return to top of pagea.10
- A. Glossary of Supplementary Definitions
a.11
- A. Glossary of Supplementary Definitions
a.12
- A. Glossary of Supplementary Definitions
a.13
- A. Glossary of Supplementary Definitions
a.14
- A. Glossary of Supplementary Definitions
a.1
- A. Glossary of Supplementary Definitions
a.15
- A. Glossary of Supplementary Definitions
a.16
- A. Glossary of Supplementary Definitions
a.17
- A. Glossary of Supplementary Definitions
a.18
- A. Glossary of Supplementary Definitions
a.19
- A. Glossary of Supplementary Definitions
a.20
- A. Glossary of Supplementary Definitions
a.21
- A. Glossary of Supplementary Definitions
a.22
- A. Glossary of Supplementary Definitions
a.23
- A. Glossary of Supplementary Definitions
a.24
- A. Glossary of Supplementary Definitions
a.2
- A. Glossary of Supplementary Definitions
a.25
- A. Glossary of Supplementary Definitions
a.26
- A. Glossary of Supplementary Definitions
a.27
- A. Glossary of Supplementary Definitions
a.28
- A. Glossary of Supplementary Definitions
a.29
- A. Glossary of Supplementary Definitions
a.30
- A. Glossary of Supplementary Definitions
a.31
- A. Glossary of Supplementary Definitions
a.32
- A. Glossary of Supplementary Definitions
a.33
- A. Glossary of Supplementary Definitions
a.34
- A. Glossary of Supplementary Definitions
a.3
- A. Glossary of Supplementary Definitions
a.35
- A. Glossary of Supplementary Definitions
a.36
- A. Glossary of Supplementary Definitions
a.37
- A. Glossary of Supplementary Definitions
a.38
- A. Glossary of Supplementary Definitions
a.39
- A. Glossary of Supplementary Definitions
a.40
- A. Glossary of Supplementary Definitions
a.41
- A. Glossary of Supplementary Definitions
a.42
- A. Glossary of Supplementary Definitions
a.43
- A. Glossary of Supplementary Definitions
a.44
- A. Glossary of Supplementary Definitions
a.4
- A. Glossary of Supplementary Definitions
a.45
- A. Glossary of Supplementary Definitions
a.46
- A. Glossary of Supplementary Definitions
a.47
- A. Glossary of Supplementary Definitions
a.48
- A. Glossary of Supplementary Definitions
a.49
- A. Glossary of Supplementary Definitions
a.50
- A. Glossary of Supplementary Definitions
a.51
- A. Glossary of Supplementary Definitions
a.52
- A. Glossary of Supplementary Definitions
a.53
- A. Glossary of Supplementary Definitions
a.54
- A. Glossary of Supplementary Definitions
a.5
- A. Glossary of Supplementary Definitions
a.55
- A. Glossary of Supplementary Definitions
a.56
- A. Glossary of Supplementary Definitions
a.57
- A. Glossary of Supplementary Definitions
a.58
- A. Glossary of Supplementary Definitions
a.59
- A. Glossary of Supplementary Definitions
A5 interoperability
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
a.60
- A. Glossary of Supplementary Definitions
a.61
- A. Glossary of Supplementary Definitions
a.62
- A. Glossary of Supplementary Definitions
a.63
- A. Glossary of Supplementary Definitions
a.64
- A. Glossary of Supplementary Definitions
a.6
- A. Glossary of Supplementary Definitions
a.65
- A. Glossary of Supplementary Definitions
a.66
- A. Glossary of Supplementary Definitions
a.67
- A. Glossary of Supplementary Definitions
a.68
- A. Glossary of Supplementary Definitions
a.69
- A. Glossary of Supplementary Definitions
a.70
- A. Glossary of Supplementary Definitions
a.71
- A. Glossary of Supplementary Definitions
a.72
- A. Glossary of Supplementary Definitions
a.73
- A. Glossary of Supplementary Definitions
a.74
- A. Glossary of Supplementary Definitions
a.7
- A. Glossary of Supplementary Definitions
a.75
- A. Glossary of Supplementary Definitions
a.76
- A. Glossary of Supplementary Definitions
a.77
- A. Glossary of Supplementary Definitions
a.78
- A. Glossary of Supplementary Definitions
a.79
- A. Glossary of Supplementary Definitions
a.80
- A. Glossary of Supplementary Definitions
a.81
- A. Glossary of Supplementary Definitions
a.82
- A. Glossary of Supplementary Definitions
a.83
- A. Glossary of Supplementary Definitions
a.84
- A. Glossary of Supplementary Definitions
a.8
- A. Glossary of Supplementary Definitions
a.85
- A. Glossary of Supplementary Definitions
a.86
- A. Glossary of Supplementary Definitions
a.87
- A. Glossary of Supplementary Definitions
a.88
- A. Glossary of Supplementary Definitions
a.89
- A. Glossary of Supplementary Definitions
a.90
- A. Glossary of Supplementary Definitions
a.91
- A. Glossary of Supplementary Definitions
a.92
- A. Glossary of Supplementary Definitions
a.93
- A. Glossary of Supplementary Definitions
a.9
- A. Glossary of Supplementary Definitions
ABB
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.1 Overview
- 37.2 Introduction to Building Blocks
abbreviations
about
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- Frontmatter
absolute
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
absolute protection
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
abstraction
- 3. Definitions
AC
- A. Glossary of Supplementary Definitions
acceptable
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
acceptance
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
access
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
- A. Glossary of Supplementary Definitions
access control
- A. Glossary of Supplementary Definitions
access transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
accuracy
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 40. Architecture Partitioning
achieve
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
achieving
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
acknowledgements
- Frontmatter
ACL
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
ACMM
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
acquirer
- 35. Architectural Artifacts
Acquirer view
- 35. Architectural Artifacts
across
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
actions
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
actions/events
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
activate
- 16. Phase H: Architecture Change Management
Active Standard
- 41. Architecture Repository
- 41.4 Standards Information Base
Active Store
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
activities
- 7. Phase A: Architecture Vision
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
activity
- 3. Definitions
activity model
- 8. Phase B: Business Architecture
- 8.2 Approach
actor
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
Actor/Role
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Actor/Role matrix
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
actors
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
Ada
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
- A. Glossary of Supplementary Definitions
adapting
- 5. Introduction
- 18. Introduction
additional
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
address
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
addressing
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
adherence
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
ADM
- 1. Introduction
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 5. Introduction
ADM guidelines and techniques
- 1. Introduction
- 5. Introduction
- 5.1 ADM Overview
- 18. Introduction
administration
- 21. Security Architecture and the ADM
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
ADM iteration
ADM, requirements management
adopting
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
agenda
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
aggregation
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
align
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
alignment
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
all
- 21. Security Architecture and the ADM
allocation
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
amp
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
analysis
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
analyze
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.9 Identify and Group Major Work Packages
analyzing
- 26. Business Scenarios
- 26.3 Creating the Business Scenario
and/or
- 21. Security Architecture and the ADM
ANSI X.12
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
anticipated
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
any
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
AOB
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
API
- 3. Definitions
applicable
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
application
- 3. Definitions
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 11.4.2 Develop Baseline Application Architecture Description
- 11.4.3 Develop Target Application Architecture Description
- 11.4.8 Finalize the Application Architecture
Application and User Location diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
Application Architecture
- 2. Core Concepts
- 3. Definitions
- 11. Phase C: Information Systems Architectures - Application Architecture
application building blocks
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
Application Communication diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
application component
- 22. Using TOGAF to Define & Govern SOAs
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- A. Glossary of Supplementary Definitions
Application Interaction matrix
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
application logic
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
Application Migration diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
Application Platform
- 3. Definitions
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
- 44.3 Detailed Taxonomy
application platform interface
- 3. Definitions
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
Application Platform, service qualities
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
Application Platform, taxonomy
- 43. Foundation Architecture: Technical Reference Model
application portability
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
Application Portfolio catalog
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
application principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
applications
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
application services
- 22. Using TOGAF to Define & Govern SOAs
Application Software
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
- A. Glossary of Supplementary Definitions
Applications Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
applying
- 19. Applying Iteration to the ADM
- 20. Applying the ADM at Different Enterprise Levels
- 23. Architecture Principles
- 40. Architecture Partitioning
applying the ADM
approach
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 13.2 Approach
- 13.4 Steps
- 13.4.8 Formulate High-Level Implementation and Migration Strategy
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 24. Stakeholder Management
- 24.2 Approach to Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.3 Applications Checklists
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
approaches
- 20. Applying the ADM at Different Enterprise Levels
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
appropriate
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.10 Phase E: Opportunities & Solutions
approval
- 7. Phase A: Architecture Vision
architect
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
architecting
- 49. Architecture Contracts
architects
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
architectural
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 6. Preliminary Phase
- 6.3 Inputs
- 7. Phase A: Architecture Vision
- 7.3 Inputs
- 8. Phase B: Business Architecture
- 8.3 Inputs
- 9. Phase C: Information Systems Architectures
- 9.3 Inputs
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.3 Inputs
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.3 Inputs
- 12. Phase D: Technology Architecture
- 12.3 Inputs
- 13. Phase E: Opportunities & Solutions
- 13.3 Inputs
- 14. Phase F: Migration Planning
- 14.3 Inputs
- 15. Phase G: Implementation Governance
- 15.3 Inputs
- 16. Phase H: Architecture Change Management
- 16.3 Inputs
- 35. Architectural Artifacts
architectural artifact
architectural artifact, concepts
- 35. Architectural Artifacts
architectural style
- 3. Definitions
architecture
- 1. Introduction
- 2. Core Concepts
- 2.2 What is Architecture in the Context of TOGAF?
- 2.3 What Kind of Architecture Does TOGAF Deal With?
- 2.4 Architecture Development Method
- 2.7 Architecture Repository
- 2.8 Establishing and Maintaining an Enterprise Architecture Capability
- 2.9 Establishing the Architecture Capability as an Operational Entity
- 3. Definitions
- 3.5 Application Architecture
- 3.9 Architecture
- 3.10 Architecture Building Block (ABB)
- 3.11 Architecture Continuum
- 3.12 Architecture Development Method (ADM)
- 3.13 Architecture Domain
- 3.14 Architecture Framework
- 3.15 Architecture Governance
- 3.16 Architecture Landscape
- 3.17 Architecture Principles
- 3.18 Architecture View
- 3.19 Architecture Vision
- 3.22 Baseline Architecture
- 3.25 Business Architecture
- 3.31 Capability Architecture
- 3.36 Data Architecture
- 3.42 Foundation Architecture
- 3.72 Segment Architecture
- 3.75 Service Oriented Architecture (SOA)
- 3.77 Solution Architecture
- 3.82 Strategic Architecture
- 3.83 Target Architecture
- 3.84 Taxonomy of Architecture Views
- 3.86 Technology Architecture
- 3.87 Transition Architecture
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 5.1 ADM Overview
- 5.2 Architecture Development Cycle
- 5.4 Architecture Governance
- 5.5 Scoping the Architecture
Architecture Board
- 5. Introduction
- 47. Architecture Board
architecture building block
- 3. Definitions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
Architecture/Business
- 6. Preliminary Phase
Architecture Capability
- 2. Core Concepts
- 41. Architecture Repository
- 46. Establishing an Architecture Capability
Architecture Capability Framework
- 1. Introduction
- 45. Introduction
architecture change management
architecture characteristics
- 40. Architecture Partitioning
Architecture Compliance
- 48. Architecture Compliance
Architecture Compliance, checklists
- 48. Architecture Compliance
Architecture Compliance, guidelines
- 48. Architecture Compliance
Architecture Compliance, review
- 48. Architecture Compliance
Architecture Compliance, review process
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
Architecture Content Framework
- 1. Introduction
- 33. Introduction
Architecture Context
- 19. Applying Iteration to the ADM
Architecture Continuum
- 2. Core Concepts
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
Architecture Contract
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 49. Architecture Contracts
architecture, definition
- 2. Core Concepts
Architecture Definition
- 19. Applying Iteration to the ADM
Architecture Definition Document
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
architecture deliverables
architecture description
- 35. Architectural Artifacts
architecture development
Architecture Development Method
- 1. Introduction
- 3. Definitions
- 5. Introduction
architecture development, techniques
- 18. Introduction
architecture domain
- 3. Definitions
- 5. Introduction
- 5.5 Scoping the Architecture
architecture domains, security
- 21. Security Architecture and the ADM
architecture engagement
- 20. Applying the ADM at Different Enterprise Levels
Architecture Forum
Architecture Framework
- 3. Definitions
architecture governance
- 3. Definitions
- 5. Introduction
- 6. Preliminary Phase
- 6.2 Approach
- 15. Phase G: Implementation Governance
- 19. Applying Iteration to the ADM
- 47. Architecture Board
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.1 Levels of Governance within the Enterprise
- 50.1.5 Architecture Governance: Overview
Architecture Governance Framework
- 50. Architecture Governance
Architecture Governance Framework, structure
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
architecture governance, implementation
- 50. Architecture Governance
architecture integration
- 5. Introduction
Architecture Landscape
- 2. Core Concepts
- 3. Definitions
- 41. Architecture Repository
Architecture Metamodel
- 2. Core Concepts
- 41. Architecture Repository
architecture modeling
- 37. Building Blocks
- 37.4 Building Blocks Example
architecture models
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
architecture partition
- 5. Introduction
architecture partitioning
architecture pattern
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
architecture pattern, content
- 25. Architecture Patterns
- 25.1 Introduction
architecture principles
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 23. Architecture Principles
architecture principles, characteristics
- 23. Architecture Principles
architecture principles, components
- 23. Architecture Principles
architecture principles, criteria
- 23. Architecture Principles
- 23.4 Developing Architecture Principles
Architecture/Project
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
Architecture Report
- 11. Phase C: Information Systems Architectures - Application Architecture
Architecture Repository
- 2. Core Concepts
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 8. Phase B: Business Architecture
- 8.2 Approach
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 12. Phase D: Technology Architecture
- 12.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
architecture requirements management
- 21. Security Architecture and the ADM
Architecture Requirements Specification
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Architecture Roadmap
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
architectures
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.10 Identify Transition Architectures
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
architecture, scoping
- 5. Introduction
Architecture Skills Framework
- 51. Architecture Maturity Models
- 52. Architecture Skills Framework
Architecture Skills Framework, proficiency levels
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
Architecture Skills Framework, skills
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
architecture view
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 35. Architectural Artifacts
architecture viewpoints, taxonomy
- 35. Architectural Artifacts
Architecture Vision
- 3. Definitions
- 5. Introduction
- 7. Phase A: Architecture Vision
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
are
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.10 Phase E: Opportunities & Solutions
area
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
arising
- 22. Using TOGAF to Define & Govern SOAs
artifact
- 2. Core Concepts
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
- 35. Architectural Artifacts
ARTS
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
as
- 1. Introduction
- 1.2 Executive Overview
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.5 Architecture Governance: Overview
ask
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
aspects
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
assess
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.4 Review IT Requirements from a Functional Perspective
- 13.4.6 Refine and Validate Dependencies
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 30. Business Transformation Readiness Assessment
assessment
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.2 Determine Business Constraints for Implementation
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
asset
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
asset protection
- 21. Security Architecture and the ADM
assets
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
assign
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
assigned
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
associated
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.4 Review IT Requirements from a Functional Perspective
assumptions
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.5 Identifying Building Block Requirements and Constraints
assurance
- 21. Security Architecture and the ADM
attack
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
attributes
- 13. Phase E: Opportunities & Solutions
- 34. Content Metamodel
audience
- Frontmatter
- Preface
audit
- 21. Security Architecture and the ADM
audit information
- 5. Introduction
authentication
- 21. Security Architecture and the ADM
authorization
- 21. Security Architecture and the ADM
availability
- 21. Security Architecture and the ADM
- 21.3 Guidance on Security for the Architecture Domains
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- A. Glossary of Supplementary Definitions
Availability/Delivery
- 14. Phase F: Migration Planning
available
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
avenues
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
awareness
- 21. Security Architecture and the ADM
b
- 8. Phase B: Business Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
background
- 25. Architecture Patterns
- 25.1 Introduction
- 37. Building Blocks
- 37.4 Building Blocks Example
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 51. Architecture Maturity Models
base
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 41. Architecture Repository
- 41.4 Standards Information Base
baseline
- 3. Definitions
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
Baseline Application Architecture Description
- 11. Phase C: Information Systems Architectures - Application Architecture
Baseline Architecture
- 3. Definitions
Baseline Data Architecture Description
- 10. Phase C: Information Systems Architectures - Data Architecture
Baseline Description
- 8. Phase B: Business Architecture
- 8.2 Approach
Baseline Technology Architecture Description
- 12. Phase D: Technology Architecture
basic
- 5. Introduction
- 5.2 Architecture Development Cycle
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.16 Developing an Enterprise Security View
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 44. Integrated Information Infrastructure Reference Model
basis
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
batch
- A. Glossary of Supplementary Definitions
batch processing
- A. Glossary of Supplementary Definitions
be
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.6 Phase A: Architecture Vision
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
benefit
- 1. Introduction
- 1.2 Executive Overview
- 4. Release Notes
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
- 26. Business Scenarios
- 35. Architectural Artifacts
- 35.13 Viewpoints in Phase E
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
Benefits diagram
- 35. Architectural Artifacts
- 35.13 Viewpoints in Phase E
best
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
between
- 39. Enterprise Continuum
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
- 49. Architecture Contracts
beyond
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
block
- 2. Core Concepts
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
board
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
Board-Level
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.5 Architecture Governance: Overview
both
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
boundaries
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
boundary
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
boundaryless
- 3. Definitions
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
Boundaryless Information Flow
- 3. Definitions
BPMN
- 8. Phase B: Business Architecture
- 8.2 Approach
breadth
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
breakdown
- 43. Foundation Architecture: Technical Reference Model
brokerage
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
brokerage applications
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
BTEP
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
BTEP, Readiness Rating Scheme
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
building
- 2. Core Concepts
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
building block
- 3. Definitions
building block, re-use level
- 37. Building Blocks
- 37.4 Building Blocks Example
building blocks
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 37. Building Blocks
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
building blocks, characteristics
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
building blocks, design
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 37.3.1 Basic Principles
building blocks, example
- 37. Building Blocks
bus
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
business
- 3. Definitions
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 7.4 Steps
- 7.4.2 Identify Stakeholders, Concerns, and Business Requirements
- 7.4.3 Confirm and Elaborate Business Goals, Business Drivers, and Constraints
- 7.4.4 Evaluate Business Capabilities
- 7.4.5 Assess Readiness for Business Transformation
- 7.4.7 Confirm and Elaborate Architecture Principles, including Business Principles
- 7.4.10 Identify the Business Transformation Risks and Mitigation Activities
- 8. Phase B: Business Architecture
- 8.2 Approach
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 8.4.2 Develop Baseline Business Architecture Description
- 8.4.3 Develop Target Business Architecture Description
- 8.4.8 Finalize the Business Architecture
business applications
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
Business Architecture
- 2. Core Concepts
- 3. Definitions
- 8. Phase B: Business Architecture
Business Architecture view
- 35. Architectural Artifacts
Business/Capability
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
Business Continuity Plan
- 31. Risk Management
business domain
- 3. Definitions
business drivers
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Business Footprint diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
business function
- 3. Definitions
business goals
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
business governance
- 3. Definitions
Business Interaction matrix
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Business-Led
- 22. Using TOGAF to Define & Govern SOAs
business-led SOA community
- 22. Using TOGAF to Define & Govern SOAs
business modeling
- 8. Phase B: Business Architecture
- 8.2 Approach
business planning
- 6. Preliminary Phase
- 6.2 Approach
business principles
- 6. Preliminary Phase
- 6.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
business principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
business process model
- 8. Phase B: Business Architecture
- 8.2 Approach
Business Process Modeling Notation
- 8. Phase B: Business Architecture
- 8.2 Approach
business requirements
business scenarios
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
- 26. Business Scenarios
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
business scenarios, descriptions
- 26. Business Scenarios
business scenarios, models
- 26. Business Scenarios
business scenarios, workshops
- 26. Business Scenarios
- 26.3 Creating the Business Scenario
business service
- 3. Definitions
- 22. Using TOGAF to Define & Govern SOAs
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
Business Service/Function catalog
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Business Service/Information diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Business Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
business system
- A. Glossary of Supplementary Definitions
Business Transformation Readiness Assessment
Business Use-Case diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
by
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
c
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 21. Security Architecture and the ADM
- 35. Architectural Artifacts
- 46. Establishing an Architecture Capability
Calendar
- 41. Architecture Repository
- 41.5 Governance Log
can
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
capabilities
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.6 Refine and Validate Dependencies
- 32. Capability-Based Planning
capability
- 2. Core Concepts
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.10 Identify Transition Architectures
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 46. Establishing an Architecture Capability
- 51. Architecture Maturity Models
Capability Architecture
- 3. Definitions
- 41. Architecture Repository
Capability Assessment
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
- 41.5 Governance Log
Capability-Based
- 32. Capability-Based Planning
capability-based planning
capability dimensions
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
Capability Framework
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
capability increment
- 3. Definitions
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
Capability Maturity Model
- 51. Architecture Maturity Models
Capacity/Scalability
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
capital
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
cases
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
catalog
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.7 Viewpoints in the Preliminary Phase
- 35.9 Viewpoints in Phase B
- 35.10 Viewpoints in the Phase C Data Architecture
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.12 Viewpoints in Phase D
- 35.14 Viewpoints for Requirements Management
- A. Glossary of Supplementary Definitions
catalog of application building blocks
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
catalogs
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
catalogs, building blocks
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
Catalyst
- 16. Phase H: Architecture Change Management
- 16.2 Approach
categories
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
categorization
- 2. Core Concepts
certification
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
chain
- 35. Architectural Artifacts
- 35.8 Viewpoints in Phase A
change
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
- 6. Preliminary Phase
- 13. Phase E: Opportunities & Solutions
- 16. Phase H: Architecture Change Management
change management
change management process
- 16. Phase H: Architecture Change Management
- 16.2 Approach
Change Request
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
changes
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.13 Phase H: Architecture Change Management
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 34.4.1 Governance Extensions
- 34.4.2 Services Extensions
- 34.4.3 Process Modeling Extensions
- 34.4.4 Data Extensions
- 34.4.5 Infrastructure Consolidation Extensions
- 34.4.6 Motivation Extensions
characteristics
- 23. Architecture Principles
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 37.2.2 Generic Characteristics
- 37.2.3 Architecture Building Blocks
- 37.2.4 Solution Building Blocks
- 40. Architecture Partitioning
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.2 Nature of Governance
- 50.1.5 Architecture Governance: Overview
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
characterization
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
charters
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
checking
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
checklist
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.1 Hardware and Operating System Checklist
- 48.5.2 Software Services and Middleware Checklist
- 48.5.3 Applications Checklists
- 48.5.4 Information Management Checklists
- 48.5.5 Security Checklist
- 48.5.6 System Management Checklist
- 48.5.7 System Engineering/Overall Architecture Checklists
- 48.5.8 System Engineering/Methods & Tools Checklist
class
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
Class diagram
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
classes
- 20. Applying the ADM at Different Enterprise Levels
Class Hierarchy diagram
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
classification
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 31. Risk Management
- 40. Architecture Partitioning
- 41. Architecture Repository
- 41.4 Standards Information Base
classify
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
class model
- 8. Phase B: Business Architecture
- 8.2 Approach
clearance
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
client
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
- A. Glossary of Supplementary Definitions
Client/Server
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
client/server model
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
close
- 15. Phase G: Implementation Governance
CMM
- 51. Architecture Maturity Models
CMMI
- 36. Architecture Deliverables
- 51. Architecture Maturity Models
- 51.2 Background
- 51.4 Capability Maturity Models Integration (CMMI)
COBIT
- 5. Introduction
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
- A. Glossary of Supplementary Definitions
COBIT framework
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
CODASYL
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
code
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
code/resources/assets
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
collected
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
COM
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
common
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
common object services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
Common Systems Architectures
- 8. Phase B: Business Architecture
- 8.2 Approach
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
Common Systems Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
communicated
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
communication
- 3. Definitions
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.12 Viewpoints in Phase D
- 35.19 Developing a Communications Engineering View
Communications Engineering diagram
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
Communications Engineering view
- 35. Architectural Artifacts
communications framework
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
Communications Infrastructure
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
Communications Infrastructure Interface
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
communications management
- 2. Core Concepts
- 3. Definitions
communications model
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
communications network
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- A. Glossary of Supplementary Definitions
communications node
- A. Glossary of Supplementary Definitions
Communications Plan
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
communications system
- A. Glossary of Supplementary Definitions
communities
- 22. Using TOGAF to Define & Govern SOAs
community
- 22. Using TOGAF to Define & Govern SOAs
compatibility
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
complexities
- 22. Using TOGAF to Define & Govern SOAs
compliance
- 15. Phase G: Implementation Governance
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 48. Architecture Compliance
Compliance Assessment
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
- 41.5 Governance Log
component
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 23. Architecture Principles
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.2 High-Level View
- A. Glossary of Supplementary Definitions
composite
- A. Glossary of Supplementary Definitions
composite application
- A. Glossary of Supplementary Definitions
computer
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- A. Glossary of Supplementary Definitions
Computing/Hardware
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
concept
- 2. Core Concepts
- 32. Capability-Based Planning
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
conceptual
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
concerns
- 3. Definitions
- 7. Phase A: Architecture Vision
- 24. Stakeholder Management
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.15 Developing a Business Architecture View
- 35.16 Developing an Enterprise Security View
- 35.17 Developing a Software Engineering View
- 35.18 Developing a System Engineering View
- 35.19 Developing a Communications Engineering View
- 35.20 Developing a Data Flow View
- 35.21 Developing an Enterprise Manageability View
- 35.22 Developing an Acquirer View
conclusion
- 30. Business Transformation Readiness Assessment
- 35. Architectural Artifacts
- 35.5 Conclusions
- 35.17 Developing a Software Engineering View
- 51. Architecture Maturity Models
- 52. Architecture Skills Framework
conditions
- 4. Release Notes
- 4.5 Using TOGAF
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.11 Phase F: Migration Planning
conditions of use
- 4. Release Notes
- 4.5 Using TOGAF
conduct
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
- 14. Phase F: Migration Planning
- 31. Risk Management
conducting
- 48. Architecture Compliance
- 48.6 Architecture Compliance Review Guidelines
configurable
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
configuration
- 21. Security Architecture and the ADM
- A. Glossary of Supplementary Definitions
configuration management
- 2. Core Concepts
- A. Glossary of Supplementary Definitions
configurations
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
confirm
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 14.4.2 Assign a Business Value to Each Project
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
conflict
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
connectivity
- A. Glossary of Supplementary Definitions
connectivity service
- A. Glossary of Supplementary Definitions
consideration
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
consistency
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
consolidate
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 13.4.5 Consolidate and Reconcile Interoperability Requirements
consolidated
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 28. Migration Planning Techniques
consolidation
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
constituents
- 39. Enterprise Continuum
constraint
- 3. Definitions
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 37. Building Blocks
- 37.4 Building Blocks Example
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
construction
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
consumer
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
consumption
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
content
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 22. Using TOGAF to Define & Govern SOAs
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
- 33. Introduction
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
content framework
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
content framework, and the TOGAF ADM
- 33. Introduction
content metamodel
- 33. Introduction
- 34. Content Metamodel
content metamodel attributes
- 34. Content Metamodel
content metamodel, detail
- 34. Content Metamodel
content metamodel, extensions
- 34. Content Metamodel
content metamodel objects
- 34. Content Metamodel
content metamodel, vision and concepts
- 34. Content Metamodel
contents
- 26. Business Scenarios
- 41. Architecture Repository
- 41.5 Governance Log
- 49. Architecture Contracts
content tailoring
- 6. Preliminary Phase
context
- 2. Core Concepts
- 6. Preliminary Phase
- 6.2 Approach
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 32. Capability-Based Planning
- 35. Architectural Artifacts
- 35.13 Viewpoints in Phase E
continuity
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.11 Phase F: Migration Planning
continuous
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
continuum
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 5.1 ADM Overview
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 39. Enterprise Continuum
- 39.2 Enterprise Continuum and Architecture Re-Use
- 39.3 Constituents of the Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
contract
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
Contract/Measure
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Contract/Measure catalog
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
contracts
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
- 49. Architecture Contracts
contributions
- 26. Business Scenarios
control
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
- A. Glossary of Supplementary Definitions
copy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
CORBA
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
core
- 2. Core Concepts
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
core architecture artifacts
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
core concepts
core content metamodel
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
core content metamodel, concepts
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
corporate
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
corporate governance
- 50. Architecture Governance
- 50.1 Introduction
corporate policy
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
correct
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
cost
- 4. Release Notes
- 4.5 Using TOGAF
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
- 21. Security Architecture and the ADM
Cost/Benefit
- 14. Phase F: Migration Planning
costs
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
COTS
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 26. Business Scenarios
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
- 35.22 Developing an Acquirer View
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 37.3.1 Basic Principles
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
create
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
create architecture models
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
created
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
creating
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 26. Business Scenarios
creation
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
criteria
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
criticality
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
current
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
custody
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
customer
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
CxO
- A. Glossary of Supplementary Definitions
cycle
- 5. Introduction
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
d
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
DAI
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
data
- 3. Definitions
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
data access interface
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
data access tier
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
data administration
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
Data Architecture
- 2. Core Concepts
- 3. Definitions
- 10. Phase C: Information Systems Architectures - Data Architecture
database
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
- A. Glossary of Supplementary Definitions
database administration
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
database management system
- A. Glossary of Supplementary Definitions
database services
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
database system
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
data building blocks
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
data dictionary
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
- A. Glossary of Supplementary Definitions
data directory
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
Data Dissemination diagram
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
data element
- A. Glossary of Supplementary Definitions
data encapsulation
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
data encryption
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
data entity
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- A. Glossary of Supplementary Definitions
Data Entity/Business Function matrix
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
Data Entity/Data Component catalog
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
data extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
Data Flow view
- 35. Architectural Artifacts
data governance
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
Data-Intensive
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
data-intensive software
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
data interchange services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
Data Lifecycle diagram
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
data management
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
data management services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
data migration
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
Data Migration diagram
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
data principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
data security
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
Data Security diagram
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
data services
- 22. Using TOGAF to Define & Govern SOAs
data standardization
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
Data Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
DBMS
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DBMS, flat files
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DBMS, hierarchical model
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DBMS, network model
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DBMS, object-oriented model
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DBMS, relational model
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DBMSs
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DD/DS
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
DDL
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
deal
- 2. Core Concepts
Decision Log
- 41. Architecture Repository
- 41.5 Governance Log
decisions
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
decomposition
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 35.12 Viewpoints in Phase D
- A. Glossary of Supplementary Definitions
decrease
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
deduction
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 28. Migration Planning Techniques
default
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
define
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- 21.12 Phase G: Implementation Governance
- 22. Using TOGAF to Define & Govern SOAs
defined
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
defining
- 29. Interoperability Requirements
definition
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 14. Phase F: Migration Planning
- 19. Applying Iteration to the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 28. Migration Planning Techniques
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
definitional
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
definitions
- 3. Definitions
- 52. Architecture Skills Framework
- A. Glossary of Supplementary Definitions
Degrees of Interoperability
- 29. Interoperability Requirements
deliverable
- 2. Core Concepts
- 3. Definitions
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 36. Architecture Deliverables
delivered
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
delivery
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
dependencies
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 13.4.6 Refine and Validate Dependencies
deploy
- 16. Phase H: Architecture Change Management
- 16.4 Steps
deployed
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
deployment
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
Deployment Repository
- 41. Architecture Repository
Deprecated Standard
- 41. Architecture Repository
- 41.4 Standards Information Base
depth
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
derivation
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
derive
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
descriptions
- 36. Architecture Deliverables
design
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.12 Phase G: Implementation Governance
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 37.3.1 Basic Principles
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
- 49. Architecture Contracts
design pattern
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
designs
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
detail
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 5. Introduction
- 5.5 Scoping the Architecture
- 34. Content Metamodel
- 39. Enterprise Continuum
- 43. Foundation Architecture: Technical Reference Model
detailed
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.6 Generate the Architecture Implementation Roadmap (Time-Lined) and Migration Plan
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
Detailed Design Repository
- 41. Architecture Repository
details
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.6 Generate the Architecture Implementation Roadmap (Time-Lined) and Migration Plan
determine
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.2 Determine Business Constraints for Implementation
- 13.4.4 Review IT Requirements from a Functional Perspective
- 13.4.8 Formulate High-Level Implementation and Migration Strategy
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- Determine who are the legitimate actors who will interact with the product/service/process
- Determine whom/how much it is acceptable to inconvenience in utilizing security measures
- Determine the assets at risk if something goes wrong - "What are we trying to protect?"
- Determine the cost (both qualitative and quantitative) of asset loss/impact in failure cases
- Determine and document appropriate security forensic processes
- Determine and document how much security (cost) is justified by the threats and the value of the assets at risk
- Determine "what can go wrong?"
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 30. Business Transformation Readiness Assessment
Determine/Confirm
- 13. Phase E: Opportunities & Solutions
determining
- 29. Interoperability Requirements
develop
- 1. Introduction
- 1.2 Executive Overview
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 16. Phase H: Architecture Change Management
Developer-Led
- 22. Using TOGAF to Define & Govern SOAs
developer-led SOA community
- 22. Using TOGAF to Define & Govern SOAs
developing
- 8. Phase B: Business Architecture
- 8.2 Approach
- 20. Applying the ADM at Different Enterprise Levels
- 23. Architecture Principles
- 26. Business Scenarios
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 35.15 Developing a Business Architecture View
development
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 9. Phase C: Information Systems Architectures
- 9.2 Approach
- 15. Phase G: Implementation Governance
- 18. Introduction
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 25. Architecture Patterns
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
- 42. Tools for Architecture Development
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
- 49. Architecture Contracts
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
development tools
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
diagram
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.6 Taxonomy of Architecture Viewpoints
- 35.8 Viewpoints in Phase A
- 35.9 Viewpoints in Phase B
- 35.10 Viewpoints in the Phase C Data Architecture
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.12 Viewpoints in Phase D
- 35.13 Viewpoints in Phase E
dictionary
- A. Glossary of Supplementary Definitions
Dictionary/Directory
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
different
- 20. Applying the ADM at Different Enterprise Levels
dimensions
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
direction
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.8 Formulate High-Level Implementation and Migration Strategy
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
directory
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
directory services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
disaster
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.11 Phase F: Migration Planning
disaster/continuity
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
disciplines
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
dispensation
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
dispute
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
dissemination
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
distributed
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
- A. Glossary of Supplementary Definitions
distributed database
- A. Glossary of Supplementary Definitions
distributed DBMS
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
distributed object management model
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
distribution
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
DML
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
do
- 1. Introduction
DoC
- 51. Architecture Maturity Models
document
- 1. Introduction
- 2. Core Concepts
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
documentation
- 26. Business Scenarios
- 26.8 Guidelines on Business Scenario Documentation
document categorization model
- 2. Core Concepts
documenting
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
documents
- Frontmatter
DoDAF
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
does
- 2. Core Concepts
- 4. Release Notes
- 4.5 Using TOGAF
domain
- 3. Definitions
- A. Glossary of Supplementary Definitions
domain, Application Architecture
- 35. Architectural Artifacts
domain, Business Architecture
- 35. Architectural Artifacts
domain, Data Architecture
- 35. Architectural Artifacts
domains
- 5. Introduction
- 5.5 Scoping the Architecture
- 21. Security Architecture and the ADM
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
domain, Technology Architecture
- 35. Architectural Artifacts
downloads
- 4. Release Notes
- 4.5 Using TOGAF
DRDA
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
driver
- A. Glossary of Supplementary Definitions
Driver/Goal/Objective
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Driver/Goal/Objective catalog
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
drivers
- 7. Phase A: Architecture Vision
- 16. Phase H: Architecture Change Management
- 16.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
drivers for change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
e
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 35. Architectural Artifacts
- 46. Establishing an Architecture Capability
each
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
EAP
- 9. Phase C: Information Systems Architectures
- 9.2 Approach
e-Business
- 25. Architecture Patterns
ebXML
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
EEI
- A. Glossary of Supplementary Definitions
effective
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
effectiveness
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
efficacy
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
elaborate
- 7. Phase A: Architecture Vision
element
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- A. Glossary of Supplementary Definitions
enable
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
enablement
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
encourage
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
end
- A. Glossary of Supplementary Definitions
end user
- A. Glossary of Supplementary Definitions
Energistics
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
enforce
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
engagement
- 20. Applying the ADM at Different Enterprise Levels
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
engineer
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
engineering
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.12 Viewpoints in Phase D
- 35.17 Developing a Software Engineering View
- 35.18 Developing a System Engineering View
- 35.19 Developing a Communications Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
Engineering/Methods
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
Engineering/Overall
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
enhancement
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.13 Phase H: Architecture Change Management
ensure
- 21. Security Architecture and the ADM
enterprise
- 1. Introduction
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 4.2 The Benefits of TOGAF 9
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 5.1 ADM Overview
- 5.5 Scoping the Architecture
- 6. Preliminary Phase
- 6.2 Approach
- 6.3 Inputs
- 6.4 Steps
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 13.3 Inputs
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.2 Determine Business Constraints for Implementation
- 14. Phase F: Migration Planning
- 14.3 Inputs
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 14.4.6 Generate the Architecture Implementation Roadmap (Time-Lined) and Migration Plan
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 20. Applying the ADM at Different Enterprise Levels
- 22. Using TOGAF to Define & Govern SOAs
- 28. Migration Planning Techniques
- 29. Interoperability Requirements
- 32. Capability-Based Planning
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.16 Developing an Enterprise Security View
- 35.21 Developing an Enterprise Manageability View
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 39. Enterprise Continuum
enterprise architect
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
enterprise architect, key characteristics
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
enterprise architect, role of
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
enterprise architecture
- 1. Introduction
- 1.2 Executive Overview
enterprise architecture capability
Enterprise Continuum
- 2. Core Concepts
- 3. Definitions
- 38. Introduction
- 39. Enterprise Continuum
- 42. Tools for Architecture Development
Enterprise Continuum and Tools
- 1. Introduction
enterprise focus
- 5. Introduction
- 5.5 Scoping the Architecture
Enterprise IT Repository
- 41. Architecture Repository
Enterprise Manageability diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
Enterprise Manageability view
- 35. Architectural Artifacts
enterprise operating model
- 29. Interoperability Requirements
enterprise portal
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
enterprise principles
- 23. Architecture Principles
Enterprise Resource Planning system
- A. Glossary of Supplementary Definitions
enterprise scope
- 5. Introduction
- 5.5 Scoping the Architecture
Enterprise Security view
- 35. Architectural Artifacts
entities
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
entity
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- A. Glossary of Supplementary Definitions
Entity/Business
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
Entity/Data
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
environment
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.13 Phase H: Architecture Change Management
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- A. Glossary of Supplementary Definitions
environment/access
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
Environment diagram
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
environment management
- 2. Core Concepts
- 3. Definitions
environment(s
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
environments
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
ERP
- A. Glossary of Supplementary Definitions
establish
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
establishing
- 2. Core Concepts
- 46. Establishing an Architecture Capability
estimate
- 14. Phase F: Migration Planning
evaluate
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
evaluation
- 6. Preliminary Phase
- 42. Tools for Architecture Development
evaluation criteria, tools
- 42. Tools for Architecture Development
event
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- A. Glossary of Supplementary Definitions
Event diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
events
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
evidence
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
evolution
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.6 Generate the Architecture Implementation Roadmap (Time-Lined) and Migration Plan
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
examine
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
example
- 23. Architecture Principles
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
- 27. Gap Analysis
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.4 Views and Viewpoints
- 37. Building Blocks
- 37.4 Building Blocks Example
execution
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
executive
- 1. Introduction
existing
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.13 Phase H: Architecture Change Management
experience
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
explicit
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
extended
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
extending
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
extension
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 34.4 Content Metamodel Extensions
extensive
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
external
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- A. Glossary of Supplementary Definitions
External Environment Interface
- A. Glossary of Supplementary Definitions
f
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 46. Establishing an Architecture Capability
factor
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 28. Migration Planning Techniques
- 30. Business Transformation Readiness Assessment
failure
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
failure transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
FEAF
- 23. Architecture Principles
features
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
Federal Enterprise Architecture Business Reference Model
- 8. Phase B: Business Architecture
- 8.2 Approach
federated architecture
- 5. Introduction
- 5.5 Scoping the Architecture
few
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
finalize
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
financial
- 3. Definitions
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
financial management
- 2. Core Concepts
- 3. Definitions
findings
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
first-order
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
Fitness-for-Purpose
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
Five-Tier
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
flexibility
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
flow
- 3. Definitions
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 35.20 Developing a Data Flow View
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
focus
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
footnotes
- 1. Introduction
- 1.2 Executive Overview
- 5. Introduction
- 5.7 Summary
- 6. Preliminary Phase
- 6.5 Outputs
- 17. ADM Architecture Requirements Management
- 17.5 Outputs
- 29. Interoperability Requirements
- 29.7 Summary
- 30. Business Transformation Readiness Assessment
- 30.7 Conclusion
- 34. Content Metamodel
- 34.7 Metamodel Relationships
- 35. Architectural Artifacts
- 35.22 Developing an Acquirer View
- 35.22.3 Key Issues
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.8 Building Block Re-Use Level
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 40.4.7 Content Aggregation and Integration
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.5 Qualities
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
- 50.3.2 Elements of an Effective Architecture Governance Strategy
- 51. Architecture Maturity Models
- 51.5 Conclusions
footprint
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
forensic
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
formal
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
formal stakeholder review
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
formulate
- 13. Phase E: Opportunities & Solutions
FORTRAN
- A. Glossary of Supplementary Definitions
forum
- Frontmatter
foundation
- 3. Definitions
- 5. Introduction
- 5.1 ADM Overview
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.6 Refine and Validate Dependencies
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
Foundation Architecture
- 1. Introduction
- 3. Definitions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 43. Foundation Architecture: Technical Reference Model
Foundation Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
framework
- 1. Introduction
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 6. Preliminary Phase
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
framework(s
- 6. Preliminary Phase
frontmatter
full
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
full content metamodel
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
function
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 22. Using TOGAF to Define & Govern SOAs
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
- 49. Architecture Contracts
functional
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.4 Review IT Requirements from a Functional Perspective
functional decomposition
- A. Glossary of Supplementary Definitions
Functional Decomposition diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
functionality
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.5 Identifying Building Block Requirements and Constraints
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
functions
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
future
- 21. Security Architecture and the ADM
- 21.13 Phase H: Architecture Change Management
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
g
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 31. Risk Management
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 46. Establishing an Architecture Capability
gap
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
gap analysis
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 27. Gap Analysis
gaps
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 28. Migration Planning Techniques
gateway
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
gathering
- 26. Business Scenarios
- 26.3 Creating the Business Scenario
general
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 8. Phase B: Business Architecture
- 8.2 Approach
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
generate
- 14. Phase F: Migration Planning
generic
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.2 Nature of Governance
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- 52.6 Generic Role and Skills of the Enterprise Architect
global transaction
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
glossary
go
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
goal
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- Goal: Improve Business Process Performance
- Goal: Decrease Costs
- Goal: Improve Business Operations
- Goal: Improve Management Efficacy
- Goal: Reduce Risk
- Goal: Improve Effectiveness of IT Organization
- Goal: Improve User Productivity
- Goal: Improve Portability and Scalability
- Goal: Improve Interoperability
- Goal: Increase Vendor Independence
- Goal: Reduce Lifecycle Costs
- Goal: Improve Security
- Goal: Improve Manageability
- A. Glossary of Supplementary Definitions
Goal/Objective/Service
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Goal/Objective/Service diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
goals
- 7. Phase A: Architecture Vision
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
Goals/Rationale
- 52. Architecture Skills Framework
goes
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
gone
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
good
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
GOTS
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
govern
governance
- 3. Definitions
- 5. Introduction
- 6. Preliminary Phase
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 31. Risk Management
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
- 41.5 Governance Log
governance, characteristics
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.2 Nature of Governance
governance contract
- 22. Using TOGAF to Define & Govern SOAs
governance extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
Governance Log
- 2. Core Concepts
- 41. Architecture Repository
Governance Log, contents of
- 41. Architecture Repository
- 41.5 Governance Log
granularity
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
graphic
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
- 44.3 Detailed Taxonomy
graphics services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
greater
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
group
- 4. Release Notes
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.9 Identify and Group Major Work Packages
- 13.4.10 Identify Transition Architectures
- Frontmatter
- About The Open Group
guidance
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 21. Security Architecture and the ADM
- 25. Architecture Patterns
guide
- 15. Phase G: Implementation Governance
guideline
- 5. Introduction
- 5.1 ADM Overview
- 16. Phase H: Architecture Change Management
- 18. Introduction
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 22. Using TOGAF to Define & Govern SOAs
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
guidelines, for adapting the ADM
- 18. Introduction
h
- 16. Phase H: Architecture Change Management
- 21. Security Architecture and the ADM
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 46. Establishing an Architecture Capability
hardware
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- A. Glossary of Supplementary Definitions
has
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
HCI
- A. Glossary of Supplementary Definitions
heterogeneous
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
hierarchic
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
hierarchic model
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
hierarchy
- 20. Applying the ADM at Different Enterprise Levels
- 20.4 ADM Cycle Approaches
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
High-Level
- 13. Phase E: Opportunities & Solutions
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
Hillside Group
- 25. Architecture Patterns
holistic
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
hosting
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
how
- 4. Release Notes
- 4.5 Using TOGAF
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 22. Using TOGAF to Define & Govern SOAs
human
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
human computer interface
- A. Glossary of Supplementary Definitions
human interaction services
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
i
- 1. Introduction
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
IBM
- 25. Architecture Patterns
IBM patterns web site
- 25. Architecture Patterns
- 25.1 Introduction
- 25.3 IBM Patterns for e-Business
ICAM
- 8. Phase B: Business Architecture
- 8.2 Approach
ICD
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
IDEF
- 8. Phase B: Business Architecture
- 8.2 Approach
identification
- 31. Risk Management
- 37. Building Blocks
- 37.4 Building Blocks Example
identified
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
identify
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.9 Identify and Group Major Work Packages
identifying
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 37. Building Blocks
- 37.4 Building Blocks Example
idiom
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
IDL
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
IEEE 1003.0
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
if
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
II
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
III
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
III-RM
- 1. Introduction
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.2 High-Level View
- 44.3 Detailed Taxonomy
III-RM graphic
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
III-RM, taxonomy
- 44. Integrated Information Infrastructure Reference Model
imaging
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
imaging services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
impact
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
impacted
- 6. Preliminary Phase
impacts
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
implement
- 6. Preliminary Phase
- 6.4 Steps
- 15. Phase G: Implementation Governance
- 15.4 Steps
- 16. Phase H: Architecture Change Management
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- Implement methods and procedures to review evidence produced by the system that reflects operational stability and adherence to security policies
- Implement necessary training to ensure correct deployment, configuration, and operations of security-relevant subsystems and components; ensure awareness training of all users and non-privileged operators of the system and/or its components
implementation
- 9. Phase C: Information Systems Architectures
- 9.2 Approach
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.2 Determine Business Constraints for Implementation
- 13.4.8 Formulate High-Level Implementation and Migration Strategy
Implementation and Migration Plan
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
implementation governance
Implementation Governance Model
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
importance
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
improve
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- Goal: Improve Business Process Performance
- Goal: Improve Business Operations
- Goal: Improve Management Efficacy
- Goal: Improve Effectiveness of IT Organization
- Goal: Improve User Productivity
- Goal: Improve Portability and Scalability
- Goal: Improve Interoperability
- Goal: Improve Security
- Goal: Improve Manageability
IMS
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
in
- 2. Core Concepts
- 4. Release Notes
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 24. Stakeholder Management
- 25. Architecture Patterns
- 25.1 Introduction
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 32. Capability-Based Planning
- 34. Content Metamodel
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 35.4 Views and Viewpoints
- 35.7 Viewpoints in the Preliminary Phase
- 35.8 Viewpoints in Phase A
- 35.9 Viewpoints in Phase B
- 35.10 Viewpoints in the Phase C Data Architecture
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.12 Viewpoints in Phase D
- 35.13 Viewpoints in Phase E
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 39. Enterprise Continuum
- 42. Tools for Architecture Development
- 43. Foundation Architecture: Technical Reference Model
- 50. Architecture Governance
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.2 Characterization in Terms of the Enterprise Continuum
- 52.6.3 Key Characteristics of an Enterprise Architect
including
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 7. Phase A: Architecture Vision
inconvenience
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
incorporate
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.6 Generate the Architecture Implementation Roadmap (Time-Lined) and Migration Plan
- 21. Security Architecture and the ADM
- 21.13 Phase H: Architecture Change Management
increase
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
increment
- 3. Definitions
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
incremental change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
increments
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.10 Identify Transition Architectures
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
- 28. Migration Planning Techniques
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
Increments/Phases
- 14. Phase F: Migration Planning
independence
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
indicator
- A. Glossary of Supplementary Definitions
industries
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
industry
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
Industry Architectures
- 8. Phase B: Business Architecture
- 8.2 Approach
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
Industry Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
information
- 3. Definitions
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.6 Refine and Validate Dependencies
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
information consumer applications
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
information domains
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
- A. Glossary of Supplementary Definitions
information exchange matrix
- 8. Phase B: Business Architecture
- 8.2 Approach
Information-Intensive
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
information-intensive software
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
information provider applications
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
information system
- A. Glossary of Supplementary Definitions
Information Systems Architecture
information system service
- 22. Using TOGAF to Define & Govern SOAs
- A. Glossary of Supplementary Definitions
information technology
- 3. Definitions
infrastructure
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
- 43.3.5 Communications Infrastructure
- 43.3.7 Communications Infrastructure Interface
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
- 44.3 Detailed Taxonomy
infrastructure applications
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
infrastructure bus
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
infrastructure consolidation extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
infrastructure services
- 22. Using TOGAF to Define & Govern SOAs
inheritance
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
initial
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
- 31. Risk Management
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
initial risk assessment
- 31. Risk Management
inputs
- 6. Preliminary Phase
installation
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
instantiation
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
integrated
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
integrated information infrastructure
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
integration
- 5. Introduction
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.4 Review IT Requirements from a Functional Perspective
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.3 Applications Checklists
- 51. Architecture Maturity Models
intended
- Frontmatter
- Preface
interact
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
interaction
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 35.11 Viewpoints in the Phase C Application Architecture
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
interaction model
- A. Glossary of Supplementary Definitions
interactions
- 14. Phase F: Migration Planning
interchange
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
interconnecting
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
interface
- 3. Definitions
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
Interface catalog
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
interfaces
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.2 TRM Entities and Interfaces
- 43.3.4 Application Platform
interim
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.6 Refine and Validate Dependencies
internal
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
international
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
international operation services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
interoperability
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.5 Consolidate and Reconcile Interoperability Requirements
interoperability, categories
- 29. Interoperability Requirements
interoperability, refining
- 29. Interoperability Requirements
interoperability, requirements
interoperable
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
into
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.10 Identify Transition Architectures
- 21. Security Architecture and the ADM
- 21.13 Phase H: Architecture Change Management
Intuitiveness/Ease-of-Use
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
investment
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
IPD-CMM
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
is
- 1. Introduction
- 1.2 Executive Overview
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.7 Phase B: Business Architecture
- A. Glossary of Supplementary Definitions
ISACF
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
ISAM
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
ISO
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
ISO/IEC 42010:2007
- 2. Core Concepts
isolation
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
issues
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.4 Review IT Requirements from a Functional Perspective
- 35. Architectural Artifacts
- 35.15 Developing a Business Architecture View
- 35.17 Developing a Software Engineering View
- 35.18 Developing a System Engineering View
- 35.19 Developing a Communications Engineering View
- 35.20 Developing a Data Flow View
- 35.21 Developing an Enterprise Manageability View
- 35.22 Developing an Acquirer View
- 42. Tools for Architecture Development
IT
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.4 Review IT Requirements from a Functional Perspective
iteration
- 19. Applying Iteration to the ADM
iteration cycles
- 19. Applying Iteration to the ADM
iteration of the ADM
iterations
- 20. Applying the ADM at Different Enterprise Levels
- 20.4 ADM Cycle Approaches
IT governance
- 50. Architecture Governance
- 50.1 Introduction
IT Governance Institute
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
ITIL
- 5. Introduction
- 16. Phase H: Architecture Change Management
- 16.2 Approach
- A. Glossary of Supplementary Definitions
IT principles
- 23. Architecture Principles
its
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.12 Phase G: Implementation Governance
IV
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 33. Introduction
Java
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
join
- 4. Release Notes
justified
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.9 Phase D: Technology Architecture
JVM
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
key
- 5. Introduction
- 5.2 Architecture Development Cycle
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 13. Phase E: Opportunities & Solutions
- 35. Architectural Artifacts
- 35.15 Developing a Business Architecture View
- 35.17 Developing a Software Engineering View
- 35.18 Developing a System Engineering View
- 35.19 Developing a Communications Engineering View
- 35.20 Developing a Data Flow View
- 35.21 Developing an Enterprise Manageability View
- 35.22 Developing an Acquirer View
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
- 50.2.2 Architecture Governance Framework - Organizational Structure
- 50.3 Architecture Governance in Practice
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- A. Glossary of Supplementary Definitions
Key Performance Indicator
- A. Glossary of Supplementary Definitions
keywords
- Frontmatter
- Preface
kind
- 2. Core Concepts
knowledge
- 3. Definitions
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
KPI
- 7. Phase A: Architecture Vision
- 22. Using TOGAF to Define & Govern SOAs
- A. Glossary of Supplementary Definitions
landscape
- 3. Definitions
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 41. Architecture Repository
language
- 35. Architectural Artifacts
later
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
LCS
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
leadership
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
learned
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
legal
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
legitimate
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
lessons
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
lessons learned process
- 16. Phase H: Architecture Change Management
- 16.2 Approach
level
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 37. Building Blocks
- 37.4 Building Blocks Example
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
level of abstraction
- 40. Architecture Partitioning
level of detail
- 5. Introduction
- 5.5 Scoping the Architecture
levels
- 20. Applying the ADM at Different Enterprise Levels
leveraged
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
libraries
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
library
- 41. Architecture Repository
lifecycle
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 35.10 Viewpoints in the Phase C Data Architecture
- 41. Architecture Repository
- 41.4 Standards Information Base
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
- A. Glossary of Supplementary Definitions
lifespan
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
Line-of-Business
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.2 Determine Business Constraints for Implementation
local subscriber environment
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
location
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 35.11 Viewpoints in the Phase C Application Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
Location catalog
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Location diagram
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
locations
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
location services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
location transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
log
- 41. Architecture Repository
- 41.5 Governance Log
logged
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
logging
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
logical
- 3. Definitions
- A. Glossary of Supplementary Definitions
logical application component
- A. Glossary of Supplementary Definitions
logical data component
- A. Glossary of Supplementary Definitions
logical technology component
- A. Glossary of Supplementary Definitions
loss/impact
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
maintaining
maintenance
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
- 16. Phase H: Architecture Change Management
major
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.9 Identify and Group Major Work Packages
making
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
manage
- 16. Phase H: Architecture Change Management
manageability
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.21 Developing an Enterprise Manageability View
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
managed
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
management
- 3. Definitions
- 6. Preliminary Phase
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
management frameworks
- 6. Preliminary Phase
- 6.2 Approach
management utilities
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
manager
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
managing
- A. Glossary of Supplementary Definitions
Managing Successful Programs
- A. Glossary of Supplementary Definitions
mandated
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
map
- 24. Stakeholder Management
- 35. Architectural Artifacts
- 35.8 Viewpoints in Phase A
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
mapping
- 4. Release Notes
- 19. Applying Iteration to the ADM
marketing
- 30. Business Transformation Readiness Assessment
Master/Slave
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
master/slave model
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
materials
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
matrices
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
matrix
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 28. Migration Planning Techniques
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.8 Viewpoints in Phase A
- 35.9 Viewpoints in Phase B
- 35.10 Viewpoints in the Phase C Data Architecture
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.12 Viewpoints in Phase D
- A. Glossary of Supplementary Definitions
maturity
- 6. Preliminary Phase
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.2 Determine Business Constraints for Implementation
- 40. Architecture Partitioning
- 51. Architecture Maturity Models
maturity model
- 30. Business Transformation Readiness Assessment
- 51. Architecture Maturity Models
MDA
- 11. Phase C: Information Systems Architectures - Application Architecture
me
- 1. Introduction
- 1.2 Executive Overview
meaning
- 48. Architecture Compliance
measure
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- A. Glossary of Supplementary Definitions
measured
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
measurement
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
measures
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
mediator
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
meet
- 16. Phase H: Architecture Change Management
meeting
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
members
- Frontmatter
- Participants
metadata
- 3. Definitions
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
metamodel
- 3. Definitions
- 33. Introduction
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
metamodel relationships
- 34. Content Metamodel
metaview
- A. Glossary of Supplementary Definitions
method
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
Method-Driven
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
methodology
- 3. Definitions
methods
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
middleware
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
migration
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
Migration Planning
- 14. Phase F: Migration Planning
- 30. Business Transformation Readiness Assessment
migration transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
milestones
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
minimal
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
minutes
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
mitigating
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
mitigation
- 7. Phase A: Architecture Vision
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 31. Risk Management
model
- 2. Core Concepts
- 3. Definitions
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 29. Interoperability Requirements
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
Model Driven Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
modeling
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.2 Approach
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 37. Building Blocks
- 37.4 Building Blocks Example
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
models
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 26.8 Guidelines on Business Scenario Documentation
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 51. Architecture Maturity Models
modifications
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
modular
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
modularity
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
monitoring
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 31. Risk Management
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
more
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
motivation
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
motivation extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
MSP
- 36. Architecture Deliverables
- A. Glossary of Supplementary Definitions
much
- 4. Release Notes
- 4.5 Using TOGAF
- 21. Security Architecture and the ADM
multimedia
- A. Glossary of Supplementary Definitions
multimedia service
- A. Glossary of Supplementary Definitions
must
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
nature
- 50. Architecture Governance
- 50.1 Introduction
necessary
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.12 Phase G: Implementation Governance
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
need
- 1. Introduction
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
- 52. Architecture Skills Framework
network
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
networked
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
Networked Computing/Hardware diagram
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
network management services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
network services
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
new
- 4. Release Notes
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
node
- A. Glossary of Supplementary Definitions
node connectivity diagram
- 8. Phase B: Business Architecture
- 8.2 Approach
Non-Architectural
- 6. Preliminary Phase
- 6.3 Inputs
- 7. Phase A: Architecture Vision
- 7.3 Inputs
- 8. Phase B: Business Architecture
- 8.3 Inputs
- 9. Phase C: Information Systems Architectures
- 9.3 Inputs
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.3 Inputs
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.3 Inputs
- 12. Phase D: Technology Architecture
- 12.3 Inputs
- 13. Phase E: Opportunities & Solutions
- 13.3 Inputs
- 14. Phase F: Migration Planning
- 14.3 Inputs
- 15. Phase G: Implementation Governance
- 15.3 Inputs
- 16. Phase H: Architecture Change Management
- 16.3 Inputs
none
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
non-privileged
- 21. Security Architecture and the ADM
non-repudiation
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
notes
nothing
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
OA&M
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
OAG
- 8. Phase B: Business Architecture
- 8.2 Approach
OASIS
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
object
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
objective
- 3. Definitions
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.13 Phase H: Architecture Change Management
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
object management
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
Object Management Group
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
Object-Oriented
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
object-oriented services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
objects
- 34. Content Metamodel
Obsolete Standard
- 41. Architecture Repository
- 41.4 Standards Information Base
obtain
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
ODBC
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
OLA
- 22. Using TOGAF to Define & Govern SOAs
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
OLE
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
OMG
- 8. Phase B: Business Architecture
- 8.2 Approach
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
one
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
ongoing
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
OODBMS
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
open
- 4. Release Notes
- A. Glossary of Supplementary Definitions
- Frontmatter
- About The Open Group
open specifications
- A. Glossary of Supplementary Definitions
open system
- A. Glossary of Supplementary Definitions
operating
- 29. Interoperability Requirements
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- A. Glossary of Supplementary Definitions
operating system services
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
operation
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 47. Architecture Board
operational
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
- A. Glossary of Supplementary Definitions
operational contract
- 22. Using TOGAF to Define & Govern SOAs
operational governance
- A. Glossary of Supplementary Definitions
operational-level agreement
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
operations
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
- 15. Phase G: Implementation Governance
- 15.4 Steps
- 21. Security Architecture and the ADM
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
operations management
- 6. Preliminary Phase
- 6.2 Approach
operators
- 21. Security Architecture and the ADM
opportunities
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 46. Establishing an Architecture Capability
Opportunities & Solutions
opportunity
- 37. Building Blocks
- 37.4 Building Blocks Example
opportunity identification
- 37. Building Blocks
- 37.4 Building Blocks Example
optimizing
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
ORB
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
ORB services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
organization
- 3. Definitions
- 6. Preliminary Phase
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
- 39. Enterprise Continuum
- A. Glossary of Supplementary Definitions
Organization/Actor
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Organization/Actor catalog
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
organizational
- 6. Preliminary Phase
- 6.2 Approach
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
Organizational Model
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Organization Decomposition diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
organizations
- 6. Preliminary Phase
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
Organization-Specific
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
Organization-Specific Architectures
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
Organization-Specific Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
organization unit
- A. Glossary of Supplementary Definitions
orientation
- 3. Definitions
oriented
- 3. Definitions
OSI
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
OSI Reference Model
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
our
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
output
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 21. Security Architecture and the ADM
outside
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
overall
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.8 Formulate High-Level Implementation and Migration Strategy
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios
- 26.3 Creating the Business Scenario
overview
- 1. Introduction
- 5. Introduction
- 19. Applying Iteration to the ADM
- 20. Applying the ADM at Different Enterprise Levels
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 29. Interoperability Requirements
- 32. Capability-Based Planning
- 33. Introduction
- 34. Content Metamodel
- 34.1 Overview
- 34.2 Content Metamodel Vision and Concepts
- 35. Architectural Artifacts
- 35.3 Views, Tools, and Languages
- 37. Building Blocks
- 37.1 Overview
- 37.2 Introduction to Building Blocks
- 39. Enterprise Continuum
- 40. Architecture Partitioning
- 41. Architecture Repository
- 41.1 Overview
- 41.3 Reference Library
- 41.4 Standards Information Base
- 41.5 Governance Log
- 42. Tools for Architecture Development
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 45. Introduction
- 46. Establishing an Architecture Capability
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
- 50. Architecture Governance
- 50.1 Introduction
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
- 51. Architecture Maturity Models
- 51.1 Overview
- 51.3 US DoC ACMM Framework
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
ownership
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
package
- 3. Definitions
packaged
- A. Glossary of Supplementary Definitions
packaged services
- A. Glossary of Supplementary Definitions
packages
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.9 Identify and Group Major Work Packages
paradigm
- 32. Capability-Based Planning
parameters
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
part
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 33. Introduction
- 38. Introduction
- 45. Introduction
participants
- Frontmatter
partitioned
- 40. Architecture Partitioning
partitioning
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
partner
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 49. Architecture Contracts
parts
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
pattern
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
- 25.4 Some Pattern Resources
pattern resources
- 25. Architecture Patterns
patterns
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
- 25.3 IBM Patterns for e-Business
patterns-discussion FAQ
- 25. Architecture Patterns
patterns home page
- 25. Architecture Patterns
P-CMM
- 51. Architecture Maturity Models
- 51.2 Background
- 51.4 Capability Maturity Models Integration (CMMI)
Peer-to-Peer
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
peer-to-peer model
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
perform
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 15. Phase G: Implementation Governance
performance
- 3. Definitions
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 16. Phase H: Architecture Change Management
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- A. Glossary of Supplementary Definitions
performance management
- 2. Core Concepts
- 3. Definitions
performance measurement
- 41. Architecture Repository
- 41.5 Governance Log
period
- 5. Introduction
- 5.5 Scoping the Architecture
- A. Glossary of Supplementary Definitions
personal
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
personnel
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
perspective
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.4 Review IT Requirements from a Functional Perspective
phase
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
Phase A
Phase B
Phase C
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
Phase D
Phase E
Phase F
Phase G
Phase H
phases
- 13. Phase E: Opportunities & Solutions
- 19. Applying Iteration to the ADM
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
physical
- 3. Definitions
- A. Glossary of Supplementary Definitions
physical application component
- A. Glossary of Supplementary Definitions
physical/business/regulatory
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
physical data component
- A. Glossary of Supplementary Definitions
physical technology component
- A. Glossary of Supplementary Definitions
place
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
plan
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.2 Determine Business Constraints for Implementation
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
planning
- 6. Preliminary Phase
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
plans
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.2 Determine Business Constraints for Implementation
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.11 Phase F: Migration Planning
plans/requirements
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
platform
- 3. Definitions
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
Platform Decomposition diagram
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
platform services
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
platform taxonomy
- 43. Foundation Architecture: Technical Reference Model
PMBOK
- 36. Architecture Deliverables
pointers
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
points
- 5. Introduction
- 5.2 Architecture Development Cycle
policies
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.12 Phase G: Implementation Governance
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
policy
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 22. Using TOGAF to Define & Govern SOAs
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
policy/business
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
politics
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
- 50.3.2 Elements of an Effective Architecture Governance Strategy
portability
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- A. Glossary of Supplementary Definitions
portfolio
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
portfolio management
- 6. Preliminary Phase
- 6.2 Approach
portfolios
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.10 Identify Transition Architectures
positions
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
possible
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
Post-Implementation
- 15. Phase G: Implementation Governance
postscript
- 12. Phase D: Technology Architecture
potential
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.5 Consolidate and Reconcile Interoperability Requirements
- 29. Interoperability Requirements
potential/likely
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
practice
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 50. Architecture Governance
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
preface
- Frontmatter
preliminary
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 35. Architectural Artifacts
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
Preliminary phase
preparation
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
present
- 30. Business Transformation Readiness Assessment
previous
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
previously
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
PRINCE2
- 16. Phase H: Architecture Change Management
- 16.2 Approach
- 36. Architecture Deliverables
- A. Glossary of Supplementary Definitions
principle
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 6.4 Steps
- 7. Phase A: Architecture Vision
- 23. Architecture Principles
- 23.2 Characteristics of Architecture Principles
- 23.3 Components of Architecture Principles
- 23.4 Developing Architecture Principles
Principles catalog
- 35. Architectural Artifacts
- 35.7 Viewpoints in the Preliminary Phase
priorities
- 15. Phase G: Implementation Governance
prioritize
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
privileges
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
problem
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
procedures
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
process
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 16. Phase H: Architecture Change Management
- 18. Introduction
- 24. Stakeholder Management
- 26. Business Scenarios
- 26.3 Creating the Business Scenario
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 35.9 Viewpoints in Phase B
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 48. Architecture Compliance
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- A. Glossary of Supplementary Definitions
processes
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.7 Establish the Architecture Evolution Cycle and Document Lessons Learned
- 20. Applying the ADM at Different Enterprise Levels
- 20.4 ADM Cycle Approaches
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
Process/Event/Control/Product
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Process/Event/Control/Product catalog
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Process Flow diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
processing
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
Processing diagram
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
process modeling
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
process modeling extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
Processors/Servers/Clients
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
process services
- 22. Using TOGAF to Define & Govern SOAs
process status
- 5. Introduction
Process/System
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
Process/System Realization diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
process tailoring
- 6. Preliminary Phase
produced
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
producing
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
product
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- A. Glossary of Supplementary Definitions
productivity
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.3 Applications Checklists
Product Lifecycle diagram
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
Product Line Architecture
- 5. Introduction
product/service/process
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
professional
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
proficiency
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
profile
- A. Glossary of Supplementary Definitions
profiling
- A. Glossary of Supplementary Definitions
program
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- A. Glossary of Supplementary Definitions
project
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
Project Context diagram
- 35. Architectural Artifacts
- 35.13 Viewpoints in Phase E
project management
- 6. Preliminary Phase
- 6.2 Approach
Project Portfolio
- 41. Architecture Repository
- 41.5 Governance Log
projects
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.10 Identify Transition Architectures
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
prompt
- 1. Introduction
- 1.2 Executive Overview
propositions
- 7. Phase A: Architecture Vision
protect
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
protection
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
provide
- 16. Phase H: Architecture Change Management
provider
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
proving
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
provision
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
purpose
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 34. Content Metamodel
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 36.2.2 Architecture Contract
- 36.2.3 Architecture Definition Document
- 36.2.4 Architecture Principles
- 36.2.5 Architecture Repository
- 36.2.6 Architecture Requirements Specification
- 36.2.7 Architecture Roadmap
- 36.2.8 Architecture Vision
- 36.2.9 Business Principles, Business Goals, and Business Drivers
- 36.2.10 Capability Assessment
- 36.2.11 Change Request
- 36.2.12 Communications Plan
- 36.2.13 Compliance Assessment
- 36.2.14 Implementation and Migration Plan
- 36.2.15 Implementation Governance Model
- 36.2.16 Organizational Model for Enterprise Architecture
- 36.2.18 Requirements Impact Assessment
- 36.2.20 Statement of Architecture Work
- 36.2.21 Tailored Architecture Framework
- 36.2.22 Transition Architecture
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
qualitative
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
qualities
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 23. Architecture Principles
- 23.4 Developing Architecture Principles
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.4 Application Platform - Taxonomy
- 43.4.3 Application Platform Service Qualities
quality
- 3. Definitions
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
- A. Glossary of Supplementary Definitions
quality management
- 2. Core Concepts
- 3. Definitions
quantitative
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
questions
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
RACI
- 22. Using TOGAF to Define & Govern SOAs
ranking
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
rating
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
rationalize
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 13.4.6 Refine and Validate Dependencies
RDBMS
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
REA
- 8. Phase B: Business Architecture
- 8.2 Approach
readiness
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 30. Business Transformation Readiness Assessment
readiness factors
- 30. Business Transformation Readiness Assessment
readiness planning
- 30. Business Transformation Readiness Assessment
realization
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
re-architecting change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
reassess
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
recognized
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
reconcile
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.5 Consolidate and Reconcile Interoperability Requirements
reconciling
- 29. Interoperability Requirements
recovery
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.11 Phase F: Migration Planning
Red Books
- 25. Architecture Patterns
- 25.1 Introduction
- 25.3 IBM Patterns for e-Business
redesign
- 16. Phase H: Architecture Change Management
reduce
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
reference
- 3. Definitions
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 41. Architecture Repository
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
referenced
- Frontmatter
reference data
- 5. Introduction
Reference Library
- 2. Core Concepts
- 41. Architecture Repository
reference models
- 1. Introduction
- 3. Definitions
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
references
- 21. Security Architecture and the ADM
refine
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
refining
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 29. Interoperability Requirements
reflect
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.12 Phase G: Implementation Governance
regarding
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
regulate
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
regulatory
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.8 Phase C: Information Systems Architectures
relating
- 6. Preliminary Phase
- 6.2 Approach
relationship
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 34. Content Metamodel
- 39. Enterprise Continuum
- 39.5 Relationship between the Enterprise Continuum and TOGAF ADM
- 39.6 Enterprise Continuum and Your Organization
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 49. Architecture Contracts
relay system
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
release
release notes
relocation transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
replication transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
reporting
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
repository
- 2. Core Concepts
- 3. Definitions
- 5. Introduction
- 5.1 ADM Overview
- 8. Phase B: Business Architecture
- 8.2 Approach
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 12. Phase D: Technology Architecture
- 12.2 Approach
- 35. Architectural Artifacts
- 35.20 Developing a Data Flow View
- 35.20.3 Key Issues
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
request
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Request for Architecture Work
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
requests
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
required
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 34.4.1 Governance Extensions
- 34.4.2 Services Extensions
- 34.4.3 Process Modeling Extensions
- 34.4.4 Data Extensions
- 34.4.5 Infrastructure Consolidation Extensions
- 34.4.6 Motivation Extensions
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.5 Identifying Building Block Requirements and Constraints
requirement
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
Requirement for Architecture Work
- 6. Preliminary Phase
- 6.2 Approach
requirements
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 7. Phase A: Architecture Vision
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.4 Review IT Requirements from a Functional Perspective
Requirements catalog
- 35. Architectural Artifacts
- 35.14 Viewpoints for Requirements Management
Requirements Impact Assessment
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
requirements tools
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
residual
- 31. Risk Management
residual risk assessment
- 31. Risk Management
resolution
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
resolve
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
resource
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 14. Phase F: Migration Planning
- A. Glossary of Supplementary Definitions
Resource-Event-Agent
- 8. Phase B: Business Architecture
- 8.2 Approach
resource management
- 2. Core Concepts
- 3. Definitions
resources
- 15. Phase G: Implementation Governance
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 25. Architecture Patterns
respect
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.9 Identify and Group Major Work Packages
responsibilities
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 47. Architecture Board
responsibility
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.5 Architecture Governance: Overview
results
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
return
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
re-usable
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
re-use
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
- 37. Building Blocks
- 37.4 Building Blocks Example
- 39. Enterprise Continuum
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
review
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.2 Determine Business Constraints for Implementation
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
reviewers
- Frontmatter
- Participants
reviewing
- 26. Business Scenarios
- 26.3 Creating the Business Scenario
reviews
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
- 48.6 Architecture Compliance Review Guidelines
revisit
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
rigor
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
risk
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
risk assessment
- 31. Risk Management
risk classification
- 31. Risk Management
risk identification
- 31. Risk Management
risk management
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 31. Risk Management
- A. Glossary of Supplementary Definitions
risk management, best practice
- 31. Risk Management
Risk Management Plan
- 31. Risk Management
risk monitoring
- 31. Risk Management
risks
- 7. Phase A: Architecture Vision
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
RM
- 3. Definitions
RM-ODP
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
roadmap
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 14. Phase F: Migration Planning
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
roadmap components
- 8. Phase B: Business Architecture
- 8.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
role
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 47. Architecture Board
- 49. Architecture Contracts
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
- 52.5 Enterprise Architecture Role and Skill Definitions
- 52.6 Generic Role and Skills of the Enterprise Architect
Role catalog
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
roles
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
Role/System
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
Role/System matrix
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
RosettaNet
- 8. Phase B: Business Architecture
- 8.2 Approach
SA-CMM
- 51. Architecture Maturity Models
- 51.2 Background
- 51.4 Capability Maturity Models Integration (CMMI)
safe
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
safety-critical/mission-critical/non-critical
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
said
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
SalesApp
- 37. Building Blocks
- 37.4 Building Blocks Example
SANS Institute
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
SBB
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 35. Architectural Artifacts
- 35.22 Developing an Acquirer View
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.1 Overview
- 37.2 Introduction to Building Blocks
scalability
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- A. Glossary of Supplementary Definitions
SCAMPI
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
scenario
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 26. Business Scenarios
schedule
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.6 Generate the Architecture Implementation Roadmap (Time-Lined) and Migration Plan
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
scope
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 15. Phase G: Implementation Governance
- 37. Building Blocks
- 37.4 Building Blocks Example
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
Scope/Focus
- 5. Introduction
- 5.5 Scoping the Architecture
Scope/Level
- 5. Introduction
- 5.5 Scoping the Architecture
scoping
- 5. Introduction
scoping the architecture
- 5. Introduction
scripts
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
SE-CMM
- 51. Architecture Maturity Models
- 51.2 Background
- 51.4 Capability Maturity Models Integration (CMMI)
secure
- 7. Phase A: Architecture Vision
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
security
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 21. Security Architecture and the ADM
- 21.3 Guidance on Security for the Architecture Domains
- 21.4 ADM Architecture Requirements Management
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- Determine whom/how much it is acceptable to inconvenience in utilizing security measures
- Determine and document appropriate security forensic processes
- Determine and document how much security (cost) is justified by the threats and the value of the assets at risk
- Assess alignment or conflict of identified security policies with business goals
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
security architecture
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 21. Security Architecture and the ADM
security, architecture domains
- 21. Security Architecture and the ADM
security association
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
security context
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
security management
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
security mechanisms
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
Security/Protection
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
security-related
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
security-relevant
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
security services
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
security services, allocation
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
security-specific
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
segment
- 3. Definitions
Segment Architecture
- 3. Definitions
- 41. Architecture Repository
SEI
- 51. Architecture Maturity Models
select
- 6. Preliminary Phase
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
sensitivity
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
sequence
- A. Glossary of Supplementary Definitions
server
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
- A. Glossary of Supplementary Definitions
service
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.1 Service Qualities and TOGAF
- 22.8.2 Purpose of a Service Contract
- 22.8.3 Service Governance Considerations
service contract
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
service contract, content & structure
- 22. Using TOGAF to Define & Govern SOAs
service contract, guidelines for definition
- 22. Using TOGAF to Define & Govern SOAs
service contract, purpose of
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
service contract, template
- 22. Using TOGAF to Define & Govern SOAs
Service/Function
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
service governance considerations
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
Service/Information
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
service-level agreement
- 25. Architecture Patterns
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 47. Architecture Board
- 49. Architecture Contracts
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
service lifecycle management
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
service management
- 2. Core Concepts
- 3. Definitions
Service Management Repository
- 41. Architecture Repository
service metadata
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
service modeling
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
service orientation
- 3. Definitions
Service Oriented Architecture
service policies
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
- 22.8.3 Service Governance Considerations
service qualities
- A. Glossary of Supplementary Definitions
service qualities, and TOGAF
- 22. Using TOGAF to Define & Govern SOAs
- 22.8 Guidelines for Service Contract Definition
service qualities, Application Platform
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
service qualities, TRM
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.3 Application Platform Service Qualities
services
- 3. Definitions
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
services extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
services, network
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
services, operating system
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
service sprawl
- 22. Using TOGAF to Define & Govern SOAs
services, system security management
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
set
- 23. Architecture Principles
setting
- 47. Architecture Board
sharing
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
SIB
- 2. Core Concepts
- 3. Definitions
- 41. Architecture Repository
sign-off
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
simple
- 35. Architectural Artifacts
- 35.1 Basic Concepts
simplification change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
single
- 20. Applying the ADM at Different Enterprise Levels
- 20.4 ADM Cycle Approaches
size
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
skill
- 3. Definitions
- 15. Phase G: Implementation Governance
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
SLA
- 22. Using TOGAF to Define & Govern SOAs
- 25. Architecture Patterns
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 47. Architecture Board
- 49. Architecture Contracts
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
SMAP
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
SMART
- 26. Business Scenarios
- 26.1 Introduction
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
SNA
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
SOA
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 22. Using TOGAF to Define & Govern SOAs
SOA, and enterprise architecture
- 22. Using TOGAF to Define & Govern SOAs
SOA, and TOGAF
- 22. Using TOGAF to Define & Govern SOAs
SOA, business-led community
- 22. Using TOGAF to Define & Govern SOAs
SOA, complexities from
- 22. Using TOGAF to Define & Govern SOAs
SOAs
software
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
- 35.17.2 Key Issues
Software Distribution diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
Software Engineering diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
software engineering services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
Software Engineering view
- 35. Architectural Artifacts
software modularity
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
software portability
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
software re-use
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.1 Stakeholders and Concerns
software tiers
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
solution
- 3. Definitions
- 35. Architectural Artifacts
- 35.8 Viewpoints in Phase A
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
solution architect
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
Solution Architecture
- 3. Definitions
solution building block
- 3. Definitions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
solution characteristics
- 40. Architecture Partitioning
Solution Concept diagram
- 35. Architectural Artifacts
- 35.8 Viewpoints in Phase A
solutions
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.3 Review and Consolidate Gap Analysis Results from Phases B to D
- 13.4.5 Consolidate and Reconcile Interoperability Requirements
Solutions Continuum
- 2. Core Concepts
- 3. Definitions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
some
- 25. Architecture Patterns
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
something
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
space
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
specific
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
specifically
- 1. Introduction
- 1.2 Executive Overview
specification
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 37.2.3 Architecture Building Blocks
- 37.2.4 Solution Building Blocks
- 37.3 Building Blocks and the ADM
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
- A. Glossary of Supplementary Definitions
SQL
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
stability
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
stakeholder
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 24. Stakeholder Management
- 24.2 Approach to Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
stakeholder management
- 2. Core Concepts
- 3. Definitions
- 24. Stakeholder Management
Stakeholder Management, process steps
- 24. Stakeholder Management
Stakeholder Map matrix
- 35. Architectural Artifacts
- 35.8 Viewpoints in Phase A
stakeholders
- 7. Phase A: Architecture Vision
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 35. Architectural Artifacts
- 35.15 Developing a Business Architecture View
- 35.16 Developing an Enterprise Security View
- 35.17 Developing a Software Engineering View
- 35.18 Developing a System Engineering View
- 35.19 Developing a Communications Engineering View
- 35.20 Developing a Data Flow View
- 35.21 Developing an Enterprise Manageability View
- 35.22 Developing an Acquirer View
standard
- 41. Architecture Repository
- 41.4 Standards Information Base
standardization
- 42. Tools for Architecture Development
standards
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 41. Architecture Repository
- 41.4 Standards Information Base
standards, classification
- 41. Architecture Repository
- 41.4 Standards Information Base
standards, compliance with
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
Standards Information Base
- 2. Core Concepts
- 3. Definitions
- 41. Architecture Repository
- 41.4 Standards Information Base
standards, lifecycle
- 41. Architecture Repository
- 41.4 Standards Information Base
standards, types of
- 41. Architecture Repository
- 41.4 Standards Information Base
state
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.6 Generate the Architecture Implementation Roadmap (Time-Lined) and Migration Plan
- 28. Migration Planning Techniques
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
statement
- 7. Phase A: Architecture Vision
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 49. Architecture Contracts
- 49.2 Contents
Statement of Architecture Work
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 49. Architecture Contracts
- 49.2 Contents
states
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
status
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
STEP Framework
- 8. Phase B: Business Architecture
- 8.2 Approach
steps
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 24. Stakeholder Management
- 27. Gap Analysis
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
steward
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
storage
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
stored/created/used
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
strategic
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.2 Determine Business Constraints for Implementation
- 13.4.8 Formulate High-Level Implementation and Migration Strategy
Strategic Architecture
- 3. Definitions
- 41. Architecture Repository
strategy
- 13. Phase E: Opportunities & Solutions
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
strict
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
strict isolation
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.3 Basic Concepts
structure
- 1. Introduction
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 4.4 Mapping of TOGAF 9 Structure to TOGAF 8.1.1
- 5. Introduction
- 5.2 Architecture Development Cycle
- 22. Using TOGAF to Define & Govern SOAs
- 33. Introduction
- 37. Building Blocks
- 37.4 Building Blocks Example
- 38. Introduction
- 45. Introduction
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
structured analysis
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
style
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 19. Applying Iteration to the ADM
subject matter
- 40. Architecture Partitioning
subsystems
- 21. Security Architecture and the ADM
success
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
successful
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- A. Glossary of Supplementary Definitions
suggested
- 27. Gap Analysis
summary
- 5. Introduction
- 26. Business Scenarios
- 29. Interoperability Requirements
- 31. Risk Management
- 32. Capability-Based Planning
supplementary
supplier
- A. Glossary of Supplementary Definitions
supplier management
- 2. Core Concepts
- A. Glossary of Supplementary Definitions
support
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
supporting
- 5. Introduction
- 5.1 ADM Overview
supports
- 22. Using TOGAF to Define & Govern SOAs
SW-CMM
- 51. Architecture Maturity Models
- 51.2 Background
- 51.4 Capability Maturity Models Integration (CMMI)
synchronization
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
system
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.6 Phase A: Architecture Vision
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
- 21.12 Phase G: Implementation Governance
- Implement methods and procedures to review evidence produced by the system that reflects operational stability and adherence to security policies
- Implement necessary training to ensure correct deployment, configuration, and operations of security-relevant subsystems and components; ensure awareness training of all users and non-privileged operators of the system and/or its components
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
- 35.18 Developing a System Engineering View
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.6 Architecture Modeling
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- A. Glossary of Supplementary Definitions
- A.7 Business System
- A.13 Communications System
- A.26 Database Management System
- A.31 Enterprise Resource Planning (ERP) System
- A.41 Information System (IS)
- A.42 Information System Service
- A.59 Open System
- A.61 Operating System Service
- A.84 System
- A.85 System and Network Management Service
- A.86 System Stakeholder
system and network management service
- A. Glossary of Supplementary Definitions
system architect
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
System/Data
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
System/Data matrix
- 35. Architectural Artifacts
- 35.10 Viewpoints in the Phase C Data Architecture
System Engineering view
- 35. Architectural Artifacts
System/Function
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
System/Function matrix
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
system management services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
System/Organization
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
System/Organization matrix
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
systems
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
system(s
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
systems
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
system security management services
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
system stakeholder
- A. Glossary of Supplementary Definitions
System/Technology
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
System/Technology matrix
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
System Use-Case diagram
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
table
- 28. Migration Planning Techniques
TADG
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
TAFIM
- 1. Introduction
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
tailor
- 6. Preliminary Phase
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
tailored
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Tailored Architecture Framework
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
tailoring
- 48. Architecture Compliance
- 48.6 Architecture Compliance Review Guidelines
Take-On
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
target
- 3. Definitions
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
Target Architecture
- 3. Definitions
Target Architecture Description
- 5. Introduction
- 5.5 Scoping the Architecture
targets
- 16. Phase H: Architecture Change Management
taxonomy
- 3. Definitions
- 35. Architectural Artifacts
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 43.4 Application Platform - Taxonomy
- 43.4.1 Basic Principles
- 43.4.3 Application Platform Service Qualities
taxonomy of architecture views
- 3. Definitions
TCP/IP
- 35. Architectural Artifacts
- 35.19 Developing a Communications Engineering View
- 35.19.2 Key Issues
team
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
technical
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 37. Building Blocks
- 37.4 Building Blocks Example
- 37.4.5 Identifying Building Block Requirements and Constraints
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
- Frontmatter
- Participants
Technical Reference Model
- 3. Definitions
- 43. Foundation Architecture: Technical Reference Model
technique
- 5. Introduction
- 5.1 ADM Overview
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.2 Assign a Business Value to Each Project
- 18. Introduction
- 28. Migration Planning Techniques
technologies
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
technology
- 3. Definitions
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 12.4.2 Develop Baseline Technology Architecture Description
- 12.4.3 Develop Target Technology Architecture Description
- 12.4.8 Finalize the Technology Architecture
Technology Architecture
- 2. Core Concepts
- 3. Definitions
- 12. Phase D: Technology Architecture
technology building blocks
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
technology component
- 22. Using TOGAF to Define & Govern SOAs
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- A. Glossary of Supplementary Definitions
technology governance
- 50. Architecture Governance
Technology Portfolio catalog
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
technology principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
Technology Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
Technology Standards catalog
- 35. Architectural Artifacts
- 35.12 Viewpoints in Phase D
TeleManagement Forum
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.2 Approach
template
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
- 22. Using TOGAF to Define & Govern SOAs
- 24. Stakeholder Management
terminology
- 25. Architecture Patterns
- 25.1 Introduction
- 48. Architecture Compliance
terminology tailoring
- 6. Preliminary Phase
terms
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
tested
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
textual
- 26. Business Scenarios
- 26.8 Guidelines on Business Scenario Documentation
that
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
- 21.12 Phase G: Implementation Governance
their
- 26. Business Scenarios
- 26.7 Guidelines on Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
this
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- Frontmatter
- Preface
though
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
threats
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
Three-Tier
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
through
- 14. Phase F: Migration Planning
tier
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
time
- 5. Introduction
- 5.5 Scoping the Architecture
- 40. Architecture Partitioning
- A. Glossary of Supplementary Definitions
Time-Lined
- 14. Phase F: Migration Planning
time period
- 5. Introduction
- 5.5 Scoping the Architecture
Time-Spans
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.5 Confirm Transition Architecture Increments/Phases and Update Architecture Definition Document
timing
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
TMF
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.2 Approach
TOGAF
- 1. Introduction
TOGAF ADM
- 16. Phase H: Architecture Change Management
- 36. Architecture Deliverables
- 39. Enterprise Continuum
TOGAF TRM
- 12. Phase D: Technology Architecture
- 12.2 Approach
- 35. Architectural Artifacts
- 35.18 Developing a System Engineering View
- 35.18.2 Key Issues
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
tool
- 6. Preliminary Phase
- 6.4 Steps
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
- 35. Architectural Artifacts
- 42. Tools for Architecture Development
- 42.2 Issues in Tool Standardization
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
trademarks
- Frontmatter
training
- 21. Security Architecture and the ADM
transaction
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
transaction processing services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
transaction sequence
- A. Glossary of Supplementary Definitions
transaction transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
transformation
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.7 Confirm Readiness and Risk for Business Transformation
- 13.4.9 Identify and Group Major Work Packages
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.1 Confirm Management Framework Interactions for Implementation and Migration Plan
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
transformation readiness assessment
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
transition
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.1 Determine/Confirm Key Corporate Change Attributes
- 13.4.10 Identify Transition Architectures
Transition Architecture
- 3. Definitions
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Transition Architecture Description
- 5. Introduction
- 5.5 Scoping the Architecture
transition planning
- 19. Applying Iteration to the ADM
transparency
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
treasury
- 25. Architecture Patterns
Trial Standard
- 41. Architecture Repository
- 41.4 Standards Information Base
triggering
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
triggers
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
TRM
- 3. Definitions
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 43.3 TRM in Detail
- 43.3.2 TRM Entities and Interfaces
- 43.3.4 Application Platform
TRM, detail
- 43. Foundation Architecture: Technical Reference Model
TRM graphic
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 43.4 Application Platform - Taxonomy
TRMs
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
trust
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
trustee
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
trying
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
two
- 19. Applying Iteration to the ADM
Two-Tier
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
types
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 41. Architecture Repository
- 41.4 Standards Information Base
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
UML
- 8. Phase B: Business Architecture
- 8.2 Approach
UN/CEFACT
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
under
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
understand
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
unit
- A. Glossary of Supplementary Definitions
up
- 47. Architecture Board
update
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.11 Create Portfolio and Project Charters and Update the Architectures
upon
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
US
- 25. Architecture Patterns
- 51. Architecture Maturity Models
usability
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
US DoD
use
- 4. Release Notes
- 4.5 Using TOGAF
- 25. Architecture Patterns
- 25.1 Introduction
Use-Case
- 35. Architectural Artifacts
- 35.9 Viewpoints in Phase B
- 35.11 Viewpoints in the Phase C Application Architecture
- 37. Building Blocks
- 37.4 Building Blocks Example
- A. Glossary of Supplementary Definitions
use-case analysis
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
use-case model
- 8. Phase B: Business Architecture
- 8.2 Approach
used
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
useful
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
user
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.11 Viewpoints in the Phase C Application Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
user interface services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
users
- 21. Security Architecture and the ADM
- 49. Architecture Contracts
uses
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
using
- 1. Introduction
- 1.2 Executive Overview
- 2. Core Concepts
- 4. Release Notes
- 20. Applying the ADM at Different Enterprise Levels
- 20.4 ADM Cycle Approaches
- 22. Using TOGAF to Define & Govern SOAs
utilities
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
utilizing
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
v
- 38. Introduction
validate
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.4 Prioritize the Migration Projects through the Conduct of a Cost/Benefit Assessment and Risk Validation
validation
- 14. Phase F: Migration Planning
value
- 7. Phase A: Architecture Vision
- 14. Phase F: Migration Planning
- 14.4 Steps
Value Chain diagram
- 35. Architectural Artifacts
- 35.8 Viewpoints in Phase A
values
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
vehicle
- 14. Phase F: Migration Planning
- 14.4 Steps
- 14.4.3 Estimate Resource Requirements, Project Timings, and Availability/Delivery Vehicles
vendor
- 26. Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 42. Tools for Architecture Development
- 42.3 Evaluation Criteria and Guidelines
- 42.3.1 Tool Criteria
versus
- 16. Phase H: Architecture Change Management
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
vertical
- 5. Introduction
- 5.5 Scoping the Architecture
vertical scope
- 5. Introduction
- 5.5 Scoping the Architecture
view
- 3. Definitions
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.2 Developing Views in the ADM
- 35.15 Developing a Business Architecture View
view, Acquirer
- 35. Architectural Artifacts
view, Communications Engineering
- 35. Architectural Artifacts
view, Data Flow
- 35. Architectural Artifacts
view, Enterprise Manageability
- 35. Architectural Artifacts
view, Enterprise Security
- 35. Architectural Artifacts
viewpoint
- 3. Definitions
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 24. Stakeholder Management
- 35. Architectural Artifacts
- 35.1 Basic Concepts
viewpoints, examples
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
views
- 3. Definitions
- 24. Stakeholder Management
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 35. Architectural Artifacts
views, creation
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
views, examples
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
views, guidelines
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
view, Software Engineering
- 35. Architectural Artifacts
view, System Engineering
- 35. Architectural Artifacts
VII
- 45. Introduction
vision
- 3. Definitions
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 7.4 Steps
volatility
- 40. Architecture Partitioning
volere
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Resources
warrant
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
we
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
what
- 1. Introduction
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
what's
- 4. Release Notes
where
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
which
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
who
- 1. Introduction
- 1.2 Executive Overview
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
whom/how
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
why
- 1. Introduction
- 4. Release Notes
will
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
within
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 20. Applying the ADM at Different Enterprise Levels
- 20.4 ADM Cycle Approaches
- 40. Architecture Partitioning
- 40.4 Applying Classification to Create Partitioned Architectures
- 41. Architecture Repository
- 41.4 Standards Information Base
- 50. Architecture Governance
- 50.1 Introduction
work
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.9 Identify and Group Major Work Packages
workflow
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 13.4.6 Refine and Validate Dependencies
work package
- 3. Definitions
would
- 1. Introduction
wrapping process
- 35. Architectural Artifacts
- 35.16 Developing an Enterprise Security View
- 35.16.5 Security Services Allocation
wrong
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
WSDL definition
- 22. Using TOGAF to Define & Govern SOAs
XML
- 35. Architectural Artifacts
- 35.17 Developing a Software Engineering View
- 35.17.2 Key Issues
XSD schema
- 22. Using TOGAF to Define & Govern SOAs
your
- 39. Enterprise Continuum
- 39.6 Enterprise Continuum and Your Organization
Zachman Framework
- 5. Introduction
The TOGAF document set is designed for use with frames. To navigate around the document:
Downloads of the TOGAF documentation, are available under license from the TOGAF information web site. The license is free to any organization wishing to use TOGAF entirely for internal purposes (for example, to develop an information system architecture for use within that organization). A book is also available (in hardcopy and pdf) from The Open Group Bookstore as document G091.