当前位置:网站首页>16 enterprise architecture strategies
16 enterprise architecture strategies
2022-06-25 10:58:00 【InfoQ】
- A detailed enterprise level blueprint is almost impossible to establish —— It's too big , No one will buy it
- The best strategy combines a directional enterprise blueprint with the blueprint of business units and fields
- EA Centralized accountability of functions is a predictor of success
- A centralized team of architects is essential to drive EA Standards and methods are essential
- The architect must be a member of the core team ( Occupy EA FTE The sum of 60% above ) instead of “ adviser ” Assigned to project
- EA Should be measured in two ways : The cost of delivering business capabilities and core services
- take EA Measured as an asset —— What is the cost of providing services , What return does the enterprise get from the delivered business capability ?
- Architecture leadership requires strong management 、 Business operation and technical skills , Most likely 3 Two different types of people ; Don't expect your lead architect to run EA function
- Methods and governance must be integrated into existing workflows ( for example , Project approval 、 SDLC( notes 2)), Instead of a new overlay
- Enterprise architecture is not always the best name for communication ; Maybe strategy and planning or enterprise transformation is better
- The best big companies have “ Business structure ” The team ( Or to the business and IT Double reporting )
- The leading companies are 90% A reference architecture has been developed for the technical field of
- Your senior enterprise architect must have the right cultural skills and awareness , To integrate well with upstream business partners and downstream technology users
- High performance teams are SDLC Consistent in 、 ceremonial EA Participate in , To translate the blueprint into a sufficiently detailed starting architecture and accurate cost and resource estimates for each project
- Mature organizations will 40% Of EA Resource time for strategic planning , take 60% Time for SDLC Mission , It is often a mistake to spend more time SDLC On mission
- Business and IT The strong reputation and trust among partners is EA Predictors of success . Credibility is usually gained through joint strategic planning efforts , One project at a time .
边栏推荐
- 单片机开发---基于ESP32-CAM的人脸识别应用
- Flask blog practice - archiving and labeling of sidebar articles
- FPGA基于VGA显示字符及图片
- Network protocol learning -- lldp protocol learning
- Daily Mathematics Series 52: February 20
- 手机办理广州证券开户靠谱安全吗?
- 【论文阅读|深读】DRNE:Deep Recursive Network Embedding with Regular Equivalence
- Macro application connector\
- 报名开启|飞桨黑客马拉松第三期如约而至,久等啦
- Remove the problem of orange border on the desktop control in WebView
猜你喜欢
The real difference between i++ and ++i
Dell technology performs the "fast" formula and plays ci/cd
视频会议一体机的技术实践和发展趋势
【RPC】I/O模型——BIO、NIO、AIO及NIO的Rector模式
[paper reading | depth] role based network embedding via structural features reconstruction with degree regulated
【论文阅读|深读】DRNE:Deep Recursive Network Embedding with Regular Equivalence
[file inclusion vulnerability-04] classic interview question: how to getshell when a website is known to have only local file inclusion vulnerability?
How to install SSL certificates in Microsoft Exchange 2010
NETCORE performance troubleshooting
ES 学习
随机推荐
Handling of NPM I installation problems
Google Earth engine (GEE) - evaluate enables one click batch download of all single images in the research area (some areas in Shanghai)
[paper reading | depth] role based network embedding via structural features reconstruction with degree regulated
Es learning
[file containing vulnerability-03] six ways to exploit file containing vulnerabilities
宏的运用接续符\
Dell technology performs the "fast" formula and plays ci/cd
新学派:不诈骗经济学
Is it safe to open a stock account on the compass?
NuxtJS实战案例
2022-06-24:golang选择题,以下golang代码输出什么?A:1;B:3;C:4;D:编译失败。 package main import ( “fmt“ ) func mai
指南针在上面开股票账户安全吗?
CDN+COS搭建图床超详细步骤
Performance memory
[the path of system analyst] Chapter 6: Double inventory demand engineering (comprehensive knowledge concept)
【文件包含漏洞-03】文件包含漏洞的六种利用方式
報名開啟|飛槳黑客馬拉松第三期如約而至,久等啦
Binder explanation of Android interview notes
Five types of questions about network planning
单片机开发---基于ESP32-CAM的人脸识别应用