a map showing where
information starts, where it goes, and how it gets there. For example, it tracks data from an employee's
entry in the HR system all the way to how it's used for payroll and time tracking. This transparency is
super useful because it helps companies:
• Keep track of data: They can see all the types of data they have, where each piece is used,
and how it flows through different parts of the company.
• Boost data use: By understanding data paths, companies can find new ways to use data more
effectively, especially with modern tech like big data analytics.
• Visualize with heatmaps: These are like thermal images showing which parts of the data flow
are 'hot' (used a lot) or 'cold' (not used much), helping to focus on important areas.
• Stay compliant: With laws like GDPR in Europe that protect personal data, this tool helps
ensure that data handling is up to legal standards, avoiding fines and other issues.
• Find and fix data silos: Sometimes data gets stuck in one part of a company, unknown or
unused by others. This tool helps spot those silos, making sure valuable data isn’t wasted.
In essence, it’s like giving companies x-ray vision to see their data’s journey, helping them make
smarter decisions, stay legal, and get the most out of the info they have.
LECTURE 10: PORTFOLIO MANAGEMENT & PROJECT LIFE-CYCLE
PRODUCT BACKLOG
• Contains a prioritized list of all items relevant to a specific product.
SPRINT BACKLOG
• Is fed by the product backlog with items that have been fully
specified.
• Every requirement is decomposed into several tasks or actionable development items, which are
then assigned to specific team-members to be implemented in a sprint.
USER STORIES – PRODUCT BACKLOG AND PRIORITIZATION
MORE ON SAFE
User Stories
These are short, simple descriptions of a feature told from the perspective of the
user or customer. They focus on articulating what the user needs and why, which
guides the development process toward creating value for the user. User stories
typically follow a simple template: "As a [type of user], I want [some goal] so that
[some reason]."
Enabler Stories
These provide the necessary technical groundwork that supports the implementation of user stories.
They can include activities such as research, architecture, infrastructure, and any efforts that address
technical challenges or enhancements required to support functional features. Enabler stories are
essential for advancing the architectural runway and may not directly deliver user-visible functionality
but are crucial for enabling future user stories to be implemented effectively.
Provide transparency: Document portfolio and projects with regards to architecture impact and
amendments
Establish guardrails: Check epics for conformity with the architecture vision and adherence to
architecture principles and any guidelines.
Initiate enabler epics: Propose epics to create reusable solutions or improve architecture
Solution Architecture
“Solution architects define and communicate a shared technical and architectural vision to help
ensure the system or solution under development is fit for its intended purpose.”
Typical tasks
• Describe the solution context and solution intent
• Cloud initiatives typically are delivered using agile methods, such as Scrum.
• Challenge: Functional requirements that are of high value to cloud LOB (= line-of-business)
applications are typically dependent on non-functional requirements and architecture.
REQUIREMENT ANALYSIS
Business Requirements
Statements of goals, objectives, and outcomes that describe why a change has been initiated
Stakeholder Requirements
Needs of stakeholders that must be met in order to achieve the business requirements.
User Stories
User stories are used for an informal, natural language description of features of a software system. In
agile methods, a user Story is a small (actually, the smallest) piece of work that represents some value
to an end user and can be delivered during a sprint. See this earlier paragraph for more info.
INVEST criteria’s
• As a customer,
Acceptance Criteria:
• Then the item is added to my shopping cart, and I see a confirmation message.
Acceptance Criteria:
• As an administrator,
• So that I can deactivate accounts, reset passwords, or update user roles as needed.
Acceptance Criteria:
• Then the changes are saved, and the affected user is notified of these changes if applicable.
• As an administrator,
Acceptance Criteria:
• Then the sales report for the selected period is generated and viewable.
Acceptance Criteria:
• Then I can view the details, respond to the user, and mark the ticket as resolved.
• As an external supplier,
Acceptance Criteria:
• When I log into the partner portal and request current inventory levels,
• Then I can view real-time inventory data, which aids in managing my supply chain.
Story Map
A story map organizes user stories according to a narrative flow that presents the big picture of the
product.
Solution Requirements
A statement of what the system must do and what characteristics the system must have in order to
satisfy user needs.
Solution Requirements change as the project moves from analysis to design and then to
implementation. The focus is on business needs during analysis phase, and over time refinement and
extension of requirements.
Provide the appropriate level of detail to allow for the development and specification of a solution.
Functional Requirements
• A process or activity the system has to do or support
Example
Non-functional Requirements
Behavioral properties or qualities the system must have (performance, scalability, etc.)
Example
• Unambiguous
• Testable (verifiable)
• Correct
• Understandable
• Independent
• Atomic
• Necessary
• Implementation-free (abstract)
Transition Requirements
Address topics, such as data conversion, training or business continuity.
LECTURE 12: REQUIREMENTS AND SOLUTION DESIGN
INDUSTRY 4.0
Industry 4.0, also known as the Fourth Industrial Revolution, refers to the integration of
intelligent digital technologies into manufacturing and industrial processes. Itencompasses a set of
technologies that include:
• Robotics
• Automation
REQUIREMENTS
You can also make interviews and workshops with employees and experts to create as-is and to-be
models.
Example
PARTICIPATORY DESIGN / CONTEXTUAL DESIGN
LECTURE 13: OPERATIONS & MONITORING
We’ve now arrived at the third and final cycle: Operations and monitoring.
ARCHITECTURE-DRIVEN PRACTICES
Collect and assess changes for their EA relevance
ARCHITECTURE ARTIFACTS
EA components linked to IT assets (CMDB) and incidents/problems/change/service requests
KPIs for EA
THE CHALLENGE
EA models are always outdated. Why?
• Most of these changes are triggered by users and treated by (local) service desks and operations
But while most of those changes don’t affect the EA at all, but 1-10% of them have significant impact
on an EA component by modifying its characteristics or entail significant side-effects on other
components.
As we can see, they are rather different and strategic changes are for the long term for a new business
idea while operational changes are for the stability of the current affairs.
• Alter business-critical EA components (for instance, a product or service offering, key customers
or distribution channels, core business processes or applications)
• Impact (existing) interfaces between two EA components (for instance, two applications)
• Bear high risks (for instance, high costs, volatile requirements or doubtful investments) and
impact business continuity
• Change the main IS/IT security features (for instance, communication with external parties)
• Impact external factors and ressources (for instance, supplier structure change)
• Violate regulatory guidelines (for instance, Basel III in banking, SOX, or FDA in pharma), company
standards or working models (for instance, architecture principles and standards)
Checklist
At the end, we can use this check-list to assess EA relevance of the following changes in a CRM
(Customer Relationship Management) system.
• Defines EA components characteristics that drive complexity and assigns them a weight
Q1
Architecture is rigid and not compatible with today’s agile methods and ways of working.
Do you agree with this statement: yes/no? Explain and justify your answer.
I do not agree with this statement. Indeed, today’s EA is compatible with Agile methods. We can see
that with the widely used SAFe framework that advocates to use intentional architecture with
emergent design.
Indeed, planifying everything in advance and being very ridig is absolutely against Agile’s principles, but
using only emergent design means defining and extending the architecture only as necessary to deliver
the next increment of functionality. Doing this can lead to inconsistencies and vulnerabilities. This is
why it is very important to couple it with some intentional architecture in order for it to be more robust.
Furthermore, in the context of SAFe, having a good architecture is a good enabler for architectural
runway. Indeed, without intentionnal architecture it would be way harder for example to have a good
and scabeable design that is robust and capable of implementing new features when needed. This
shows that we need to have both emmergent design and planned architecture and that they are widely
used together.
This is why I do not see architecture and agile methods being incompatible.
Q2
In a manufacturing company, various functions have implemented their own isolated systems to
support their specific business requirements, leading to the emergence of shadow IT.
• What are three typical challenges that result from shadow IT from an architecture
perspective?
First, you might have unwated costs if multiple employees or teams have purchased the same license
and didn’t tell it to the company, whereas the company could have bought a company wide license
you would probably have been way cheaper than a mulititude of employees having a personnal
subscription.
Then, we have a compliance problem, indeed, since the apps bought in shadowIT are not always (and
most frequently) not approved by the company, this can lead to non-compliance to some regulatory
norms.
Finally, the firm could have Loss of visibility and control for IT over vulnerabilities and security.
• How could an enterprise architecture team support the company in dealing with shadow
IT?
An entreprise architecture team using tools like LeanIX could help dealing with ShadowIT. Indeed, they
first provide surveys for employees to write what apps they use, this could lead to uncovering shadow
IT. They also provide SAM (Software Asset Management) which could reveal usage of Shadow IT. You
could then try to eradicate it or to use it as a learning opportunity about what your IT department likes
and is the most productive with.
Q3
Industry 4.0 @ Roasteria
1. Document three business requirements for the new solution
(in terms of business goals and outcomes). Can you quantify them?
We have the board, and the warehouse opeators and the engineers.
3. Pick 2 stakeholders and define 2 user stories per stakeholder for the new monitoring system.
Board
As the Board, we want to see a real-time dashboard with key performance indicators (KPIs) of the
production line, such as overall equipment effectiveness (OEE) and machine downtime, so that we
can assess the impact of Industry 4.0 on operating efficiency and make data-driven decisions.
Acceptance criteria
Then I need to be sure of why this is and have indications on how to handle the issue
Warehouse operator
As a warehouse operator, I want to see clear and actionable instructions on the monitoring system
interface whenever a machine malfunction is detected so that I can troubleshoot and resolve the issue
quickly.
Acceptance criteria
4. Of the user story you created, pick one and translate it into 2-3 functional and non-functional
requirements.
I picked: As a warehouse operator, I want to see clear and actionable instructions on the monitoring
system interface whenever a machine malfunction is detected so that I can troubleshoot and resolve
the issue quickly.
Functional requirement
Non-functional requirement
Since a lot of IoT devices are very vulnerable to attacks, our system must implement increased
security in all the IoT sensors.
Q4
Which viewpoint to select for the following situation?
As part of GDPR compliance checks, the CIO asks to identify all applications that comprise sensitive
personal information.
A business analyst aims to analyze how employees in the HR department work and which applications
they use. Application usage viewpoint
For the upgrade to a new version of the ERP system, the project manager needs to identify all other
applications that exchange data with the ERP system. Application cooperation viewpoint
A business analyst aims to obtain an overview of the different products and services delivered to the
customers and how they are created. Business funciton viewpoint
A developer wants to understand Mailchimp’s programmatic access to data and functionality in order
to build custom features. Technology usage viewpoint
RESSOURCES
DEFAULT CAPABILITY MAP