Togaf® version 9.1 / (Registro nro. 18002)

000 -CABECERA
Campo de control de longitud fija 45948nam a2200277Ma 4500
001 - NÚMERO DE CONTROL
Campo de control ocn915909848
003 - IDENTIFICADOR DE NÚMERO DE CONTROL
Campo de control OCoLC
007 - CAMPO FIJO DE DESCRIPCIÓN FÍSICA
DESCRIPCIÓN FÍSICA ta
008 - CAMPO FIJO DE DESCRIPCIÓN FIJA--INFORMACIÓN GENERAL
Campo de control de longitud fija 120301s2011 ne a g 001 0 eng d
020 ## - ISBN (INTERNATIONAL STANDARD BOOK NUMBER)
ISBN 9789087536794
020 ## - ISBN (INTERNATIONAL STANDARD BOOK NUMBER)
ISBN 9087536798
040 ## - FUENTE DE CATALOGACIÓN
Agencia de catalogación original ZZAND
Idioma de catalogación spa
Agencia que realiza la transcripción ZZAND
082 04 - NÚMERO DE LA CLASIFICACIÓN DECIMAL DEWEY
Número de clasificación Decimal 004.22
Número de documento (Cutter) T374t
Número de edición DEWEY 21
110 ## - ENCABEZAMIENTO PRINCIPAL--NOMBRE CORPORATIVO
Nombre corporativo o de jurisdicción como elemento de entrada The Open Group.
9 (RLIN) 26079
245 10 - TÍTULO PROPIAMENTE DICHO
Título Togaf® version 9.1 /
Mención de responsabilidad, etc. The Open Group.
260 ## - PUBLICACIÓN, DISTRIBUCIÓN, ETC (PIE DE IMPRENTA)
Lugar de publicación, distribución, etc. Zaltbommel (Holanda) :
Nombre del editor, distribuidor, etc. Van haren Publishing,
Fecha de publicación, distribución, etc. 2011.
300 ## - DESCRIPCIÓN FÍSICA
Extensión xl, 654 p. :
Otros detalles físicos il. ;
Dimensiones 23 cm.
490 1# - MENCIÓN DE SERIE
Mención de serie Togaf series
500 ## - NOTA GENERAL
Nota general Incluye índice.
505 ## - NOTA DE CONTENIDO FORMATEADA
Nota de contenido con formato preestablecido Frontmatter<br/>Preface<br/>This Document<br/>Intended Audience<br/>Keywords<br/>About The Open Group<br/>Participants<br/>Architecture Forum Technical Reviewers<br/>Architecture Forum Members<br/>Trademarks<br/>Acknowledgements<br/>Referenced Documents<br/>1. Introduction<br/>1.1 Structure of the TOGAF Document<br/>1.2 Executive Overview<br/>What is an enterprise?<br/>Why do I need an enterprise architecture?<br/>What specifically would prompt me to develop an enterprise architecture?<br/>What is an architecture framework?<br/>Why do I need TOGAF as a framework for enterprise architecture?<br/>Who would benefit from using TOGAF?<br/>2. Core Concepts<br/>2.1 What is TOGAF?<br/>2.2 What is Architecture in the Context of TOGAF?<br/>2.3 What Kind of Architecture Does TOGAF Deal With?<br/>2.4 Architecture Development Method<br/>2.5 Deliverables, Artifacts, and Building Blocks<br/>2.6 Enterprise Continuum<br/>2.7 Architecture Repository<br/>2.8 Establishing and Maintaining an Enterprise Architecture Capability<br/>2.9 Establishing the Architecture Capability as an Operational Entity<br/>2.10 Using TOGAF with Other Frameworks<br/>3. Definitions<br/>3.1 Abstraction<br/>3.2 Actor<br/>3.3 Application<br/>3.4 Application Architecture<br/>3.5 Application Platform<br/>3.6 Application Platform Interface (API)<br/>3.7 Architectural Style<br/>3.8 Architecture<br/>3.9 Architecture Building Block (ABB)<br/>3.10 Architecture Continuum<br/>3.11 Architecture Development Method (ADM)<br/>3.12 Architecture Domain<br/>3.13 Architecture Framework<br/>3.14 Architecture Governance<br/>3.15 Architecture Landscape<br/>3.16 Architecture Principles<br/>3.17 Architecture Vision<br/>3.18 Artifact<br/>3.19 Baseline<br/>3.20 Boundaryless Information Flow<br/>3.21 Building Block<br/>3.22 Business Architecture<br/>3.23 Business Function<br/>3.24 Business Governance<br/>3.25 Business Service<br/>3.26 Capability<br/>3.27 Capability Architecture<br/>3.28 Capability Increment<br/>3.29 Communications and Stakeholder Management<br/>3.30 Concerns<br/>3.31 Constraint<br/>3.32 Data Architecture<br/>3.33 Deliverable<br/>3.34 Enterprise<br/>3.35 Enterprise Continuum<br/>3.36 Foundation Architecture<br/>3.37 Framework<br/>3.38 Gap<br/>3.39 Governance<br/>3.40 Information<br/>3.41 Information Technology (IT)<br/>3.42 Interoperability<br/>3.43 Logical<br/>3.44 Metadata<br/>3.45 Metamodel<br/>3.46 Method<br/>3.47 Methodology<br/>3.48 Model<br/>3.49 Modeling<br/>3.50 Objective<br/>3.51 Patterns<br/>3.52 Performance Management<br/>3.53 Physical<br/>3.54 Platform<br/>3.55 Platform Service<br/>3.56 Principle<br/>3.57 Reference Model (RM)<br/>3.58 Repository<br/>3.59 Requirement<br/>3.60 Roadmap<br/>3.61 Role<br/>3.62 Segment Architecture<br/>3.63 Service Orientation<br/>3.64 Service Oriented Architecture (SOA)<br/>3.65 Solution Architecture<br/>3.66 Solution Building Block (SBB)<br/>3.67 Solutions Continuum<br/>3.68 Stakeholder<br/>3.69 Standards Information Base (SIB)<br/>3.70 Strategic Architecture<br/>3.71 Target Architecture<br/>3.72 Taxonomy of Architecture Views<br/>3.73 Technology Architecture<br/>3.74 Transition Architecture<br/>3.75 View<br/>3.76 Viewpoint<br/>3.77 Work Package<br/>4. Release Notes<br/>4.1 What's New in TOGAF 9?<br/>Modular Structure<br/>Content Framework<br/>Extended Guidance on Adopting TOGAF within an Enterprise<br/>Explicit Consideration of Architectural Styles, Including SOA and Security Architecture<br/>Additional ADM Detail<br/>4.1.1 Changes Applied in this Edition<br/>4.2 The Benefits of TOGAF 9<br/>Greater Usability<br/>More Focus on Holistic Enterprise Change<br/>More Consistency of Output<br/>4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9<br/>Part I: Introduction<br/>Part II: Architecture Development Method<br/>Part III: Enterprise Continuum<br/>Part IV: Resource Base<br/>4.4 Mapping of TOGAF 9 Structure to TOGAF 8.1.1<br/>4.5 Using TOGAF<br/>4.5.1 Conditions of Use<br/>4.5.2 How Much Does TOGAF Cost?<br/>4.5.3 Downloads<br/>4.6 Why Join The Open Group?<br/>5. Introduction<br/>5.1 ADM Overview<br/>5.1.1 The ADM, Enterprise Continuum, and Architecture Repository<br/>5.1.2 The ADM and the Foundation Architecture<br/>5.1.3 ADM and Supporting Guidelines and Techniques<br/>5.2 Architecture Development Cycle<br/>5.2.1 Key Points<br/>5.2.2 Basic Structure<br/>5.3 Adapting the ADM<br/>5.4 Architecture Governance<br/>5.5 Scoping the Architecture<br/>5.5.1 Breadth<br/>5.5.2 Depth<br/>5.5.3 Time Period<br/>5.5.4 Architecture Domains<br/>5.6 Architecture Integration<br/>5.7 Summary<br/>6. Preliminary Phase<br/>6.1 Objectives<br/>6.2 Approach<br/>6.2.1 Enterprise<br/>6.2.2 Organizational Context<br/>6.2.3 Requirements for Architecture Work<br/>6.2.4 Principles<br/>6.2.5 Management Frameworks<br/>6.2.6 Relating the Management Frameworks<br/>6.2.7 Planning for Enterprise Architecture/Business Change Maturity Evaluation<br/>6.3 Inputs<br/>6.3.1 Reference Materials External to the Enterprise<br/>6.3.2 Non-Architectural Inputs<br/>6.3.3 Architectural Inputs<br/>6.4 Steps<br/>6.4.1 Scope the Enterprise Organizations Impacted<br/>6.4.2 Confirm Governance and Support Frameworks<br/>6.4.3 Define and Establish Enterprise Architecture Team and Organization<br/>6.4.4 Identify and Establish Architecture Principles<br/>6.4.5 Tailor TOGAF and, if any, Other Selected Architecture Framework(s)<br/>6.4.6 Implement Architecture Tools<br/>6.5 Outputs<br/>7. Phase A: Architecture Vision<br/>7.1 Objectives<br/>7.2 Approach<br/>7.2.1 General<br/>7.2.2 Creating the Architecture Vision<br/>7.2.3 Business Scenarios<br/>7.3 Inputs<br/>7.3.1 Reference Materials External to the Enterprise<br/>7.3.2 Non-Architectural Inputs<br/>7.3.3 Architectural Inputs<br/>7.4 Steps<br/>7.4.1 Establish the Architecture Project<br/>7.4.2 Identify Stakeholders, Concerns, and Business Requirements<br/>7.4.3 Confirm and Elaborate Business Goals, Business Drivers, and Constraints<br/>7.4.4 Evaluate Business Capabilities<br/>7.4.5 Assess Readiness for Business Transformation<br/>7.4.6 Define Scope<br/>7.4.7 Confirm and Elaborate Architecture Principles, including Business Principles<br/>7.4.8 Develop Architecture Vision<br/>7.4.9 Define the Target Architecture Value Propositions and KPIs<br/>7.4.10 Identify the Business Transformation Risks and Mitigation Activities<br/>7.4.11 Develop Statement of Architecture Work; Secure Approval<br/>7.5 Outputs<br/>8. Phase B: Business Architecture<br/>8.1 Objectives<br/>8.2 Approach<br/>8.2.1 General<br/>8.2.2 Developing the Baseline Description<br/>8.2.3 Business Modeling<br/>8.2.4 Architecture Repository<br/>8.3 Inputs<br/>8.3.1 Reference Materials External to the Enterprise<br/>8.3.2 Non-Architectural Inputs<br/>8.3.3 Architectural Inputs<br/>8.4 Steps<br/>8.4.1 Select Reference Models, Viewpoints, and Tools<br/>8.4.1.1 Determine Overall Modeling Process<br/>8.4.1.2 Identify Required Service Granularity Level, Boundaries, and Contracts<br/>8.4.1.3 Identify Required Catalogs of Business Building Blocks<br/>8.4.1.4 Identify Required Matrices<br/>8.4.1.5 Identify Required Diagrams<br/>8.4.1.6 Identify Types of Requirement to be Collected<br/>8.4.2 Develop Baseline Business Architecture Description<br/>8.4.3 Develop Target Business Architecture Description<br/>8.4.4 Perform Gap Analysis<br/>8.4.5 Define Candidate Roadmap Components<br/>8.4.6 Resolve Impacts Across the Architecture Landscape<br/>8.4.7 Conduct Formal Stakeholder Review<br/>8.4.8 Finalize the Business Architecture<br/>8.4.9 Create Architecture Definition Document<br/>8.5 Outputs<br/>9. Phase C: Information Systems Architectures<br/>9.1 Objectives<br/>9.2 Approach<br/>9.3 Inputs<br/>9.3.1 Reference Materials External to the Enterprise<br/>9.3.2 Non-Architectural Inputs<br/>9.3.3 Architectural Inputs<br/>9.4 Steps<br/>9.5 Outputs<br/>10. Phase C: Information Systems Architectures - Data Architecture<br/>10.1 Objectives<br/>10.2 Approach<br/>10.2.1 Key Considerations for Data Architecture<br/>10.2.1.1 Data Management<br/>10.2.1.2 Data Migration<br/>10.2.1.3 Data Governance<br/>10.2.2 Architecture Repository<br/>10.3 Inputs<br/>10.3.1 Reference Materials External to the Enterprise<br/>10.3.2 Non-Architectural Inputs<br/>10.3.3 Architectural Inputs<br/>10.4 Steps<br/>10.4.1 Select Reference Models, Viewpoints, and Tools<br/>10.4.1.1 Determine Overall Modeling Process<br/>10.4.1.2 Identify Required Catalogs of Data Building Blocks<br/>10.4.1.3 Identify Required Matrices<br/>10.4.1.4 Identify Required Diagrams<br/>10.4.1.5 Identify Types of Requirement to be Collected<br/>10.4.2 Develop Baseline Data Architecture Description<br/>10.4.3 Develop Target Data Architecture Description<br/>10.4.4 Perform Gap Analysis<br/>10.4.5 Define Candidate Roadmap Components<br/>10.4.6 Resolve Impacts Across the Architecture Landscape<br/>10.4.7 Conduct Formal Stakeholder Review<br/>10.4.8 Finalize the Data Architecture<br/>10.4.9 Create Architecture Definition Document<br/>10.5 Outputs<br/>11. Phase C: Information Systems Architectures - Application Architecture<br/>11.1 Objectives<br/>11.2 Approach<br/>11.2.1 Architecture Repository<br/>11.3 Inputs<br/>11.3.1 Reference Materials External to the Enterprise<br/>11.3.2 Non-Architectural Inputs<br/>11.3.3 Architectural Inputs<br/>11.4 Steps<br/>11.4.1 Select Reference Models, Viewpoints, and Tools<br/>11.4.1.1 Determine Overall Modeling Process<br/>11.4.1.2 Identify Required Catalogs of Application Building Blocks<br/>11.4.1.3 Identify Required Matrices<br/>11.4.1.4 Identify Required Diagrams<br/>11.4.1.5 Identify Types of Requirement to be Collected<br/>11.4.2 Develop Baseline Application Architecture Description<br/>11.4.3 Develop Target Application Architecture Description<br/>11.4.4 Perform Gap Analysis<br/>11.4.5 Define Candidate Roadmap Components<br/>11.4.6 Resolve Impacts Across the Architecture Landscape<br/>11.4.7 Conduct Formal Stakeholder Review<br/>11.4.8 Finalize the Application Architecture<br/>11.4.9 Create Architecture Definition Document<br/>11.5 Outputs<br/>12. Phase D: Technology Architecture<br/>12.1 Objectives<br/>12.2 Approach<br/>12.2.1 Architecture Repository<br/>12.3 Inputs<br/>12.3.1 Reference Materials External to the Enterprise<br/>12.3.2 Non-Architectural Inputs<br/>12.3.3 Architectural Inputs<br/>12.4 Steps<br/>12.4.1 Select Reference Models, Viewpoints, and Tools<br/>12.4.1.1 Determine Overall Modeling Process<br/>12.4.1.2 Identify Required Catalogs of Technology Building Blocks<br/>12.4.1.3 Identify Required Matrices<br/>12.4.1.4 Identify Required Diagrams<br/>12.4.1.5 Identify Types of Requirement to be Collected<br/>12.4.1.6 Select Services<br/>12.4.2 Develop Baseline Technology Architecture Description<br/>12.4.3 Develop Target Technology Architecture Description<br/>12.4.4 Perform Gap Analysis<br/>12.4.5 Define Candidate Roadmap Components<br/>12.4.6 Resolve Impacts Across the Architecture Landscape<br/>12.4.7 Conduct Formal Stakeholder Review<br/>12.4.8 Finalize the Technology Architecture<br/>12.4.9 Create Architecture Definition Document<br/>12.5 Outputs<br/>12.6 Postscript<br/>13. Phase E: Opportunities & Solutions<br/>13.1 Objectives<br/>13.2 Approach<br/>13.3 Inputs<br/>13.3.1 Reference Materials External to the Enterprise<br/>13.3.2 Non-Architectural Inputs<br/>13.3.3 Architectural Inputs<br/>13.4 Steps<br/>13.4.1 Determine/Confirm Key Corporate Change Attributes<br/>13.4.2 Determine Business Constraints for Implementation<br/>13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D<br/>13.4.4 Review Consolidated Requirements Across Related Business Functions<br/>13.4.5 Consolidate and Reconcile Interoperability Requirements<br/>13.4.6 Refine and Validate Dependencies<br/>13.4.7 Confirm Readiness and Risk for Business Transformation<br/>13.4.8 Formulate Implementation and Migration Strategy<br/>13.4.9 Identify and Group Major Work Packages<br/>13.4.10 Identify Transition Architectures<br/>13.4.11 Create the Architecture Roadmap & Implementation and Migration Plan<br/>13.5 Outputs<br/>14. Phase F: Migration Planning<br/>14.1 Objectives<br/>14.2 Approach<br/>14.3 Inputs<br/>14.3.1 Reference Materials External to the Enterprise<br/>14.3.2 Non-Architectural Inputs<br/>14.3.3 Architectural Inputs<br/>14.4 Steps<br/>14.4.1 Confirm Management Framework Interactions for the Implementation and Migration Plan<br/>14.4.2 Assign a Business Value to Each Work Package<br/>14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicle<br/>14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation<br/>14.4.5 Confirm Architecture Roadmap and Update Architecture Definition Document<br/>14.4.6 Generate the Implementation and Migration Plan<br/>14.4.7 Complete the Architecture Development Cycle and Document Lessons Learned<br/>14.5 Outputs<br/>15. Phase G: Implementation Governance<br/>15.1 Objectives<br/>15.2 Approach<br/>15.3 Inputs<br/>15.3.1 Reference Materials External to the Enterprise<br/>15.3.2 Non-Architectural Inputs<br/>15.3.3 Architectural Inputs<br/>15.4 Steps<br/>15.4.1 Confirm Scope and Priorities for Deployment with Development Management<br/>15.4.2 Identify Deployment Resources and Skills<br/>15.4.3 Guide Development of Solutions Deployment<br/>15.4.4 Perform Enterprise Architecture Compliance Reviews<br/>15.4.5 Implement Business and IT Operations<br/>15.4.6 Perform Post-Implementation Review and Close the Implementation<br/>15.5 Outputs<br/>16. Phase H: Architecture Change Management<br/>16.1 Objectives<br/>16.2 Approach<br/>16.2.1 Drivers for Change<br/>16.2.2 Enterprise Architecture Change Management Process<br/>16.2.3 Guidelines for Maintenance versus Architecture Redesign<br/>16.3 Inputs<br/>16.3.1 Reference Materials External to the Enterprise<br/>16.3.2 Non-Architectural Inputs<br/>16.3.3 Architectural Inputs<br/>16.4 Steps<br/>16.4.1 Establish Value Realization Process<br/>16.4.2 Deploy Monitoring Tools<br/>16.4.3 Manage Risks<br/>16.4.4 Provide Analysis for Architecture Change Management<br/>16.4.5 Develop Change Requirements to Meet Performance Targets<br/>16.4.6 Manage Governance Process<br/>16.4.7 Activate the Process to Implement Change<br/>16.5 Outputs<br/>17. ADM Architecture Requirements Management<br/>17.1 Objectives<br/>17.2 Approach<br/>17.2.1 General<br/>17.2.2 Requirements Development<br/>17.2.3 Resources<br/>17.2.3.1 Business Scenarios<br/>17.2.3.2 Requirements Tools<br/>17.3 Inputs<br/>17.4 Steps<br/>17.5 Outputs<br/>18. Introduction<br/>18.1 Guidelines for Adapting the ADM Process<br/>18.2 Techniques for Architecture Development<br/>18.3 Using TOGAF with Different Architectural Styles<br/>19. Applying Iteration to the ADM<br/>19.1 Overview<br/>19.2 Iteration Cycles<br/>19.3 Classes of Architecture Engagement<br/>19.4 Approaches to Architecture Development<br/>19.5 Iteration Considerations<br/>19.5.1 Iteration between ADM Cycles<br/>19.5.2 Iteration within an ADM Cycle<br/>19.6 Conclusions<br/>Footnotes<br/>20. Applying the ADM across the Architecture Landscape<br/>20.1 Overview<br/>20.2 Architecture Landscape<br/>20.3 Organizing the Architecture Landscape to Understand the State of the Enterprise<br/>20.4 Developing Architectures at Different Levels<br/>21. Security Architecture and the ADM<br/>21.1 Overview<br/>21.2 Introduction<br/>21.3 Guidance on Security for the Architecture Domains<br/>21.4 ADM Architecture Requirements Management<br/>Is our security good?<br/>Nothing useful can be said about a security measure outside the context of an application, or a system and its environment<br/>21.5 Preliminary Phase<br/>Scope the enterprise organizations impacted by the security architecture<br/>Define and document applicable regulatory and security policy requirements<br/>Define the required security capability as part of Architecture Capability<br/>Implement security architecture tools<br/>21.5.1 Security Inputs<br/>21.5.2 Security Outputs<br/>21.6 Phase A: Architecture Vision<br/>Obtain management support for security measures<br/>Define necessary security-related management sign-off milestones of this architecture development cycle<br/>Determine and document applicable disaster recovery or business continuity plans/requirements<br/>Identify and document the anticipated physical/business/regulatory environment(s) in which the system(s) will be deployed<br/>Determine and document the criticality of the system: safety-critical/mission-critical/non-critical<br/>21.6.1 Security Inputs<br/>21.6.2 Security Outputs<br/>21.7 Phase B: Business Architecture<br/>Determine who are the legitimate actors who will interact with the product/service/process<br/>Assess and baseline current security-specific business processes (enhancement of existing objective)<br/>Determine whom/how much it is acceptable to inconvenience in utilizing security measures<br/>Identify and document interconnecting systems beyond project control<br/>Determine the assets at risk if something goes wrong - "What are we trying to protect?"<br/>Determine the cost (both qualitative and quantitative) of asset loss/impact in failure cases<br/>Identify and document the ownership of assets<br/>Determine and document appropriate security forensic processes<br/>Identify the criticality of the availability and correct operation of the overall service<br/>Determine and document how much security (cost) is justified by the threats and the value of the assets at risk<br/>Reassess and confirm Architecture Vision decisions<br/>Assess alignment or conflict of identified security policies with business goals<br/>Determine "what can go wrong?"<br/>21.7.1 Security Inputs<br/>21.7.2 Security Outputs<br/>21.8 Phase C: Information Systems Architectures<br/>Assess and baseline current security-specific architecture elements (enhancement of existing objective)<br/>Identify safe default actions and failure states<br/>Identify and evaluate applicable recognized guidelines and standards<br/>Revisit assumptions regarding interconnecting systems beyond project control<br/>Determine and document the sensitivity or classification level of information stored/created/used<br/>Identify and document custody of assets<br/>Identify the criticality of the availability and correct operation of each function<br/>Determine the relationship of the system under design with existing business disaster/continuity plans<br/>Identify what aspects of the system must be configurable to reflect changes in policy/business environment/access control<br/>Identify lifespan of information used as defined by business needs and regulatory requirements<br/>Determine approaches to address identified risks:<br/>Identify actions/events that warrant logging for later review or triggering forensic processes<br/>Identify and document requirements for rigor in proving accuracy of logged events (non-repudiation)<br/>Identify potential/likely avenues of attack<br/>Determine "what can go wrong?"<br/>21.8.1 Security Inputs<br/>21.8.2 Security Outputs<br/>21.9 Phase D: Technology Architecture<br/>Assess and baseline current security-specific technologies (enhancement of existing objective)<br/>Revisit assumptions regarding interconnecting systems beyond project control<br/>Identify and evaluate applicable recognized guidelines and standards<br/>Identify methods to regulate consumption of resources<br/>Engineer a method by which the efficacy of security measures will be measured and communicated on an ongoing basis<br/>Identify the trust (clearance) level of:<br/>Identify minimal privileges required for any entity to achieve a technical or business objective<br/>Identify mitigating security measures, where justified by risk assessment<br/>Determine "what can go wrong?"<br/>21.9.1 Security Inputs<br/>21.9.2 Security Outputs<br/>21.10 Phase E: Opportunities & Solutions<br/>Identify existing security services available for re-use<br/>Engineer mitigation measures addressing identified risks<br/>Evaluate tested and re-usable security software and security system resources<br/>Identify new code/resources/assets that are appropriate for re-use<br/>Determine "what can go wrong?"<br/>21.11 Phase F: Migration Planning<br/>Assess the impact of new security measures upon other new components or existing leveraged systems<br/>Implement assurance methods by which the efficacy of security measures will be measured and communicated on an ongoing basis<br/>Identify correct secure installation parameters, initial conditions, and configurations<br/>Implement disaster recovery and business continuity plans or modifications<br/>Determine "what can go wrong?"<br/>21.12 Phase G: Implementation Governance<br/>Establish architecture artifact, design, and code reviews and define acceptance criteria for the successful implementation of the findings<br/>Implement methods and procedures to review evidence produced by the system that reflects operational stability and adherence to security policies<br/>Implement necessary training to ensure correct deployment, configuration, and operations of security-relevant subsystems and components; ensure awareness training of all users and non-privileged operators of the system and/or its components<br/>Determine "what has gone wrong?"<br/>21.13 Phase H: Architecture Change Management<br/>Determine "what has gone wrong?"<br/>Incorporate security-relevant changes to the environment into the requirements for future enhancement (enhancement of existing objective)<br/>21.14 References<br/>22. Using TOGAF to Define & Govern SOAs<br/>22.1 Overview<br/>22.2 Introduction<br/>22.3 SOA Definition<br/>22.4 SOA Features<br/>22.5 Enterprise Architecture and SOA<br/>22.6 SOA and Levels<br/>22.6.1 Level of Detail of Implementation Specification<br/>22.6.2 SOA Activities at Different Levels<br/>22.7 Using TOGAF for SOA<br/>22.7.1 Preliminary Phase<br/>22.7.1.1 Principle of Service-Orientation<br/>22.7.1.2 Governance and Support Strategy<br/>22.7.1.3 Partitions and Centers of Excellence<br/>22.7.1.4 Architecture Repository<br/>22.7.2 Phase A: Architecture Vision<br/>22.7.2.1 Stakeholders, Concerns, and Business Requirements<br/>22.7.3 Architecture Development: Phases B, C, and D<br/>Phase B: Business Architecture<br/>Phase C: Information Systems Architectures<br/>SOA-Specific Phase C Artifacts<br/>Phase D: Technology Architecture<br/>SOA-Specific Phase D Artifacts<br/>Phase E: Opportunities and Solutions<br/>SOA-Specific Phase E Artifacts<br/>Phase F: Migration Planning<br/>Phase G: Implementation Governance<br/>Phase H: Architecture Change Management<br/>22.8 Summary<br/>23. Architecture Principles<br/>23.1 Introduction<br/>23.2 Characteristics of Architecture Principles<br/>23.3 Components of Architecture Principles<br/>23.4 Developing Architecture Principles<br/>23.4.1 Qualities of Principles<br/>23.5 Applying Architecture Principles<br/>23.6 Example Set of Architecture Principles<br/>23.6.1 Business Principles<br/>Principle 1: Primary of Principles<br/>Principle 2: Maximize Benefit to the Enterprise<br/>Principle 3: Information Management is Everybody's Business<br/>Principle 4: Business Continuity<br/>Principle 5: Common Use Applications<br/>Principle 6: Service Orientation<br/>Principle 7: Compliance with Law<br/>Principle 8: IT Responsibility<br/>Principle 9: Protection of Intellectual Property<br/>23.6.2 Data Principles<br/>Principle 10: Data is an Asset<br/>Principle 11: Data is Shared<br/>Principle 12: Data is Accessible<br/>Principle 13: Data Trustee<br/>Principle 14: Common Vocabulary and Data Definitions<br/>Principle 15: Data Security<br/>23.6.3 Application Principles<br/>Principle 16: Technology Independence<br/>Principle 17: Ease-of-Use<br/>23.6.4 Technology Principles<br/>Principle 18: Requirements-Based Change<br/>Principle 19: Responsive Change Management<br/>Principle 20: Control Technical Diversity<br/>Principle 21: Interoperability<br/>24. Stakeholder Management<br/>24.1 Introduction<br/>24.2 Approach to Stakeholder Management<br/>24.3 Steps in the Stakeholder Management Process<br/>24.3.1 Identify Stakeholders<br/>24.3.1.1 Sample Stakeholder Analysis<br/>24.3.2 Classify Stakeholder Positions<br/>24.3.3 Determine Stakeholder Management Approach<br/>24.3.4 Tailor Engagement Deliverables<br/>24.4 Template Stakeholder Map<br/>25. Architecture Patterns<br/>25.1 Introduction<br/>25.1.1 Background<br/>25.1.2 Content of a Pattern<br/>25.1.3 Terminology<br/>25.1.3.1 Architecture Patterns and Design Patterns<br/>25.1.3.2 Patterns and the Architecture Continuum<br/>25.1.3.3 Patterns and Views<br/>25.1.3.4 Patterns and Business Scenarios<br/>25.1.4 Architecture Patterns in Use<br/>25.2 US Treasury Architecture Development Guidance (TADG)<br/>25.2.1 TADG Pattern Content<br/>25.2.2 TADG Architecture Patterns<br/>25.3 IBM Patterns for e-Business<br/>25.4 Some Pattern Resources<br/>26. Business Scenarios and Business Goals<br/>26.1 Introduction<br/>26.2 Benefits of Business Scenarios<br/>26.3 Creating the Business Scenario<br/>26.3.1 Overall Process<br/>26.3.2 Gathering<br/>26.3.3 Analyzing<br/>26.3.4 Reviewing<br/>26.4 Contents of a Business Scenario<br/>26.5 Contributions to the Business Scenario<br/>26.6 Business Scenarios and the TOGAF ADM<br/>26.7 Developing Business Scenarios<br/>26.7.1 General Guidelines<br/>26.7.2 Questions to Ask for Each Area<br/>Identifying, Documenting, and Ranking the Problem<br/>Identifying the Business & Technical Environment, and Documenting in Models<br/>Identifying and Documenting Objectives<br/>Identifying Human Actors and their Place in the Business Model<br/>Identifying Computer Actors and their Place in the Technology Model<br/>Documenting Roles, Responsibilities, Measures of Success, Required Scripts<br/>Checking for Fitness-for-Purpose, and refining if necessary<br/>26.8 Business Scenario Documentation<br/>26.8.1 Textual Documentation<br/>26.8.2 Business Scenario Models<br/>26.9 Guidelines on Goals and Objectives<br/>26.9.1 Importance of Goals<br/>26.9.2 Importance of SMART Objectives<br/>Example of Making Objectives SMART<br/>26.9.3 Categories of Goals and Objectives<br/>Goal: Improve Business Process Performance<br/>Goal: Decrease Costs<br/>Goal: Improve Business Operations<br/>Goal: Improve Management Efficacy<br/>Goal: Reduce Risk<br/>Goal: Improve Effectiveness of IT Organization<br/>Goal: Improve User Productivity<br/>Goal: Improve Portability and Scalability<br/>Goal: Improve Interoperability<br/>Goal: Increase Vendor Independence<br/>Goal: Reduce Lifecycle Costs<br/>Goal: Improve Security<br/>Goal: Improve Manageability<br/>26.10 Summary<br/>27. Gap Analysis<br/>27.1 Introduction<br/>27.2 Suggested Steps<br/>27.3 Example<br/>28. Migration Planning Techniques<br/>28.1 Implementation Factor Assessment & Deduction Matrix<br/>28.2 Consolidated Gaps, Solutions, & Dependencies Matrix<br/>28.3 Architecture Definition Increments Table<br/>28.4 Transition Architecture State Evolution Table<br/>28.5 Business Value Assessment Technique<br/>29. Interoperability Requirements<br/>29.1 Overview<br/>29.2 Defining Interoperability<br/>29.3 Enterprise Operating Model<br/>29.4 Refining Interoperability<br/>29.5 Determining Interoperability Requirements<br/>29.6 Reconciling Interoperability Requirements with Potential Solutions<br/>29.7 Summary<br/>Footnotes<br/>30. Business Transformation Readiness Assessment<br/>30.1 Introduction<br/>30.1.1 Business Transformation Enablement Program (BTEP)<br/>30.2 Determine Readiness Factors<br/>30.3 Present Readiness Factors<br/>30.4 Assess Readiness Factors<br/>30.4.1 Readiness Factor Vision<br/>30.4.2 Readiness Factor Rating<br/>30.4.3 Readiness Factor Risks & Actions<br/>30.5 Readiness and Migration Planning<br/>30.6 Marketing the Implementation Plan<br/>30.7 Conclusion<br/>Footnotes<br/>31. Risk Management<br/>31.1 Introduction<br/>31.2 Risk Classification<br/>31.3 Risk Identification<br/>31.4 Initial Risk Assessment<br/>31.5 Risk Mitigation and Residual Risk Assessment<br/>31.6 Conduct Residual Risk Assessment<br/>31.7 Risk Monitoring and Governance (Phase G)<br/>31.8 Summary<br/>32. Capability-Based Planning<br/>32.1 Overview<br/>32.2 Capability-Based Planning Paradigm<br/>32.3 Concept of Capability-Based Planning<br/>32.3.1 Capability Dimensions<br/>32.3.2 Capability Increments<br/>32.4 Capabilities in an Enterprise Architecture Context<br/>32.5 Summary<br/>33. Introduction<br/>33.1 Overview<br/>33.2 Content Metamodel<br/>33.3 Content Framework and the TOGAF ADM<br/>33.4 Structure of Part IV<br/>34. Content Metamodel<br/>34.1 Overview<br/>34.2 Content Metamodel Vision and Concepts<br/>34.2.1 Core Content Metamodel Concepts<br/>Core and Extension Content<br/>Core Metamodel Entities<br/>Catalog, Matrix, and Diagram Concept<br/>34.2.2 Overview of the Content Metamodel<br/>34.3 Content Metamodel in Detail<br/>34.3.1 Core Content Metamodel<br/>34.3.2 Core Architecture Artifacts<br/>34.3.3 Full Content Metamodel<br/>34.4 Content Metamodel Extensions<br/>34.4.1 Governance Extensions<br/>Purpose<br/>Required Changes to the Metamodel<br/>34.4.2 Services Extensions<br/>Purpose<br/>Required Changes to the Metamodel<br/>34.4.3 Process Modeling Extensions<br/>Purpose<br/>Required Changes to the Metamodel<br/>34.4.4 Data Extensions<br/>Purpose<br/>Required Changes to the Metamodel<br/>34.4.5 Infrastructure Consolidation Extensions<br/>Purpose<br/>Required Changes to the Metamodel<br/>34.4.6 Motivation Extensions<br/>Purpose<br/>Required Changes to the Metamodel<br/>34.5 Content Metamodel Entities<br/>34.6 Content Metamodel Attributes<br/>34.7 Metamodel Relationships<br/>Footnotes<br/>35. Architectural Artifacts<br/>35.1 Basic Concepts<br/>35.1.1 Simple Example of a Viewpoint and View<br/>35.2 Developing Views in the ADM<br/>35.2.1 General Guidelines<br/>35.2.2 View Creation Process<br/>35.3 Views, Tools, and Languages<br/>35.3.1 Overview<br/>35.4 Views and Viewpoints<br/>35.4.1 Example of Views and Viewpoints<br/>35.4.2 Views and Viewpoints in Enterprise Architecture<br/>35.4.3 Need for a Common Language and Interoperable Tools for Architecture Description<br/>35.5 Conclusions<br/>35.6 Architectural Artifacts by ADM Phase<br/>35.6.1 Preliminary Phase<br/>Principles Catalog<br/>35.6.2 Phase A: Architecture Vision<br/>Stakeholder Map Matrix<br/>Value Chain Diagram<br/>Solution Concept Diagram<br/>35.6.3 Phase B: Business Architecture<br/>Organization/Actor Catalog<br/>Driver/Goal/Objective Catalog<br/>Role Catalog<br/>Business Service/Function Catalog<br/>Location Catalog<br/>Process/Event/Control/Product Catalog<br/>Contract/Measure Catalog<br/>Business Interaction Matrix<br/>Actor/Role Matrix<br/>Business Footprint Diagram<br/>Business Service/Information Diagram<br/>Functional Decomposition Diagram<br/>Product Lifecycle Diagram<br/>Goal/Objective/Service Diagram<br/>Business Use-Case Diagram<br/>Organization Decomposition Diagram<br/>Process Flow Diagram<br/>Event Diagram<br/>35.6.4 Phase C: Data Architecture<br/>Data Entity/Data Component Catalog<br/>Data Entity/Business Function Matrix<br/>Application/Data Matrix<br/>Conceptual Data Diagram<br/>Logical Data Diagram<br/>Data Dissemination Diagram<br/>Data Security Diagram<br/>Data Migration Diagram<br/>Data Lifecycle Diagram<br/>35.6.5 Phase C: Application Architecture<br/>Application Portfolio Catalog<br/>Interface Catalog<br/>Application/Organization Matrix<br/>Role/Application Matrix<br/>Application/Function Matrix<br/>Application Interaction Matrix<br/>Application Communication Diagram<br/>Application and User Location Diagram<br/>Application Use-Case Diagram<br/>Enterprise Manageability Diagram<br/>Process/Application Realization Diagram<br/>Software Engineering Diagram<br/>Application Migration Diagram<br/>Software Distribution Diagram<br/>35.6.6 Phase D: Technology Architecture<br/>Technology Standards Catalog<br/>Technology Portfolio Catalog<br/>Application/Technology Matrix<br/>Environments and Locations Diagram<br/>Platform Decomposition Diagram<br/>Processing Diagram<br/>Networked Computing/Hardware Diagram<br/>Communications Engineering Diagram<br/>35.6.7 Phase E: Opportunities and Solutions<br/>Project Context Diagram<br/>Benefits Diagram<br/>35.6.8 Requirements Management<br/>Requirements Catalog<br/>35.7 Recommended Architecture Views to be Developed<br/>35.7.1 Developing a Business Architecture View<br/>35.7.1.1 Stakeholders and Concerns<br/>35.7.1.2 Developing the View<br/>35.7.1.3 Key Issues<br/>35.7.2 Developing an Enterprise Security View<br/>35.7.2.1 Stakeholders and Concerns<br/>35.7.2.2 Developing the View<br/>35.7.2.3 Basic Concepts<br/>Information Domains<br/>Strict Isolation<br/>Absolute Protection<br/>35.7.2.4 Security Generic Architecture View<br/>35.7.2.5 Security Services Allocation<br/>Operating System Services<br/>Network Services<br/>System Security Management Services<br/>35.7.3 Developing a Software Engineering View<br/>35.7.3.1 Stakeholders and Concerns<br/>Development Approach<br/>Software Modularity and Re-Use<br/>Portability<br/>Migration and Interoperability<br/>35.7.3.2 Key Issues<br/>Data-Intensive versus Information-Intensive Software Systems<br/>Achieving Interoperability<br/>Software Tiers<br/>Two-Tier<br/>Three-Tier<br/>Five-Tier<br/>Some Uses of a Data Access Tier<br/>One Possible Instantiation of a DAI<br/>DAIs Enable Flexibility<br/>Distribution<br/>Infrastructure Bus<br/>35.7.3.3 Conclusion<br/>35.7.4 Developing a System Engineering View<br/>35.7.4.1 Stakeholders and Concerns<br/>35.7.4.2 Key Issues<br/>Client/Server Model<br/>Master/Slave and Hierarchic Models<br/>Peer-to-Peer Model<br/>Distributed Object Management Model<br/>35.7.5 Developing a Communications Engineering View<br/>35.7.5.1 Stakeholders and Concerns<br/>35.7.5.2 Key Issues<br/>Communications Infrastructure<br/>Communications Models<br/>The OSI Reference Model<br/>Communications Framework<br/>Allocation of Services to Components<br/>35.7.6 Developing a Data Flow View<br/>35.7.6.1 Stakeholders and Concerns<br/>35.7.6.2 Developing the View<br/>35.7.6.3 Key Issues<br/>Database Management Systems<br/>Database Models<br/>Distributed DBMSs<br/>Distributed Heterogeneous DBMSs<br/>Data Dictionary/Directory Systems<br/>Data Administration<br/>Repository<br/>Database Administration<br/>Data Security<br/>35.7.7 Developing an Enterprise Manageability View<br/>35.7.7.1 Stakeholders and Concerns<br/>35.7.7.2 Developing the View<br/>35.7.7.3 Key Issues<br/>35.7.8 Developing an Acquirer View<br/>35.7.8.1 Stakeholders and Concerns<br/>35.7.8.2 Developing the View<br/>35.7.8.3 Key Issues<br/>Footnotes<br/>36. Architecture Deliverables<br/>36.1 Introduction<br/>36.2 Deliverable Descriptions<br/>36.2.1 Architecture Building Blocks<br/>36.2.2 Architecture Contract<br/>Purpose<br/>Content<br/>36.2.3 Architecture Definition Document<br/>Purpose<br/>Content<br/>36.2.4 Architecture Principles<br/>Purpose<br/>Content<br/>36.2.5 Architecture Repository<br/>Purpose<br/>Content<br/>36.2.6 Architecture Requirements Specification<br/>Purpose<br/>Content<br/>36.2.7 Architecture Roadmap<br/>Purpose<br/>Content<br/>36.2.8 Architecture Vision<br/>Purpose<br/>Content<br/>36.2.9 Business Principles, Business Goals, and Business Drivers<br/>Purpose<br/>Content<br/>36.2.10 Capability Assessment<br/>Purpose<br/>Content<br/>36.2.11 Change Request<br/>Purpose<br/>Content<br/>36.2.12 Communications Plan<br/>Purpose<br/>Content<br/>36.2.13 Compliance Assessment<br/>Purpose<br/>Content<br/>36.2.14 Implementation and Migration Plan<br/>Purpose<br/>Content<br/>36.2.15 Implementation Governance Model<br/>Purpose<br/>Content<br/>36.2.16 Organizational Model for Enterprise Architecture<br/>Purpose<br/>Content<br/>36.2.17 Request for Architecture Work<br/>Purpose<br/>Content<br/>36.2.18 Requirements Impact Assessment<br/>Purpose<br/>Content<br/>36.2.19 Solution Building Blocks<br/>36.2.20 Statement of Architecture Work<br/>Purpose<br/>Content<br/>36.2.21 Tailored Architecture Framework<br/>Purpose<br/>Content<br/>37. Building Blocks<br/>37.1 Overview<br/>37.2 Introduction to Building Blocks<br/>37.2.1 Overview<br/>37.2.2 Generic Characteristics<br/>37.2.3 Architecture Building Blocks<br/>37.2.3.1 Characteristics<br/>37.2.3.2 Specification Content<br/>37.2.4 Solution Building Blocks<br/>37.2.4.1 Characteristics<br/>37.2.4.2 Specification Content<br/>37.3 Building Blocks and the ADM<br/>37.3.1 Basic Principles<br/>37.3.1.1 Building Blocks in Architecture Design<br/>37.3.1.2 Building Block Design<br/>37.3.2 Building Block Specification Process in the ADM<br/>Footnotes<br/>38. Introduction<br/>38.1 Introduction<br/>38.2 Structure of Part V<br/>39. Enterprise Continuum<br/>39.1 Overview<br/>39.2 Enterprise Continuum and Architecture Re-Use<br/>39.3 Constituents of the Enterprise Continuum<br/>39.4 Enterprise Continuum in Detail<br/>39.4.1 Architecture Continuum<br/>Foundation Architecture<br/>Common Systems Architectures<br/>Industry Architectures<br/>Organization-Specific Architectures<br/>39.4.2 Solutions Continuum<br/>Foundation Solutions<br/>Common Systems Solutions<br/>Industry Solutions<br/>Organization-Specific Solutions<br/>39.5 The Enterprise Continuum and the ADM<br/>39.6 The Enterprise Continuum and Your Organization<br/>39.6.1 Relationships<br/>39.6.2 Your Enterprise<br/>40. Architecture Partitioning<br/>40.1 Overview<br/>40.2 Applying Classification to Create Partitioned Architectures<br/>40.2.1 Activities within the Preliminary Phase<br/>40.3 Integration<br/>41. Architecture Repository<br/>41.1 Overview<br/>41.2 Architecture Landscape<br/>41.3 Reference Library<br/>41.3.1 Overview<br/>41.4 Standards Information Base<br/>41.4.1 Overview<br/>41.4.2 Types of Standard<br/>41.4.3 Standards Lifecycle<br/>41.4.4 Standards Classification within the Standards Information Base<br/>41.5 Governance Log<br/>41.5.1 Overview<br/>41.5.2 Contents of the Governance Log<br/>41.6 The Enterprise Repository<br/>41.6.1 Requirements Repository<br/>41.6.2 Solutions Repository<br/>41.7 External Repositories<br/>41.7.1 External Reference Models<br/>41.7.2 External Standards<br/>41.7.3 Architecture Board Approvals<br/>42. Tools for Architecture Development<br/>42.1 Overview<br/>42.2 Issues in Tool Standardization<br/>43. Foundation Architecture: Technical Reference Model<br/>43.1 Concepts<br/>43.1.1 Role of the TRM in the Foundation Architecture<br/>43.1.2 TRM Components<br/>43.1.3 Other TRMs<br/>43.2 High-Level Breakdown<br/>43.2.1 Overview<br/>43.2.2 Portability and Interoperability<br/>43.3 TRM in Detail<br/>43.3.1 Introduction<br/>43.3.2 TRM Entities and Interfaces<br/>43.3.3 Application Software<br/>43.3.3.1 Business Applications<br/>43.3.3.2 Infrastructure Applications<br/>43.3.4 Application Platform<br/>43.3.4.1 Platform Concept<br/>43.3.4.2 Extending the TRM<br/>43.3.4.3 Interfaces Between Services<br/>43.3.4.4 Future Developments<br/>43.3.5 Communications Infrastructure<br/>43.3.6 Application Platform Interface<br/>43.3.7 Communications Infrastructure Interface<br/>43.3.8 Qualities<br/>43.4 Application Platform - Taxonomy<br/>43.4.1 Basic Principles<br/>43.4.2 Application Platform Service Categories<br/>43.4.2.1 Object-Oriented Provision of Services<br/>43.4.3 Application Platform Service Qualities<br/>43.4.3.1 Principles<br/>43.4.3.2 Taxonomy of Service Qualities<br/>43.5 Detailed Platform Taxonomy<br/>43.5.1 Data Interchange Services<br/>43.5.2 Data Management Services<br/>43.5.3 Graphics and Imaging Services<br/>43.5.4 International Operation Services<br/>43.5.5 Location and Directory Services<br/>43.5.6 Network Services<br/>43.5.7 Operating System Services<br/>43.5.8 Software Engineering Services<br/>43.5.9 Transaction Processing Services<br/>43.5.10 User Interface Services<br/>43.5.11 Security Services<br/>43.5.12 System and Network Management Services<br/>43.5.13 Object-Oriented Provision of Services<br/>44. Integrated Information Infrastructure Reference Model<br/>44.1 Basic Concepts<br/>44.1.1 Background<br/>44.1.2 Components of the Model<br/>44.1.3 Relationship to Other parts of TOGAF<br/>44.1.4 Key Business and Technical Drivers<br/>44.1.4.1 Problem Space: The Need for Boundaryless Information Flow<br/>44.1.4.2 Solution Space: The Need for Integrated Information Infrastructure<br/>44.1.5 Status of the III-RM<br/>44.2 High-Level View<br/>44.2.1 Derivation of the III-RM from the TRM<br/>44.2.2 High-Level III-RM Graphic<br/>44.2.3 Components of the High-Level III-RM<br/>44.3 Detailed Taxonomy<br/>44.3.1 Detailed III-RM Graphic<br/>44.3.2 Business Applications<br/>44.3.2.1 Information Provider Applications<br/>44.3.2.2 Brokerage Applications<br/>44.3.2.3 Information Consumer Applications<br/>44.3.3 Infrastructure Applications<br/>44.3.3.1 Development Tools<br/>Business Modeling Tools<br/>Design Modeling Tools<br/>Implementation and Construction Tools<br/>Data Modeling Tools<br/>Deployment Tools<br/>Libraries<br/>44.3.3.2 Management Utilities<br/>Operations, Administration, and Management (OA&M) Utilities<br/>Quality of Service Manager Utilities<br/>Copy Management Utilities<br/>Storage Management Utilities<br/>44.3.4 Application Platform<br/>44.3.4.1 Software Engineering Services<br/>44.3.4.2 Security Services<br/>44.3.4.3 Location and Directory Services<br/>44.3.4.4 Human Interaction Services<br/>44.3.4.5 Data Interchange Services<br/>44.3.4.6 Data Management Services<br/>44.3.4.7 Additional Operating System Services<br/>44.3.5 Qualities<br/>Footnotes<br/>45. Introduction<br/>45.1 Overview<br/>45.2 Structure of Part VII<br/>46. Establishing an Architecture Capability<br/>46.1 Overview<br/>46.2 Phase A: Architecture Vision<br/>46.3 Phase B: Business Architecture<br/>46.4 Phase C: Data Architecture<br/>46.5 Phase C: Application Architecture<br/>46.6 Phase D: Technology Architecture<br/>46.7 Phase E: Opportunities & Solutions<br/>46.8 Phase F: Migration Planning<br/>46.9 Phase G: Implementation Governance<br/>46.10 Phase H: Architecture Change Management<br/>46.11 Requirements Management<br/>47. Architecture Board<br/>47.1 Role<br/>47.2 Responsibilities<br/>47.3 Setting Up the Architecture Board<br/>47.3.1 Triggers<br/>47.3.2 Size of the Board<br/>47.3.3 Board Structure<br/>47.4 Operation of the Architecture Board<br/>47.4.1 General<br/>47.4.2 Preparation<br/>47.4.3 Agenda<br/>Minutes of Previous Meeting<br/>Requests for Change<br/>Dispensations<br/>Compliance Assessments<br/>Dispute Resolution<br/>Architecture Strategy and Direction Documentation<br/>Actions Assigned<br/>Contract Documentation Management<br/>Any Other Business (AOB)<br/>Schedule of Meetings<br/>48. Architecture Compliance<br/>48.1 Introduction<br/>48.2 Terminology: The Meaning of Architecture Compliance<br/>48.3 Architecture Compliance Reviews<br/>48.3.1 Purpose<br/>48.3.2 Timing<br/>48.3.3 Governance and Personnel Scenarios<br/>48.4 Architecture Compliance Review Process<br/>48.4.1 Overview<br/>48.4.2 Roles<br/>48.4.3 Steps<br/>48.5 Architecture Compliance Review Checklists<br/>48.5.1 Hardware and Operating System Checklist<br/>48.5.2 Software Services and Middleware Checklist<br/>48.5.3 Applications Checklists<br/>48.5.3.1 Infrastructure (Enterprise Productivity) Applications<br/>48.5.3.2 Business Applications<br/>48.5.3.3 Application Integration Approach<br/>48.5.4 Information Management Checklists<br/>48.5.4.1 Data Values<br/>48.5.4.2 Data Definition<br/>48.5.4.3 Security/Protection<br/>48.5.4.4 Hosting, Data Types, and Sharing<br/>48.5.4.5 Common Services<br/>48.5.4.6 Access Method<br/>48.5.5 Security Checklist<br/>48.5.6 System Management Checklist<br/>48.5.7 System Engineering/Overall Architecture Checklists<br/>48.5.7.1 General<br/>48.5.7.2 Processors/Servers/Clients<br/>48.5.7.3 Client<br/>48.5.7.4 Application Server<br/>48.5.7.5 Data Server<br/>48.5.7.6 COTS (where applicable)<br/>48.5.8 System Engineering/Methods & Tools Checklist<br/>48.6 Architecture Compliance Review Guidelines<br/>48.6.1 Tailoring the Checklists<br/>48.6.2 Conducting Architecture Compliance Reviews<br/>49. Architecture Contracts<br/>49.1 Role<br/>49.2 Contents<br/>49.2.1 Statement of Architecture Work<br/>49.2.2 Contract between Architecture Design and Development Partners<br/>49.2.3 Contract between Architecting Function and Business Users<br/>49.3 Relationship to Architecture Governance<br/>50. Architecture Governance<br/>50.1 Introduction<br/>50.1.1 Levels of Governance within the Enterprise<br/>50.1.2 Nature of Governance<br/>50.1.2.1 Governance: A Generic Perspective<br/>50.1.2.2 Characteristics of Governance<br/>50.1.3 Technology Governance<br/>50.1.4 IT Governance<br/>50.1.4.1 An IT Controls Framework - COBIT<br/>50.1.5 Architecture Governance: Overview<br/>50.1.5.1 Architecture Governance Characteristics<br/>50.1.5.2 Architecture Governance as a Board-Level Responsibility<br/>50.1.5.3 TOGAF and Architecture Governance<br/>50.2 Architecture Governance Framework<br/>50.2.1 Architecture Governance Framework - Conceptual Structure<br/>50.2.1.1 Key Concepts<br/>50.2.1.2 Key Architecture Governance Processes<br/>Policy Management and Take-On<br/>Compliance<br/>Dispensation<br/>Monitoring and Reporting<br/>Business Control<br/>Environment Management<br/>50.2.2 Architecture Governance Framework - Organizational Structure<br/>50.2.2.1 Overview<br/>50.2.2.2 Key Areas<br/>50.2.2.3 Operational Benefits<br/>50.3 Architecture Governance in Practice<br/>50.3.1 Architecture Governance - Key Success Factors<br/>50.3.2 Elements of an Effective Architecture Governance Strategy<br/>50.3.2.1 Architecture Governance and Corporate Politics<br/>Footnotes<br/>51. Architecture Maturity Models<br/>51.1 Overview<br/>51.2 Background<br/>51.3 US DoC ACMM Framework<br/>51.3.1 Overview<br/>51.3.2 Elements of the ACMM<br/>51.3.3 Example: Enterprise Architecture Process Maturity Levels<br/>Level 0: None<br/>Level 1: Initial<br/>Level 2: Under Development<br/>Level 3: Defined<br/>Level 4: Managed<br/>Level 5: Optimizing<br/>51.4 Capability Maturity Models Integration (CMMI)<br/>51.4.1 Introduction<br/>51.4.2 SCAMPI Method<br/>51.5 Conclusions<br/>Footnotes<br/>52. Architecture Skills Framework<br/>52.1 Introduction<br/>52.2 Need for an Enterprise Architecture Skills Framework<br/>52.2.1 Definitional Rigor<br/>52.2.2 Basis of an Internal Architecture Practice<br/>52.3 Goals/Rationale<br/>52.3.1 Certification of Enterprise Architects<br/>52.3.2 Specific Benefits<br/>52.4 Enterprise Architecture Role and Skill Categories<br/>52.4.1 Overview<br/>52.4.2 TOGAF Roles<br/>52.4.3 Categories of Skills<br/>52.4.4 Proficiency Levels<br/>52.5 Enterprise Architecture Role and Skill Definitions<br/>52.5.1 Generic Skills<br/>52.5.2 Business Skills & Methods<br/>52.5.3 Enterprise Architecture Skills<br/>52.5.4 Program or Project Management Skills<br/>52.5.5 IT General Knowledge Skills<br/>52.5.6 Technical IT Skills<br/>52.5.7 Legal Environment<br/>52.6 Generic Role and Skills of the Enterprise Architect<br/>52.6.1 Generic Role<br/>52.6.2 Characterization in Terms of the Enterprise Continuum<br/>52.6.3 Key Characteristics of an Enterprise Architect<br/>52.6.3.1 Skills and Experience in Producing Designs<br/>52.6.3.2 Extensive Technical Breadth, with Technical Depth in One or a Few Disciplines<br/>52.6.3.3 Method-Driven Approach to Execution<br/>52.6.3.4 Full Project Scope Experience<br/>52.6.3.5 Leadership<br/>52.6.3.6 Personal and Professional Skills<br/>52.6.3.7 Skills and Experience in One or More Industries<br/>52.7 Conclusions<br/>A. Glossary of Supplementary Definitions<br/>A.1 Access Control (AC)<br/>A.2 Ada<br/>A.3 Application Component<br/>A.4 Application Software<br/>A.5 Availability<br/>A.6 Batch Processing<br/>A.7 Business System<br/>A.8 Catalog<br/>A.9 Client<br/>A.10 COBIT<br/>A.11 Communications Network<br/>A.12 Communications Node<br/>A.13 Communications System<br/>A.14 Composite Application<br/>A.15 Configuration Management<br/>A.16 Connectivity Service<br/>A.17 Contract<br/>A.18 Control<br/>A.19 CxO<br/>A.20 Data Dictionary<br/>A.21 Data Element<br/>A.22 Data Entity<br/>A.23 Data Interchange Service<br/>A.24 Data Management Service<br/>A.25 Database<br/>A.26 Database Management System<br/>A.27 Directory Service<br/>A.28 Distributed Database<br/>A.29 Driver<br/>A.30 End User<br/>A.31 Enterprise Resource Planning (ERP) System<br/>A.32 Event<br/>A.33 External Environment Interface (EEI)<br/>A.34 FORTRAN<br/>A.35 Functional Decomposition<br/>A.36 Goal<br/>A.37 Guideline<br/>A.38 Hardware<br/>A.39 Human Computer Interface (HCI)<br/>A.40 Information Domain<br/>A.41 Information System (IS)<br/>A.42 Information System Service<br/>A.43 Interaction<br/>A.44 Interaction Model<br/>A.45 Interface<br/>A.46 ITIL<br/>A.47 Key Performance Indicator (KPI)<br/>A.48 Lifecycle<br/>A.49 Location<br/>A.50 Logical Application Component<br/>A.51 Logical Data Component<br/>A.52 Logical Technology Component<br/>A.53 Managing Successful Programs (MSP)<br/>A.54 Matrix<br/>A.55 Measure<br/>A.56 Metaview<br/>A.57 Multimedia Service<br/>A.58 Open Specifications<br/>A.59 Open System<br/>A.60 Operational Governance<br/>A.61 Operating System Service<br/>A.62 Packaged Services<br/>A.63 Physical Application Component<br/>A.64 Physical Data Component<br/>A.65 Physical Technology Component<br/>A.66 Portability<br/>A.67 Portfolio<br/>A.68 PRINCE2<br/>A.69 Process<br/>A.70 Product<br/>A.71 Profile<br/>A.72 Profiling<br/>A.73 Program<br/>A.74 Project<br/>A.75 Risk Management<br/>A.76 Scalability<br/>A.77 Security<br/>A.78 Server<br/>A.79 Service<br/>A.80 Service Quality<br/>A.81 SMART<br/>A.82 Supplier Management<br/>A.83 System<br/>A.84 System and Network Management Service<br/>A.85 System Stakeholder<br/>A.86 Technology Component<br/>A.87 Time Period<br/>A.88 Transaction<br/>A.89 Transaction Sequence<br/>A.90 Use-Case<br/>A.91 User<br/>A.92 User Interface Service<br/>B. Abbreviations<br/>INDEX
520 ## - RESUMEN, ETC.
Nota de sumario, etc. TOGAF es un marco - un método detallado y un conjunto de herramientas de apoyo - para el desarrollo de una arquitectura empresarial, desarrollado por los miembros de El Foro Open Group Architecture. TOGAF Versión 9.1 es una actualización de mantenimiento de TOGAF 9, dirigiéndose a los comentarios planteados desde la introducción de TOGAF 9 en 2009. Conserva las características principales y la estructura de TOGAF 9, preservando así la inversión existente en TOGAF, y agrega más detalle y aclaración a lo que es ya probado. Puede ser utilizado libremente por cualquier organización que desee desarrollar una arquitectura de la empresa para su uso dentro de esa organización (sujeto a las Condiciones de Uso). Este libro se divide en siete partes.
650 #0 - ASIENTO SECUNDARIO DE MATERIA--TÉRMINO DE MATERIA
Nombre de materia o nombre geográfico como elemento de entrada TOGAF
9 (RLIN) 23703
650 #0 - ASIENTO SECUNDARIO DE MATERIA--TÉRMINO DE MATERIA
Nombre de materia o nombre geográfico como elemento de entrada SOFTWARE DE CODIGO ABIERTO
9 (RLIN) 11137
650 #0 - ASIENTO SECUNDARIO DE MATERIA--TÉRMINO DE MATERIA
9 (RLIN) 4687
Nombre de materia o nombre geográfico como elemento de entrada ARQUITECTURA DE COMPUTADORES
942 ## - ELEMENTOS KOHA
Fuente de clasificación o esquema de ordenación en estanterías
Koha tipo de item LIBRO - MATERIAL GENERAL
Existencias
Disponibilidad Mostrar en OPAC Fuente de clasificación o esquema Tipo de Descarte Estado Código de colección Localización permanente Localización actual Localización en estanterías Fecha adquisición Proveedor Forma de Adq Precio normal de compra Datos del ítem (Volumen, Tomo) Número de Inventario Préstamos totales Signatura completa Código de barras Fecha última consulta Fecha último préstamo Número de ejemplar Coste, precio de reemplazo Propiedades de Préstamo KOHA Programa Académico Renovaciones totales
        Préstamo Normal Colección General Biblioteca Jorge Álvarez Lleras Biblioteca Jorge Álvarez Lleras Fondo general 2016-02-17 Amazon-444444001-OC21388 Compra 284488.00 Ej. 2 BIB0001746 3 004.22 T374t 024755 2023-05-11 2023-02-13 2 292500.00 LIBRO - MATERIAL GENERAL Maestría en Gestión de la Información  
        Préstamo Normal Colección General Biblioteca Jorge Álvarez Lleras Biblioteca Jorge Álvarez Lleras Fondo general 2016-02-17 Amazon-444444001-OC21388 Compra 284488.00 Ej. 1 BIB0001892 3 004.22 T374t 024754 2017-09-30 2017-09-23 1 292500.00 LIBRO - MATERIAL GENERAL Maestría en Gestión de la Información 2