return to top of pagea.10
- A. Glossary of Supplementary Definitions
a.11
- A. Glossary of Supplementary Definitions
a.12
- A. Glossary of Supplementary Definitions
a.13
- A. Glossary of Supplementary Definitions
a.14
- A. Glossary of Supplementary Definitions
a.1
- A. Glossary of Supplementary Definitions
a.15
- A. Glossary of Supplementary Definitions
a.16
- A. Glossary of Supplementary Definitions
a.17
- A. Glossary of Supplementary Definitions
a.18
- A. Glossary of Supplementary Definitions
a.19
- A. Glossary of Supplementary Definitions
a.20
- A. Glossary of Supplementary Definitions
a.21
- A. Glossary of Supplementary Definitions
a.22
- A. Glossary of Supplementary Definitions
a.23
- A. Glossary of Supplementary Definitions
a.24
- A. Glossary of Supplementary Definitions
a.2
- A. Glossary of Supplementary Definitions
a.25
- A. Glossary of Supplementary Definitions
a.26
- A. Glossary of Supplementary Definitions
a.27
- A. Glossary of Supplementary Definitions
a.28
- A. Glossary of Supplementary Definitions
a.29
- A. Glossary of Supplementary Definitions
a.30
- A. Glossary of Supplementary Definitions
a.31
- A. Glossary of Supplementary Definitions
a.32
- A. Glossary of Supplementary Definitions
a.33
- A. Glossary of Supplementary Definitions
a.34
- A. Glossary of Supplementary Definitions
a.3
- A. Glossary of Supplementary Definitions
a.35
- A. Glossary of Supplementary Definitions
a.36
- A. Glossary of Supplementary Definitions
a.37
- A. Glossary of Supplementary Definitions
a.38
- A. Glossary of Supplementary Definitions
a.39
- A. Glossary of Supplementary Definitions
a.40
- A. Glossary of Supplementary Definitions
a.41
- A. Glossary of Supplementary Definitions
a.42
- A. Glossary of Supplementary Definitions
a.43
- A. Glossary of Supplementary Definitions
a.44
- A. Glossary of Supplementary Definitions
a.4
- A. Glossary of Supplementary Definitions
a.45
- A. Glossary of Supplementary Definitions
a.46
- A. Glossary of Supplementary Definitions
a.47
- A. Glossary of Supplementary Definitions
a.48
- A. Glossary of Supplementary Definitions
a.49
- A. Glossary of Supplementary Definitions
a.50
- A. Glossary of Supplementary Definitions
a.51
- A. Glossary of Supplementary Definitions
a.52
- A. Glossary of Supplementary Definitions
a.53
- A. Glossary of Supplementary Definitions
a.54
- A. Glossary of Supplementary Definitions
a.5
- A. Glossary of Supplementary Definitions
a.55
- A. Glossary of Supplementary Definitions
a.56
- A. Glossary of Supplementary Definitions
a.57
- A. Glossary of Supplementary Definitions
a.58
- A. Glossary of Supplementary Definitions
a.59
- A. Glossary of Supplementary Definitions
A5 interoperability
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
a.60
- A. Glossary of Supplementary Definitions
a.61
- A. Glossary of Supplementary Definitions
a.62
- A. Glossary of Supplementary Definitions
a.63
- A. Glossary of Supplementary Definitions
a.64
- A. Glossary of Supplementary Definitions
a.6
- A. Glossary of Supplementary Definitions
a.65
- A. Glossary of Supplementary Definitions
a.66
- A. Glossary of Supplementary Definitions
a.67
- A. Glossary of Supplementary Definitions
a.68
- A. Glossary of Supplementary Definitions
a.69
- A. Glossary of Supplementary Definitions
a.70
- A. Glossary of Supplementary Definitions
a.71
- A. Glossary of Supplementary Definitions
a.72
- A. Glossary of Supplementary Definitions
a.73
- A. Glossary of Supplementary Definitions
a.74
- A. Glossary of Supplementary Definitions
a.7
- A. Glossary of Supplementary Definitions
a.75
- A. Glossary of Supplementary Definitions
a.76
- A. Glossary of Supplementary Definitions
a.77
- A. Glossary of Supplementary Definitions
a.78
- A. Glossary of Supplementary Definitions
a.79
- A. Glossary of Supplementary Definitions
a.80
- A. Glossary of Supplementary Definitions
a.81
- A. Glossary of Supplementary Definitions
a.82
- A. Glossary of Supplementary Definitions
a.83
- A. Glossary of Supplementary Definitions
a.84
- A. Glossary of Supplementary Definitions
a.8
- A. Glossary of Supplementary Definitions
a.85
- A. Glossary of Supplementary Definitions
a.86
- A. Glossary of Supplementary Definitions
a.87
- A. Glossary of Supplementary Definitions
a.88
- A. Glossary of Supplementary Definitions
a.89
- A. Glossary of Supplementary Definitions
a.90
- A. Glossary of Supplementary Definitions
a.91
- A. Glossary of Supplementary Definitions
a.92
- A. Glossary of Supplementary Definitions
a.9
- A. Glossary of Supplementary Definitions
ABB
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.1 Overview
- 37.2 Introduction to Building Blocks
abbreviations
about
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- Frontmatter
absolute
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
absolute protection
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
abstraction
- 3. Definitions
AC
- A. Glossary of Supplementary Definitions
acceptable
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
acceptance
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
access
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
- A. Glossary of Supplementary Definitions
access control
- A. Glossary of Supplementary Definitions
accessible
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.2 Data Principles
access transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
accuracy
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
achieve
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
achieving
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
acknowledgements
- Frontmatter
ACL
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
ACMM
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
acquirer
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
Acquirer view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
across
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 20. Applying the ADM across the Architecture Landscape
actions
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
actions/events
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
activate
- 16. Phase H: Architecture Change Management
Active Store
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
activities
- 7. Phase A: Architecture Vision
- 22. Using TOGAF to Define & Govern SOAs
- 22.6 SOA and Levels
- 40. Architecture Partitioning
- 40.2 Applying Classification to Create Partitioned Architectures
activity model
- 8. Phase B: Business Architecture
- 8.2 Approach
actor
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
Actor/Role
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Actor/Role matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
actors
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
Ada
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
- A. Glossary of Supplementary Definitions
adapting
- 5. Introduction
- 18. Introduction
additional
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
address
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
addressing
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
adherence
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
ADM
- 1. Introduction
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 5. Introduction
ADM guidelines and techniques
- 1. Introduction
- 5. Introduction
- 5.1 ADM Overview
- 18. Introduction
administration
- 21. Security Architecture and the ADM
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
ADM iteration
ADM, requirements management
adopting
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
agenda
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
alignment
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
all
- 21. Security Architecture and the ADM
allocation
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 35.7.5 Developing a Communications Engineering View
amp
- 13. Phase E: Opportunities & Solutions
analysis
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 16. Phase H: Architecture Change Management
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 24.3.1 Identify Stakeholders
- 27. Gap Analysis
analyzing
- 26. Business Scenarios and Business Goals
- 26.3 Creating the Business Scenario
and/or
- 21. Security Architecture and the ADM
anticipated
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
any
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
AOB
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
API
- 3. Definitions
applicable
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
application
- 3. Definitions
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 11.4.2 Develop Baseline Application Architecture Description
- 11.4.3 Develop Target Application Architecture Description
- 11.4.8 Finalize the Application Architecture
Application and User Location diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Application Architecture
- 2. Core Concepts
- 3. Definitions
- 11. Phase C: Information Systems Architectures - Application Architecture
application building blocks
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
Application Communication diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
application component
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- A. Glossary of Supplementary Definitions
Application/Data
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
Application/Data matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
Application/Function
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Application/Function matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Application Interaction matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
application logic
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
Application Migration diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Application/Organization
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Application/Organization matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Application Platform
- 3. Definitions
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
- 44.3 Detailed Taxonomy
application platform interface
- 3. Definitions
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
Application Platform, service qualities
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
Application Platform, taxonomy
- 43. Foundation Architecture: Technical Reference Model
application portability
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
Application Portfolio catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
application principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
applications
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
Application Software
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
- A. Glossary of Supplementary Definitions
Applications Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
Application/Technology
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
Application/Technology matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
Application Use-Case diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
applied
- 4. Release Notes
applying
- 19. Applying Iteration to the ADM
- 20. Applying the ADM across the Architecture Landscape
- 23. Architecture Principles
- 40. Architecture Partitioning
applying the ADM
approach
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 24. Stakeholder Management
- 24.2 Approach to Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.3 Applications Checklists
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
approaches
- 19. Applying Iteration to the ADM
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
appropriate
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.10 Phase E: Opportunities & Solutions
approval
- 7. Phase A: Architecture Vision
- 41. Architecture Repository
- 41.7 External Repositories
architect
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
architecting
- 49. Architecture Contracts
architects
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
architectural
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 6. Preliminary Phase
- 6.3 Inputs
- 7. Phase A: Architecture Vision
- 7.3 Inputs
- 8. Phase B: Business Architecture
- 8.3 Inputs
- 9. Phase C: Information Systems Architectures
- 9.3 Inputs
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.3 Inputs
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.3 Inputs
- 12. Phase D: Technology Architecture
- 12.3 Inputs
- 13. Phase E: Opportunities & Solutions
- 13.3 Inputs
- 14. Phase F: Migration Planning
- 14.3 Inputs
- 15. Phase G: Implementation Governance
- 15.3 Inputs
- 16. Phase H: Architecture Change Management
- 16.3 Inputs
- 18. Introduction
- 35. Architectural Artifacts
architectural artifact
architectural artifact, concepts
- 35. Architectural Artifacts
architectural style
- 3. Definitions
- 18. Introduction
architecture
- 1. Introduction
- 2. Core Concepts
- 2.2 What is Architecture in the Context of TOGAF?
- 2.3 What Kind of Architecture Does TOGAF Deal With?
- 2.4 Architecture Development Method
- 2.7 Architecture Repository
- 2.8 Establishing and Maintaining an Enterprise Architecture Capability
- 2.9 Establishing the Architecture Capability as an Operational Entity
- 3. Definitions
- 3.4 Application Architecture
- 3.8 Architecture
- 3.9 Architecture Building Block (ABB)
- 3.10 Architecture Continuum
- 3.11 Architecture Development Method (ADM)
- 3.12 Architecture Domain
- 3.13 Architecture Framework
- 3.14 Architecture Governance
- 3.15 Architecture Landscape
- 3.16 Architecture Principles
- 3.17 Architecture Vision
- 3.22 Business Architecture
- 3.27 Capability Architecture
- 3.32 Data Architecture
- 3.36 Foundation Architecture
- 3.62 Segment Architecture
- 3.64 Service Oriented Architecture (SOA)
- 3.65 Solution Architecture
- 3.70 Strategic Architecture
- 3.71 Target Architecture
- 3.72 Taxonomy of Architecture Views
- 3.73 Technology Architecture
- 3.74 Transition Architecture
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 5.1 ADM Overview
- 5.2 Architecture Development Cycle
- 5.4 Architecture Governance
- 5.5 Scoping the Architecture
architecture artifacts
- 35. Architectural Artifacts
Architecture Board
- 5. Introduction
- 47. Architecture Board
architecture building block
- 3. Definitions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
Architecture/Business
- 6. Preliminary Phase
Architecture Capability
- 2. Core Concepts
- 19. Applying Iteration to the ADM
- 41. Architecture Repository
- 46. Establishing an Architecture Capability
Architecture Capability Framework
- 1. Introduction
- 45. Introduction
architecture change management
Architecture Compliance
- 48. Architecture Compliance
Architecture Compliance, checklists
- 48. Architecture Compliance
Architecture Compliance, guidelines
- 48. Architecture Compliance
Architecture Compliance, review
- 48. Architecture Compliance
Architecture Compliance, review process
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
Architecture Content Framework
- 1. Introduction
- 33. Introduction
Architecture Continuum
- 2. Core Concepts
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
Architecture Contract
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 49. Architecture Contracts
architecture, definition
- 2. Core Concepts
Architecture Definition Document
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
architecture deliverables
architecture description
- 35. Architectural Artifacts
architecture development
- 19. Applying Iteration to the ADM
- 42. Tools for Architecture Development
Architecture Development Method
- 1. Introduction
- 3. Definitions
- 5. Introduction
architecture development, techniques
- 18. Introduction
architecture domain
- 3. Definitions
- 5. Introduction
- 5.5 Scoping the Architecture
architecture domains, security
- 21. Security Architecture and the ADM
architecture engagement
- 19. Applying Iteration to the ADM
Architecture Forum
Architecture Framework
- 3. Definitions
architecture governance
- 3. Definitions
- 5. Introduction
- 6. Preliminary Phase
- 6.2 Approach
- 15. Phase G: Implementation Governance
- 19. Applying Iteration to the ADM
- 47. Architecture Board
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.1 Levels of Governance within the Enterprise
- 50.1.5 Architecture Governance: Overview
Architecture Governance Framework
- 50. Architecture Governance
Architecture Governance Framework, structure
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
architecture governance, implementation
- 50. Architecture Governance
architecture integration
- 5. Introduction
Architecture Landscape
- 2. Core Concepts
- 3. Definitions
- 20. Applying the ADM across the Architecture Landscape
- 41. Architecture Repository
Architecture Metamodel
- 2. Core Concepts
- 41. Architecture Repository
architecture models
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
architecture partition
- 5. Introduction
architecture partitioning
architecture pattern
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
architecture pattern, content
- 25. Architecture Patterns
- 25.1 Introduction
Architecture Principles
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 23. Architecture Principles
architecture principles, characteristics
- 23. Architecture Principles
architecture principles, components
- 23. Architecture Principles
architecture principles, criteria
- 23. Architecture Principles
- 23.4 Developing Architecture Principles
Architecture Report
- 11. Phase C: Information Systems Architectures - Application Architecture
Architecture Repository
- 2. Core Concepts
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 8. Phase B: Business Architecture
- 8.2 Approach
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 12. Phase D: Technology Architecture
- 12.2 Approach
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
architecture requirements management
- 21. Security Architecture and the ADM
Architecture Requirements Specification
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Architecture Roadmap
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
architectures
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 20. Applying the ADM across the Architecture Landscape
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 40. Architecture Partitioning
architecture, scoping
- 5. Introduction
Architecture Skills Framework
Architecture Skills Framework, proficiency levels
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
Architecture Skills Framework, skills
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
architecture view
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 35. Architectural Artifacts
Architecture Vision
- 3. Definitions
- 5. Introduction
- 7. Phase A: Architecture Vision
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
are
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.10 Phase E: Opportunities & Solutions
area
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
artifact
- 2. Core Concepts
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
- 35. Architectural Artifacts
ARTS
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
as
- 1. Introduction
- 1.2 Executive Overview
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.8 Phase C: Information Systems Architectures
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.5 Architecture Governance: Overview
ask
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
aspects
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
assess
- 7. Phase A: Architecture Vision
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 30. Business Transformation Readiness Assessment
assessment
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 28. Migration Planning Techniques
- 30. Business Transformation Readiness Assessment
- 31. Risk Management
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
asset
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.2 Data Principles
asset protection
- 21. Security Architecture and the ADM
assets
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
assign
- 14. Phase F: Migration Planning
assigned
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
assumptions
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
assurance
- 21. Security Architecture and the ADM
attack
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
attributes
- 13. Phase E: Opportunities & Solutions
- 34. Content Metamodel
audience
- Frontmatter
- Preface
audit
- 21. Security Architecture and the ADM
audit information
- 5. Introduction
authentication
- 21. Security Architecture and the ADM
authorization
- 21. Security Architecture and the ADM
availability
- 21. Security Architecture and the ADM
- 21.3 Guidance on Security for the Architecture Domains
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- A. Glossary of Supplementary Definitions
Availability/Delivery
- 14. Phase F: Migration Planning
available
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
avenues
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
awareness
- 21. Security Architecture and the ADM
b
- 8. Phase B: Business Architecture
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
background
- 25. Architecture Patterns
- 25.1 Introduction
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 51. Architecture Maturity Models
base
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 41. Architecture Repository
- 41.4 Standards Information Base
baseline
- 3. Definitions
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
Baseline Application Architecture Description
- 11. Phase C: Information Systems Architectures - Application Architecture
Baseline Data Architecture Description
- 10. Phase C: Information Systems Architectures - Data Architecture
Baseline Description
- 8. Phase B: Business Architecture
- 8.2 Approach
baseline first
- 19. Applying Iteration to the ADM
Baseline Technology Architecture Description
- 12. Phase D: Technology Architecture
basic
- 5. Introduction
- 5.2 Architecture Development Cycle
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 44. Integrated Information Infrastructure Reference Model
basis
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
batch
- A. Glossary of Supplementary Definitions
batch processing
- A. Glossary of Supplementary Definitions
be
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.6 Phase A: Architecture Vision
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 35. Architectural Artifacts
benefit
- 1. Introduction
- 1.2 Executive Overview
- 4. Release Notes
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 26. Business Scenarios and Business Goals
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.7 Phase E: Opportunities and Solutions
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
Benefits diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.7 Phase E: Opportunities and Solutions
between
- 19. Applying Iteration to the ADM
- 19.5 Iteration Considerations
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
- 49. Architecture Contracts
beyond
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
block
- 2. Core Concepts
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
board
- 41. Architecture Repository
- 41.7 External Repositories
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
Board-Level
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.5 Architecture Governance: Overview
both
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
boundaries
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
boundaryless
- 3. Definitions
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
Boundaryless Information Flow
- 3. Definitions
BPMN
- 8. Phase B: Business Architecture
- 8.2 Approach
breadth
- 5. Introduction
- 5.5 Scoping the Architecture
- 20. Applying the ADM across the Architecture Landscape
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
breadth, enterprise
- 5. Introduction
- 5.5 Scoping the Architecture
breakdown
- 43. Foundation Architecture: Technical Reference Model
brokerage
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
brokerage applications
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
BTEP
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
BTEP, Readiness Rating Scheme
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
building
- 2. Core Concepts
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
building block
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 37. Building Blocks
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
building blocks, characteristics
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
building blocks, design
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 37.3.1 Basic Principles
bus
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
business
- 3. Definitions
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 7.4 Steps
- 7.4.2 Identify Stakeholders, Concerns, and Business Requirements
- 7.4.3 Confirm and Elaborate Business Goals, Business Drivers, and Constraints
- 7.4.4 Evaluate Business Capabilities
- 7.4.5 Assess Readiness for Business Transformation
- 7.4.7 Confirm and Elaborate Architecture Principles, including Business Principles
- 7.4.10 Identify the Business Transformation Risks and Mitigation Activities
- 8. Phase B: Business Architecture
- 8.2 Approach
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 8.4.2 Develop Baseline Business Architecture Description
- 8.4.3 Develop Target Business Architecture Description
- 8.4.8 Finalize the Business Architecture
business applications
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
Business Architecture
- 2. Core Concepts
- 3. Definitions
- 8. Phase B: Business Architecture
Business Architecture view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
Business Continuity Plan
- 31. Risk Management
business drivers
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Business Footprint diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
business function
- 3. Definitions
business goals
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
business governance
- 3. Definitions
Business Interaction matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
business modeling
- 8. Phase B: Business Architecture
- 8.2 Approach
business planning
- 6. Preliminary Phase
- 6.2 Approach
business principles
- 6. Preliminary Phase
- 6.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
business principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
business process model
- 8. Phase B: Business Architecture
- 8.2 Approach
Business Process Modeling Notation
- 8. Phase B: Business Architecture
- 8.2 Approach
business requirements
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.2 Phase A: Architecture Vision
- 26. Business Scenarios and Business Goals
business scenarios
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.3 Resources
- 26. Business Scenarios and Business Goals
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
business scenarios, descriptions
- 26. Business Scenarios and Business Goals
business scenarios, models
- 26. Business Scenarios and Business Goals
business scenarios, workshops
- 26. Business Scenarios and Business Goals
- 26.3 Creating the Business Scenario
business service
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
Business Service/Function catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Business Service/Information diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Business Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
business system
- A. Glossary of Supplementary Definitions
Business Transformation Readiness Assessment
Business Use-Case diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
by
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 35. Architectural Artifacts
c
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
Calendar
- 41. Architecture Repository
- 41.5 Governance Log
can
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
candidate
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
capabilities
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 32. Capability-Based Planning
capability
- 2. Core Concepts
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 46. Establishing an Architecture Capability
- 51. Architecture Maturity Models
Capability Architecture
- 3. Definitions
- 20. Applying the ADM across the Architecture Landscape
- 41. Architecture Repository
Capability Assessment
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
- 41.5 Governance Log
Capability-Based
- 32. Capability-Based Planning
capability-based planning
capability dimensions
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
Capability Framework
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
capability increment
- 3. Definitions
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
Capability Maturity Model
- 51. Architecture Maturity Models
cases
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
catalog
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.1 Preliminary Phase
- 35.6.3 Phase B: Business Architecture
- 35.6.4 Phase C: Data Architecture
- 35.6.5 Phase C: Application Architecture
- 35.6.6 Phase D: Technology Architecture
- 35.6.8 Requirements Management
- A. Glossary of Supplementary Definitions
catalog of application building blocks
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
catalogs
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
catalogs, building blocks
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
Catalyst
- 16. Phase H: Architecture Change Management
- 16.2 Approach
categories
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
Center of Excellence
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
centers
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
certification
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
chain
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
change
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
- 6. Preliminary Phase
- 13. Phase E: Opportunities & Solutions
- 16. Phase H: Architecture Change Management
change management
change management process
- 16. Phase H: Architecture Change Management
- 16.2 Approach
Change Request
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
changes
- 4. Release Notes
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.13 Phase H: Architecture Change Management
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 34.4.1 Governance Extensions
- 34.4.2 Services Extensions
- 34.4.3 Process Modeling Extensions
- 34.4.4 Data Extensions
- 34.4.5 Infrastructure Consolidation Extensions
- 34.4.6 Motivation Extensions
characteristics
- 23. Architecture Principles
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 37.2.2 Generic Characteristics
- 37.2.3 Architecture Building Blocks
- 37.2.4 Solution Building Blocks
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.2 Nature of Governance
- 50.1.5 Architecture Governance: Overview
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
characterization
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
checking
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
checklist
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.1 Hardware and Operating System Checklist
- 48.5.2 Software Services and Middleware Checklist
- 48.5.3 Applications Checklists
- 48.5.4 Information Management Checklists
- 48.5.5 Security Checklist
- 48.5.6 System Management Checklist
- 48.5.7 System Engineering/Overall Architecture Checklists
- 48.5.8 System Engineering/Methods & Tools Checklist
classes
- 19. Applying Iteration to the ADM
classification
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 31. Risk Management
- 40. Architecture Partitioning
- 41. Architecture Repository
- 41.4 Standards Information Base
classify
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
class model
- 8. Phase B: Business Architecture
- 8.2 Approach
clearance
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
client
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
- A. Glossary of Supplementary Definitions
Client/Server
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
client/server model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
close
- 15. Phase G: Implementation Governance
CMM
- 51. Architecture Maturity Models
CMMI
- 36. Architecture Deliverables
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
COBIT
- 5. Introduction
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
- A. Glossary of Supplementary Definitions
COBIT framework
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
CODASYL
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
code
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
code/resources/assets
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
CoE
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
collected
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
COM
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
common
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 23.6.2 Data Principles
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
common object services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
Common Systems Architectures
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
Common Systems Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
communicated
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
communication
- 3. Definitions
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 35.6.6 Phase D: Technology Architecture
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
Communications Engineering diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
Communications Engineering view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
communications framework
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
Communications Infrastructure
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
Communications Infrastructure Interface
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 43.3 TRM in Detail
communications management
- 2. Core Concepts
- 3. Definitions
communications model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
communications network
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- A. Glossary of Supplementary Definitions
communications node
- A. Glossary of Supplementary Definitions
Communications Plan
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
communications system
- A. Glossary of Supplementary Definitions
complete
- 14. Phase F: Migration Planning
compliance
- 15. Phase G: Implementation Governance
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 48. Architecture Compliance
Compliance Assessment
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
- 41.5 Governance Log
component
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 23. Architecture Principles
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.2 High-Level View
- A. Glossary of Supplementary Definitions
composite
- A. Glossary of Supplementary Definitions
composite application
- A. Glossary of Supplementary Definitions
computer
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- A. Glossary of Supplementary Definitions
Computing/Hardware
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
concept
- 2. Core Concepts
- 32. Capability-Based Planning
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
conceptual
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
Conceptual Data diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
concerns
- 3. Definitions
- 7. Phase A: Architecture Vision
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.2 Phase A: Architecture Vision
- 24. Stakeholder Management
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.1 Developing a Business Architecture View
- 35.7.2 Developing an Enterprise Security View
- 35.7.3 Developing a Software Engineering View
- 35.7.4 Developing a System Engineering View
- 35.7.5 Developing a Communications Engineering View
- 35.7.6 Developing a Data Flow View
- 35.7.7 Developing an Enterprise Manageability View
- 35.7.8 Developing an Acquirer View
conclusion
- 19. Applying Iteration to the ADM
- 30. Business Transformation Readiness Assessment
- 35. Architectural Artifacts
- 35.5 Conclusions
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 51. Architecture Maturity Models
- 52. Architecture Skills Framework
conditions
- 4. Release Notes
- 4.5 Using TOGAF
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
conditions of use
- 4. Release Notes
- 4.5 Using TOGAF
conduct
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 14. Phase F: Migration Planning
- 31. Risk Management
conducting
- 48. Architecture Compliance
- 48.6 Architecture Compliance Review Guidelines
configurable
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
configuration
- 21. Security Architecture and the ADM
- A. Glossary of Supplementary Definitions
configuration management
- 2. Core Concepts
- A. Glossary of Supplementary Definitions
configurations
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
confirm
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
conflict
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
connectivity
- A. Glossary of Supplementary Definitions
connectivity service
- A. Glossary of Supplementary Definitions
consideration
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 19. Applying Iteration to the ADM
consistency
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
consolidate
- 13. Phase E: Opportunities & Solutions
consolidated
- 13. Phase E: Opportunities & Solutions
- 28. Migration Planning Techniques
consolidation
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
constituents
- 39. Enterprise Continuum
constraint
- 3. Definitions
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
construction
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
consumer
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
consumption
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
content
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
- 33. Introduction
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
content framework
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
content framework, and the TOGAF ADM
- 33. Introduction
content metamodel
- 33. Introduction
- 34. Content Metamodel
content metamodel attributes
- 34. Content Metamodel
content metamodel, detail
- 34. Content Metamodel
content metamodel entities
- 34. Content Metamodel
content metamodel, extensions
- 34. Content Metamodel
content metamodel, vision and concepts
- 34. Content Metamodel
contents
- 26. Business Scenarios and Business Goals
- 41. Architecture Repository
- 41.5 Governance Log
- 49. Architecture Contracts
content tailoring
- 6. Preliminary Phase
context
- 2. Core Concepts
- 6. Preliminary Phase
- 6.2 Approach
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 32. Capability-Based Planning
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.7 Phase E: Opportunities and Solutions
continuity
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.11 Phase F: Migration Planning
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
continuum
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 5.1 ADM Overview
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 39. Enterprise Continuum
- 39.2 Enterprise Continuum and Architecture Re-Use
- 39.3 Constituents of the Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
contract
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 49. Architecture Contracts
- A. Glossary of Supplementary Definitions
Contract/Measure
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Contract/Measure catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
contracts
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 49. Architecture Contracts
contributions
- 26. Business Scenarios and Business Goals
control
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.4 Technology Principles
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
- A. Glossary of Supplementary Definitions
copy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
CORBA
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 35.7.4 Developing a System Engineering View
core
- 2. Core Concepts
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
core architecture artifacts
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
core concepts
core content metamodel
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
core content metamodel, concepts
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
corporate
- 13. Phase E: Opportunities & Solutions
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
- 50.3.2 Elements of an Effective Architecture Governance Strategy
corporate governance
- 50. Architecture Governance
- 50.1 Introduction
correct
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
cost
- 4. Release Notes
- 4.5 Using TOGAF
- 21. Security Architecture and the ADM
Cost/Benefit
- 14. Phase F: Migration Planning
costs
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
COTS
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.3 Resources
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.3 Application Principles
- 26. Business Scenarios and Business Goals
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 35.7.8 Developing an Acquirer View
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 37.3.1 Basic Principles
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
create
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 40. Architecture Partitioning
create architecture models
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
creating
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 26. Business Scenarios and Business Goals
creation
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
criteria
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
criticality
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
current
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
custody
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
CxO
- A. Glossary of Supplementary Definitions
cycle
- 5. Introduction
- 14. Phase F: Migration Planning
- 19. Applying Iteration to the ADM
- 19.2 Iteration Cycles
- 19.5 Iteration Considerations
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
d
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
DAI
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
data
- 3. Definitions
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
data access interface
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
data access tier
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
data administration
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
Data Architecture
- 2. Core Concepts
- 3. Definitions
- 10. Phase C: Information Systems Architectures - Data Architecture
database
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
- A. Glossary of Supplementary Definitions
database administration
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
database management system
- A. Glossary of Supplementary Definitions
database services
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
database system
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
data building blocks
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
data dictionary
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
- A. Glossary of Supplementary Definitions
data directory
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
Data Dissemination diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
data element
- A. Glossary of Supplementary Definitions
data encapsulation
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
data encryption
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
data entity
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- A. Glossary of Supplementary Definitions
Data Entity/Business Function matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
Data Entity/Data Component catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
data extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
Data Flow view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
data governance
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
Data-Intensive
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
data-intensive software
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
data interchange services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
Data Lifecycle diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
data management
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
data management services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
data migration
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
Data Migration diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
data principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
data security
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
Data Security diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
data standardization
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
Data Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
DBMS
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DBMS, flat files
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DBMS, hierarchical model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DBMS, network model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DBMS, object-oriented model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DBMS, relational model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DBMSs
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DD/DS
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
DDL
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
deal
- 2. Core Concepts
Decision Log
- 41. Architecture Repository
- 41.5 Governance Log
decisions
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
decomposition
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 35.6.6 Phase D: Technology Architecture
- A. Glossary of Supplementary Definitions
decrease
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
deduction
- 28. Migration Planning Techniques
default
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
define
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- 21.12 Phase G: Implementation Governance
- 22. Using TOGAF to Define & Govern SOAs
defined
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
defining
- 29. Interoperability Requirements
definition
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 14. Phase F: Migration Planning
- 22. Using TOGAF to Define & Govern SOAs
- 28. Migration Planning Techniques
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
definitional
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
definitions
- 3. Definitions
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.2 Data Principles
- 52. Architecture Skills Framework
- A. Glossary of Supplementary Definitions
Degrees of Interoperability
- 29. Interoperability Requirements
deliverable
- 2. Core Concepts
- 3. Definitions
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 36. Architecture Deliverables
dependencies
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 28. Migration Planning Techniques
deploy
- 16. Phase H: Architecture Change Management
- 16.4 Steps
deployed
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
deployment
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
Deployment Repository
- 41. Architecture Repository
depth
- 5. Introduction
- 5.5 Scoping the Architecture
- 20. Applying the ADM across the Architecture Landscape
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
depth, enterprise
- 5. Introduction
- 5.5 Scoping the Architecture
derivation
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
descriptions
- 36. Architecture Deliverables
design
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.12 Phase G: Implementation Governance
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 37.3.1 Basic Principles
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
- 49. Architecture Contracts
design pattern
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
designs
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
detail
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 22. Using TOGAF to Define & Govern SOAs
- 22.6 SOA and Levels
- 34. Content Metamodel
- 39. Enterprise Continuum
- 43. Foundation Architecture: Technical Reference Model
detailed
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
Detailed Design Repository
- 41. Architecture Repository
determine
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- Determine who are the legitimate actors who will interact with the product/service/process
- Determine whom/how much it is acceptable to inconvenience in utilizing security measures
- Determine the assets at risk if something goes wrong - "What are we trying to protect?"
- Determine the cost (both qualitative and quantitative) of asset loss/impact in failure cases
- Determine and document appropriate security forensic processes
- Determine and document how much security (cost) is justified by the threats and the value of the assets at risk
- Determine "what can go wrong?"
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 30. Business Transformation Readiness Assessment
Determine/Confirm
- 13. Phase E: Opportunities & Solutions
determining
- 29. Interoperability Requirements
develop
- 1. Introduction
- 1.2 Executive Overview
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 16. Phase H: Architecture Change Management
developed
- 35. Architectural Artifacts
developing
- 8. Phase B: Business Architecture
- 8.2 Approach
- 20. Applying the ADM across the Architecture Landscape
- 23. Architecture Principles
- 26. Business Scenarios and Business Goals
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 35.7 Recommended Architecture Views to be Developed
- 35.7.1 Developing a Business Architecture View
development
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 18. Introduction
- 19. Applying Iteration to the ADM
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 25. Architecture Patterns
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 42. Tools for Architecture Development
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
- 49. Architecture Contracts
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
development tools
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
diagram
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
- 35.6.3 Phase B: Business Architecture
- 35.6.4 Phase C: Data Architecture
- 35.6.5 Phase C: Application Architecture
- 35.6.6 Phase D: Technology Architecture
- 35.6.7 Phase E: Opportunities and Solutions
dictionary
- A. Glossary of Supplementary Definitions
Dictionary/Directory
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
different
- 18. Introduction
- 20. Applying the ADM across the Architecture Landscape
- 22. Using TOGAF to Define & Govern SOAs
- 22.6 SOA and Levels
dimensions
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
direction
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
directory
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
directory services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
disaster
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.11 Phase F: Migration Planning
disaster/continuity
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
disciplines
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
dispensation
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
dispute
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
dissemination
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
distributed
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
- 35.7.6 Developing a Data Flow View
- A. Glossary of Supplementary Definitions
distributed database
- A. Glossary of Supplementary Definitions
distributed DBMS
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
distributed object management model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
distribution
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
diversity
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.4 Technology Principles
DML
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
do
- 1. Introduction
DoC
- 51. Architecture Maturity Models
document
- 1. Introduction
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- Determine and document applicable disaster recovery or business continuity plans/requirements
- Identify and document the anticipated physical/business/regulatory environment(s) in which the system(s) will be deployed
- Determine and document the criticality of the system: safety-critical/mission-critical/non-critical
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- Frontmatter
- Preface
documentation
- 26. Business Scenarios and Business Goals
- 26.8 Business Scenario Documentation
documenting
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
documents
- Frontmatter
does
- 2. Core Concepts
- 4. Release Notes
- 4.5 Using TOGAF
domain
- 3. Definitions
- 5. Introduction
- 5.5 Scoping the Architecture
- 21. Security Architecture and the ADM
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- A. Glossary of Supplementary Definitions
downloads
- 4. Release Notes
- 4.5 Using TOGAF
DRDA
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
driver
- A. Glossary of Supplementary Definitions
Driver/Goal/Objective
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Driver/Goal/Objective catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
drivers
- 7. Phase A: Architecture Vision
- 16. Phase H: Architecture Change Management
- 16.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
drivers for change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
e
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 46. Establishing an Architecture Capability
each
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
EAP
- 9. Phase C: Information Systems Architectures
Ease-of-Use
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.3 Application Principles
e-Business
- 25. Architecture Patterns
edition
- 4. Release Notes
EEI
- A. Glossary of Supplementary Definitions
effective
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
effectiveness
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
efficacy
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
elaborate
- 7. Phase A: Architecture Vision
element
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- A. Glossary of Supplementary Definitions
enable
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
enablement
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
end
- A. Glossary of Supplementary Definitions
end user
- A. Glossary of Supplementary Definitions
Energistics
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
engagement
- 19. Applying Iteration to the ADM
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
engineer
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
engineering
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 35.6.6 Phase D: Technology Architecture
- 35.7 Recommended Architecture Views to be Developed
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
Engineering/Methods
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
Engineering/Overall
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
enhancement
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.13 Phase H: Architecture Change Management
ensure
- 21. Security Architecture and the ADM
enterprise
- 1. Introduction
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 4.2 The Benefits of TOGAF 9
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 5. Introduction
- 5.1 ADM Overview
- 6. Preliminary Phase
- 6.2 Approach
- 6.3 Inputs
- 6.4 Steps
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 20. Applying the ADM across the Architecture Landscape
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 22. Using TOGAF to Define & Govern SOAs
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 29. Interoperability Requirements
- 32. Capability-Based Planning
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 35.7 Recommended Architecture Views to be Developed
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 39. Enterprise Continuum
- 39.2 Enterprise Continuum and Architecture Re-Use
- 39.3 Constituents of the Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.5 The Enterprise Continuum and the ADM
- 39.6 The Enterprise Continuum and Your Organization
enterprise architect
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
enterprise architect, key characteristics
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
enterprise architect, role of
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
enterprise architecture
- 1. Introduction
- 1.2 Executive Overview
Enterprise Continuum
- 2. Core Concepts
- 3. Definitions
- 38. Introduction
- 39. Enterprise Continuum
- 42. Tools for Architecture Development
Enterprise Continuum and Tools
- 1. Introduction
Enterprise Manageability diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Enterprise Manageability view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
enterprise operating model
- 29. Interoperability Requirements
enterprise portal
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
enterprise principles
- 23. Architecture Principles
Enterprise Repository
- 41. Architecture Repository
Enterprise Resource Planning system
- A. Glossary of Supplementary Definitions
Enterprise Security view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
entities
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 34.5 Content Metamodel Entities
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
entity
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- A. Glossary of Supplementary Definitions
Entity/Business
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
Entity/Data
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
environment
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.13 Phase H: Architecture Change Management
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- A. Glossary of Supplementary Definitions
environment/access
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
Environment diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
environment management
environment(s
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
environments
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
ERP
- A. Glossary of Supplementary Definitions
establish
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
establishing
- 2. Core Concepts
- 46. Establishing an Architecture Capability
estimate
- 14. Phase F: Migration Planning
evaluate
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
evaluation
- 6. Preliminary Phase
event
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- A. Glossary of Supplementary Definitions
Event diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
events
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
everybody's
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
evidence
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
evolution
- 28. Migration Planning Techniques
example
- 23. Architecture Principles
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
- 27. Gap Analysis
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.4 Views and Viewpoints
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
excellence
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
execution
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
executive
- 1. Introduction
existing
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.13 Phase H: Architecture Change Management
experience
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
explicit
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
extended
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
extending
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
extension
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 34.4 Content Metamodel Extensions
extensive
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
external
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 41. Architecture Repository
- 41.7 External Repositories
External Environment Interface
- A. Glossary of Supplementary Definitions
f
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 46. Establishing an Architecture Capability
factor
- 28. Migration Planning Techniques
- 30. Business Transformation Readiness Assessment
failure
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
failure transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
features
- 22. Using TOGAF to Define & Govern SOAs
Federal Enterprise Architecture Business Reference Model
- 8. Phase B: Business Architecture
- 8.2 Approach
few
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
finalize
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
financial management
findings
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
Fitness-for-Purpose
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
Five-Tier
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
flexibility
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
flow
- 3. Definitions
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 35.7 Recommended Architecture Views to be Developed
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
focus
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
footnotes
- 19. Applying Iteration to the ADM
- 19.6 Conclusions
- 29. Interoperability Requirements
- 29.7 Summary
- 30. Business Transformation Readiness Assessment
- 30.7 Conclusion
- 34. Content Metamodel
- 34.7 Metamodel Relationships
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.8 Developing an Acquirer View
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 37.3.2 Building Block Specification Process in the ADM
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.5 Qualities
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
- 50.3.2 Elements of an Effective Architecture Governance Strategy
- 51. Architecture Maturity Models
- 51.5 Conclusions
footprint
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
forensic
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
formal
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
formal stakeholder review
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
formulate
- 13. Phase E: Opportunities & Solutions
FORTRAN
- A. Glossary of Supplementary Definitions
forum
- Frontmatter
foundation
- 3. Definitions
- 5. Introduction
- 5.1 ADM Overview
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
Foundation Architecture
- 1. Introduction
- 3. Definitions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 43. Foundation Architecture: Technical Reference Model
Foundation Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
framework
- 1. Introduction
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 6. Preliminary Phase
- 14. Phase F: Migration Planning
- 33. Introduction
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
- 50.2 Architecture Governance Framework
framework(s
- 6. Preliminary Phase
frontmatter
full
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
full content metamodel
- 34. Content Metamodel
- 34.3 Content Metamodel in Detail
function
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
- 49. Architecture Contracts
functional
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- A. Glossary of Supplementary Definitions
functional decomposition
- A. Glossary of Supplementary Definitions
Functional Decomposition diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
functions
- 13. Phase E: Opportunities & Solutions
future
- 21. Security Architecture and the ADM
- 21.13 Phase H: Architecture Change Management
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
g
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 31. Risk Management
- 46. Establishing an Architecture Capability
gap
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 27. Gap Analysis
gap analysis
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 27. Gap Analysis
gaps
- 28. Migration Planning Techniques
gateway
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
gathering
- 26. Business Scenarios and Business Goals
- 26.3 Creating the Business Scenario
general
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 8. Phase B: Business Architecture
- 8.2 Approach
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
generate
- 14. Phase F: Migration Planning
generic
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.2 Nature of Governance
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- 52.6 Generic Role and Skills of the Enterprise Architect
global transaction
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
glossary
go
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
goal
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- Goal: Improve Business Process Performance
- Goal: Decrease Costs
- Goal: Improve Business Operations
- Goal: Improve Management Efficacy
- Goal: Reduce Risk
- Goal: Improve Effectiveness of IT Organization
- Goal: Improve User Productivity
- Goal: Improve Portability and Scalability
- Goal: Improve Interoperability
- Goal: Increase Vendor Independence
- Goal: Reduce Lifecycle Costs
- Goal: Improve Security
- Goal: Improve Manageability
- A. Glossary of Supplementary Definitions
Goal/Objective/Service
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Goal/Objective/Service diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
goals
- 7. Phase A: Architecture Vision
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
Goals/Rationale
- 52. Architecture Skills Framework
goes
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
gone
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
good
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
GOTS
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.3 Application Principles
govern
governance
- 3. Definitions
- 5. Introduction
- 6. Preliminary Phase
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
- 22.7.3 Architecture Development: Phases B, C, and D
- 31. Risk Management
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
- 41.5 Governance Log
governance, characteristics
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.2 Nature of Governance
governance extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
Governance Log
- 2. Core Concepts
- 41. Architecture Repository
Governance Log, contents of
- 41. Architecture Repository
- 41.5 Governance Log
granularity
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
graphic
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
- 44.3 Detailed Taxonomy
graphics services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
greater
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
group
- 4. Release Notes
- 13. Phase E: Opportunities & Solutions
- Frontmatter
guidance
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 21. Security Architecture and the ADM
- 25. Architecture Patterns
guide
- 15. Phase G: Implementation Governance
guideline
- 5. Introduction
- 5.1 ADM Overview
- 16. Phase H: Architecture Change Management
- 18. Introduction
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.9 Guidelines on Goals and Objectives
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 48. Architecture Compliance
- A. Glossary of Supplementary Definitions
guidelines, for adapting the ADM
- 18. Introduction
h
- 16. Phase H: Architecture Change Management
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 46. Establishing an Architecture Capability
hardware
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- A. Glossary of Supplementary Definitions
has
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
HCI
- A. Glossary of Supplementary Definitions
heterogeneous
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
hierarchic
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
hierarchic model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
High-Level
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.2 High-Level View
Hillside Group
- 25. Architecture Patterns
holistic
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
hosting
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
how
- 4. Release Notes
- 4.5 Using TOGAF
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
human
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
human computer interface
- A. Glossary of Supplementary Definitions
human interaction services
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
i
- 1. Introduction
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
IBM
- 25. Architecture Patterns
IBM patterns web site
- 25. Architecture Patterns
- 25.1 Introduction
- 25.3 IBM Patterns for e-Business
ICAM
- 8. Phase B: Business Architecture
- 8.2 Approach
ICD
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
IDEF
- 8. Phase B: Business Architecture
- 8.2 Approach
identification
- 31. Risk Management
identified
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
identify
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 13. Phase E: Opportunities & Solutions
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- Identify safe default actions and failure states
- Identify and evaluate applicable recognized guidelines and standards
- Identify and document custody of assets
- Identify the criticality of the availability and correct operation of each function
- Identify what aspects of the system must be configurable to reflect changes in policy/business environment/access control
- Identify lifespan of information used as defined by business needs and regulatory requirements
- Identify actions/events that warrant logging for later review or triggering forensic processes
- Identify and document requirements for rigor in proving accuracy of logged events (non-repudiation)
- Identify potential/likely avenues of attack
- 21.9 Phase D: Technology Architecture
- Identify and evaluate applicable recognized guidelines and standards
- Identify methods to regulate consumption of resources
- Identify the trust (clearance) level of:
- Identify minimal privileges required for any entity to achieve a technical or business objective
- Identify mitigating security measures, where justified by risk assessment
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
identifying
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
idiom
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
IDL
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
IEEE 1003.0
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
if
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
II
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
III
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
III-RM
- 1. Introduction
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.2 High-Level View
- 44.3 Detailed Taxonomy
III-RM graphic
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
III-RM, taxonomy
- 44. Integrated Information Infrastructure Reference Model
imaging
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
imaging services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
impact
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
impacted
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
impacts
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
implement
- 6. Preliminary Phase
- 6.4 Steps
- 15. Phase G: Implementation Governance
- 15.4 Steps
- 16. Phase H: Architecture Change Management
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- Implement methods and procedures to review evidence produced by the system that reflects operational stability and adherence to security policies
- Implement necessary training to ensure correct deployment, configuration, and operations of security-relevant subsystems and components; ensure awareness training of all users and non-privileged operators of the system and/or its components
implementation
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
Implementation and Migration Plan
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
implementation governance
Implementation Governance Model
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
importance
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
improve
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- Goal: Improve Business Process Performance
- Goal: Improve Business Operations
- Goal: Improve Management Efficacy
- Goal: Improve Effectiveness of IT Organization
- Goal: Improve User Productivity
- Goal: Improve Portability and Scalability
- Goal: Improve Interoperability
- Goal: Improve Security
- Goal: Improve Manageability
IMS
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
in
- 2. Core Concepts
- 4. Release Notes
including
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 7. Phase A: Architecture Vision
inconvenience
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
incorporate
- 21. Security Architecture and the ADM
- 21.13 Phase H: Architecture Change Management
increase
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
increment
- 3. Definitions
incremental change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
increments
- 28. Migration Planning Techniques
- 32. Capability-Based Planning
- 32.3 Concept of Capability-Based Planning
independence
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.3 Application Principles
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
indicator
- A. Glossary of Supplementary Definitions
industries
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
industry
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
Industry Architectures
- 8. Phase B: Business Architecture
- 8.2 Approach
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
Industry Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
information
- 3. Definitions
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
information consumer applications
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
information domains
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- A. Glossary of Supplementary Definitions
information exchange matrix
- 8. Phase B: Business Architecture
- 8.2 Approach
Information-Intensive
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
information-intensive software
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
information provider applications
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
information system
- A. Glossary of Supplementary Definitions
Information Systems Architecture
information system service
- A. Glossary of Supplementary Definitions
information technology
- 3. Definitions
infrastructure
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 35.7.5 Developing a Communications Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
- 43.3.5 Communications Infrastructure
- 43.3.7 Communications Infrastructure Interface
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
- 44.3 Detailed Taxonomy
infrastructure applications
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.3 Application Software
infrastructure bus
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
infrastructure consolidation extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
inheritance
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
initial
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
- 31. Risk Management
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
initial risk assessment
- 31. Risk Management
inputs
- 6. Preliminary Phase
installation
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
instantiation
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
integrated
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
integrated information infrastructure
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
integration
- 5. Introduction
- 40. Architecture Partitioning
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.3 Applications Checklists
- 51. Architecture Maturity Models
intellectual
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
intended
- Frontmatter
- Preface
interact
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
interaction
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 35.6.5 Phase C: Application Architecture
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
interaction model
- A. Glossary of Supplementary Definitions
interactions
- 14. Phase F: Migration Planning
interchange
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
interconnecting
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
interface
- 3. Definitions
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
Interface catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
interfaces
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.2 TRM Entities and Interfaces
- 43.3.4 Application Platform
internal
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
international
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
international operation services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
interoperability
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.4 Technology Principles
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 29. Interoperability Requirements
interoperability, categories
- 29. Interoperability Requirements
interoperability, refining
- 29. Interoperability Requirements
interoperability, requirements
interoperable
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
into
- 21. Security Architecture and the ADM
- 21.13 Phase H: Architecture Change Management
IPD-CMM
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
is
- 1. Introduction
- 1.2 Executive Overview
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.7 Phase B: Business Architecture
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 23.6.2 Data Principles
- A. Glossary of Supplementary Definitions
ISACF
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
ISAM
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
ISO
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
ISO/IEC 42010:2007
- 2. Core Concepts
isolation
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
issues
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.1 Developing a Business Architecture View
- 35.7.3 Developing a Software Engineering View
- 35.7.4 Developing a System Engineering View
- 35.7.5 Developing a Communications Engineering View
- 35.7.6 Developing a Data Flow View
- 35.7.7 Developing an Enterprise Manageability View
- 35.7.8 Developing an Acquirer View
- 42. Tools for Architecture Development
IT
- 3. Definitions
- 15. Phase G: Implementation Governance
- 15.4 Steps
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
iteration
- 19. Applying Iteration to the ADM
- 19.2 Iteration Cycles
- 19.5 Iteration Considerations
iteration cycles
- 19. Applying Iteration to the ADM
iteration of the ADM
IT governance
- 50. Architecture Governance
- 50.1 Introduction
IT Governance Institute
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.4 IT Governance
ITIL
- 5. Introduction
- 16. Phase H: Architecture Change Management
- 16.2 Approach
- A. Glossary of Supplementary Definitions
its
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.12 Phase G: Implementation Governance
IV
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 33. Introduction
Java
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.3 Application Principles
join
- 4. Release Notes
justified
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.9 Phase D: Technology Architecture
JVM
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
key
- 5. Introduction
- 5.2 Architecture Development Cycle
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 13. Phase E: Opportunities & Solutions
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.1 Developing a Business Architecture View
- 35.7.3 Developing a Software Engineering View
- 35.7.4 Developing a System Engineering View
- 35.7.5 Developing a Communications Engineering View
- 35.7.6 Developing a Data Flow View
- 35.7.7 Developing an Enterprise Manageability View
- 35.7.8 Developing an Acquirer View
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
- 50.2.2 Architecture Governance Framework - Organizational Structure
- 50.3 Architecture Governance in Practice
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- A. Glossary of Supplementary Definitions
Key Performance Indicator
- A. Glossary of Supplementary Definitions
keywords
- Frontmatter
- Preface
kind
- 2. Core Concepts
knowledge
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
KPI
- 7. Phase A: Architecture Vision
- A. Glossary of Supplementary Definitions
landscape
- 3. Definitions
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 20. Applying the ADM across the Architecture Landscape
language
- 35. Architectural Artifacts
later
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
law
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
LCS
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
leadership
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
learned
- 14. Phase F: Migration Planning
legal
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
legitimate
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
lessons
- 14. Phase F: Migration Planning
lessons learned process
- 16. Phase H: Architecture Change Management
- 16.2 Approach
level
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 20. Applying the ADM across the Architecture Landscape
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 22. Using TOGAF to Define & Govern SOAs
leveraged
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
libraries
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
library
- 41. Architecture Repository
lifecycle
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 35.6.4 Phase C: Data Architecture
- 41. Architecture Repository
- 41.4 Standards Information Base
- A. Glossary of Supplementary Definitions
lifespan
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
local subscriber environment
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
location
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 35.6.5 Phase C: Application Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
Location catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Location diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
locations
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
location services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
location transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
log
- 41. Architecture Repository
- 41.5 Governance Log
logged
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
logging
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
logical
- 3. Definitions
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
- A. Glossary of Supplementary Definitions
logical application component
- A. Glossary of Supplementary Definitions
logical data component
- A. Glossary of Supplementary Definitions
Logical Data diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.4 Phase C: Data Architecture
logical technology component
- A. Glossary of Supplementary Definitions
loss/impact
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
maintaining
maintenance
- 16. Phase H: Architecture Change Management
major
- 13. Phase E: Opportunities & Solutions
making
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
manage
- 16. Phase H: Architecture Change Management
manageability
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 35.7 Recommended Architecture Views to be Developed
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
managed
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
management
- 3. Definitions
- 6. Preliminary Phase
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
management frameworks
- 6. Preliminary Phase
- 6.2 Approach
management utilities
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
manager
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
managing
- A. Glossary of Supplementary Definitions
Managing Successful Programs
- A. Glossary of Supplementary Definitions
map
- 24. Stakeholder Management
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
mapping
- 4. Release Notes
marketing
- 30. Business Transformation Readiness Assessment
Master/Slave
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
master/slave model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
materials
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
matrices
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
matrix
- 28. Migration Planning Techniques
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
- 35.6.3 Phase B: Business Architecture
- 35.6.4 Phase C: Data Architecture
- 35.6.5 Phase C: Application Architecture
- 35.6.6 Phase D: Technology Architecture
- A. Glossary of Supplementary Definitions
maturity
- 6. Preliminary Phase
- 51. Architecture Maturity Models
maturity model
- 30. Business Transformation Readiness Assessment
- 51. Architecture Maturity Models
maximize
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
MDA
- 11. Phase C: Information Systems Architectures - Application Architecture
me
- 1. Introduction
- 1.2 Executive Overview
meaning
- 48. Architecture Compliance
measure
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- A. Glossary of Supplementary Definitions
measured
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
measures
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
mediator
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
meet
- 16. Phase H: Architecture Change Management
meeting
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
members
- Frontmatter
- Participants
metadata
- 3. Definitions
metamodel
- 3. Definitions
- 33. Introduction
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
metamodel relationships
- 34. Content Metamodel
metaview
- A. Glossary of Supplementary Definitions
method
- 2. Core Concepts
- 3. Definitions
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
Method-Driven
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
methodology
- 3. Definitions
methods
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
middleware
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
migration
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 10.2.1 Key Considerations for Data Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
Migration Planning
- 14. Phase F: Migration Planning
- 30. Business Transformation Readiness Assessment
migration transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
milestones
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
minimal
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
minutes
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
mitigating
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
mitigation
- 7. Phase A: Architecture Vision
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 31. Risk Management
model
- 3. Definitions
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 29. Interoperability Requirements
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
- 35.7.5 Developing a Communications Engineering View
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
Model Driven Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
modeling
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.2 Approach
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
models
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 26.8 Business Scenario Documentation
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
- 35.7.5 Developing a Communications Engineering View
- 35.7.6 Developing a Data Flow View
- 41. Architecture Repository
- 41.7 External Repositories
- 51. Architecture Maturity Models
modifications
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
modular
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
modularity
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
monitoring
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 31. Risk Management
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
more
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
motivation
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
motivation extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
MSP
- 36. Architecture Deliverables
- A. Glossary of Supplementary Definitions
much
- 4. Release Notes
- 4.5 Using TOGAF
- 21. Security Architecture and the ADM
multimedia
- A. Glossary of Supplementary Definitions
multimedia service
- A. Glossary of Supplementary Definitions
must
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
nature
- 50. Architecture Governance
- 50.1 Introduction
necessary
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.12 Phase G: Implementation Governance
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
need
- 1. Introduction
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
- 52. Architecture Skills Framework
network
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
networked
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
Networked Computing/Hardware diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
network management services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
network services
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
new
- 4. Release Notes
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
node
- A. Glossary of Supplementary Definitions
node connectivity diagram
- 8. Phase B: Business Architecture
- 8.2 Approach
Non-Architectural
- 6. Preliminary Phase
- 6.3 Inputs
- 7. Phase A: Architecture Vision
- 7.3 Inputs
- 8. Phase B: Business Architecture
- 8.3 Inputs
- 9. Phase C: Information Systems Architectures
- 9.3 Inputs
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.3 Inputs
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.3 Inputs
- 12. Phase D: Technology Architecture
- 12.3 Inputs
- 13. Phase E: Opportunities & Solutions
- 13.3 Inputs
- 14. Phase F: Migration Planning
- 14.3 Inputs
- 15. Phase G: Implementation Governance
- 15.3 Inputs
- 16. Phase H: Architecture Change Management
- 16.3 Inputs
none
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
non-privileged
- 21. Security Architecture and the ADM
non-repudiation
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
notes
nothing
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
OA&M
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
object
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
objective
- 3. Definitions
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.13 Phase H: Architecture Change Management
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
object management
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
Object Management Group
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
Object-Oriented
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
object-oriented services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
obtain
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
ODBC
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
OLA
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
OLE
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
OMG
- 8. Phase B: Business Architecture
- 8.2 Approach
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 11.4 Steps
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
one
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
ongoing
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
OODBMS
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
open
- 4. Release Notes
- A. Glossary of Supplementary Definitions
- Frontmatter
open specifications
- A. Glossary of Supplementary Definitions
open system
- A. Glossary of Supplementary Definitions
operating
- 29. Interoperability Requirements
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- A. Glossary of Supplementary Definitions
operating system services
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- A. Glossary of Supplementary Definitions
operation
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 47. Architecture Board
operational
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
- A. Glossary of Supplementary Definitions
operational governance
- A. Glossary of Supplementary Definitions
operational-level agreement
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
operations
- 15. Phase G: Implementation Governance
- 15.4 Steps
- 21. Security Architecture and the ADM
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
operations management
- 6. Preliminary Phase
- 6.2 Approach
operators
- 21. Security Architecture and the ADM
opportunities
- 13. Phase E: Opportunities & Solutions
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 46. Establishing an Architecture Capability
Opportunities & Solutions
optimizing
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
ORB
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
ORB services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
organization
- 6. Preliminary Phase
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 39. Enterprise Continuum
Organization/Actor
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Organization/Actor catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
organizational
- 6. Preliminary Phase
- 6.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
Organizational Model
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Organization Decomposition diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
organizations
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
Organization-Specific
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 39.4.2 Solutions Continuum
Organization-Specific Architectures
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
Organization-Specific Solutions
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
organization unit
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
organizing
- 20. Applying the ADM across the Architecture Landscape
orientation
- 3. Definitions
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
oriented
- 3. Definitions
OSI
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
OSI Reference Model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
our
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
output
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 21. Security Architecture and the ADM
outside
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
overall
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 26. Business Scenarios and Business Goals
- 26.3 Creating the Business Scenario
overview
- 1. Introduction
- 5. Introduction
- 19. Applying Iteration to the ADM
- 20. Applying the ADM across the Architecture Landscape
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 29. Interoperability Requirements
- 32. Capability-Based Planning
- 33. Introduction
- 34. Content Metamodel
- 34.1 Overview
- 34.2 Content Metamodel Vision and Concepts
- 35. Architectural Artifacts
- 35.3 Views, Tools, and Languages
- 37. Building Blocks
- 37.1 Overview
- 37.2 Introduction to Building Blocks
- 39. Enterprise Continuum
- 40. Architecture Partitioning
- 41. Architecture Repository
- 41.1 Overview
- 41.3 Reference Library
- 41.4 Standards Information Base
- 41.5 Governance Log
- 42. Tools for Architecture Development
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- 45. Introduction
- 46. Establishing an Architecture Capability
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
- 50. Architecture Governance
- 50.1 Introduction
- 50.2 Architecture Governance Framework
- 50.2.2 Architecture Governance Framework - Organizational Structure
- 51. Architecture Maturity Models
- 51.1 Overview
- 51.3 US DoC ACMM Framework
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
ownership
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
package
- 3. Definitions
- 14. Phase F: Migration Planning
packaged
- A. Glossary of Supplementary Definitions
packaged services
- A. Glossary of Supplementary Definitions
packages
- 13. Phase E: Opportunities & Solutions
paradigm
- 32. Capability-Based Planning
parameters
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
part
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 33. Introduction
- 38. Introduction
- 45. Introduction
participants
- Frontmatter
partition
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
partitioned
- 40. Architecture Partitioning
partitioning
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 40. Architecture Partitioning
partitions
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
partners
- 49. Architecture Contracts
parts
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
pattern
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
- 25.4 Some Pattern Resources
pattern resources
- 25. Architecture Patterns
patterns
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
- 25.3 IBM Patterns for e-Business
patterns-discussion FAQ
- 25. Architecture Patterns
patterns home page
- 25. Architecture Patterns
P-CMM
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
Peer-to-Peer
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
peer-to-peer model
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
perform
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 15. Phase G: Implementation Governance
performance
- 3. Definitions
- 16. Phase H: Architecture Change Management
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- A. Glossary of Supplementary Definitions
performance management
- 2. Core Concepts
- 3. Definitions
performance measurement
- 41. Architecture Repository
- 41.5 Governance Log
period
- 5. Introduction
- 5.5 Scoping the Architecture
- A. Glossary of Supplementary Definitions
personal
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
personnel
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
perspective
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.2 Nature of Governance
phase
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
- 22.7.2 Phase A: Architecture Vision
- 22.7.3 Architecture Development: Phases B, C, and D
- Phase B: Business Architecture
- Phase C: Information Systems Architectures
- SOA-Specific Phase C Artifacts
- Phase D: Technology Architecture
- SOA-Specific Phase D Artifacts
- Phase E: Opportunities and Solutions
- SOA-Specific Phase E Artifacts
- Phase F: Migration Planning
- Phase G: Implementation Governance
- Phase H: Architecture Change Management
- 31. Risk Management
- 35. Architectural Artifacts
Phase A
Phase B
Phase C
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
Phase D
Phase E
Phase F
Phase G
Phase H
phases
- 13. Phase E: Opportunities & Solutions
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
physical
- 3. Definitions
- A. Glossary of Supplementary Definitions
physical application component
- A. Glossary of Supplementary Definitions
physical/business/regulatory
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
physical data component
- A. Glossary of Supplementary Definitions
physical technology component
- A. Glossary of Supplementary Definitions
place
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
plan
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 30. Business Transformation Readiness Assessment
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
planning
- 6. Preliminary Phase
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 28. Migration Planning Techniques
- 30. Business Transformation Readiness Assessment
- 32. Capability-Based Planning
plans
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.11 Phase F: Migration Planning
plans/requirements
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
platform
- 3. Definitions
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
Platform Decomposition diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
platform service
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
platform taxonomy
- 43. Foundation Architecture: Technical Reference Model
PMBOK
- 36. Architecture Deliverables
points
- 5. Introduction
- 5.2 Architecture Development Cycle
policies
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.12 Phase G: Implementation Governance
policy
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
policy/business
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
politics
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
- 50.3.2 Elements of an Effective Architecture Governance Strategy
portability
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.2 High-Level Breakdown
- A. Glossary of Supplementary Definitions
portfolio
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 35.6.6 Phase D: Technology Architecture
- A. Glossary of Supplementary Definitions
portfolio management
- 6. Preliminary Phase
- 6.2 Approach
positions
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
possible
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
Post-Implementation
- 15. Phase G: Implementation Governance
postscript
- 12. Phase D: Technology Architecture
potential
- 29. Interoperability Requirements
potential/likely
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
practice
- 50. Architecture Governance
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
preface
- Frontmatter
preliminary
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 40. Architecture Partitioning
- 40.2 Applying Classification to Create Partitioned Architectures
Preliminary Phase
preparation
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
present
- 30. Business Transformation Readiness Assessment
previous
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
primary
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
PRINCE2
- 16. Phase H: Architecture Change Management
- 16.2 Approach
- 36. Architecture Deliverables
- A. Glossary of Supplementary Definitions
principle
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 6.4 Steps
- 7. Phase A: Architecture Vision
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
- 23. Architecture Principles
- 23.2 Characteristics of Architecture Principles
- 23.3 Components of Architecture Principles
- 23.4 Developing Architecture Principles
Principles catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.1 Preliminary Phase
priorities
- 15. Phase G: Implementation Governance
prioritize
- 14. Phase F: Migration Planning
privileges
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
problem
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
procedures
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
process
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 16. Phase H: Architecture Change Management
- 18. Introduction
- 24. Stakeholder Management
- 26. Business Scenarios and Business Goals
- 26.3 Creating the Business Scenario
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 37. Building Blocks
- 37.3 Building Blocks and the ADM
- 48. Architecture Compliance
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- A. Glossary of Supplementary Definitions
Process/Application
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Process/Application Realization diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
processes
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
Process/Event/Control/Product
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Process/Event/Control/Product catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Process Flow diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
processing
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
Processing diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
process modeling
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
process modeling extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
Processors/Servers/Clients
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
process status
- 5. Introduction
process tailoring
- 6. Preliminary Phase
produced
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
producing
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
product
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- A. Glossary of Supplementary Definitions
productivity
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.3 Applications Checklists
Product Lifecycle diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Product Line Architecture
- 5. Introduction
product/service/process
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
professional
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
proficiency
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
profile
- A. Glossary of Supplementary Definitions
profiling
- A. Glossary of Supplementary Definitions
program
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- A. Glossary of Supplementary Definitions
project
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.7 Phase E: Opportunities and Solutions
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
- A. Glossary of Supplementary Definitions
Project Context diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.7 Phase E: Opportunities and Solutions
project management
- 6. Preliminary Phase
- 6.2 Approach
Project Portfolio
- 41. Architecture Repository
- 41.5 Governance Log
projects
- 14. Phase F: Migration Planning
prompt
- 1. Introduction
- 1.2 Executive Overview
property
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
propositions
- 7. Phase A: Architecture Vision
protect
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
protection
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
provide
- 16. Phase H: Architecture Change Management
provider
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.2 Business Applications
proving
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
provision
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
purpose
- 34. Content Metamodel
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 36.2.2 Architecture Contract
- 36.2.3 Architecture Definition Document
- 36.2.4 Architecture Principles
- 36.2.5 Architecture Repository
- 36.2.6 Architecture Requirements Specification
- 36.2.7 Architecture Roadmap
- 36.2.8 Architecture Vision
- 36.2.9 Business Principles, Business Goals, and Business Drivers
- 36.2.10 Capability Assessment
- 36.2.11 Change Request
- 36.2.12 Communications Plan
- 36.2.13 Compliance Assessment
- 36.2.14 Implementation and Migration Plan
- 36.2.15 Implementation Governance Model
- 36.2.16 Organizational Model for Enterprise Architecture
- 36.2.17 Request for Architecture Work
- 36.2.18 Requirements Impact Assessment
- 36.2.20 Statement of Architecture Work
- 36.2.21 Tailored Architecture Framework
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
qualitative
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
qualities
- 23. Architecture Principles
- 23.4 Developing Architecture Principles
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.4 Application Platform - Taxonomy
- 43.4.3 Application Platform Service Qualities
quality
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
- A. Glossary of Supplementary Definitions
quality management
quantitative
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
questions
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
ranking
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
rating
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
RDBMS
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
REA
- 8. Phase B: Business Architecture
- 8.2 Approach
readiness
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 30. Business Transformation Readiness Assessment
readiness factors
- 30. Business Transformation Readiness Assessment
readiness planning
- 30. Business Transformation Readiness Assessment
realization
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
re-architecting change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
reassess
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
recency
- 20. Applying the ADM across the Architecture Landscape
recognized
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
recommended
- 35. Architectural Artifacts
reconcile
- 13. Phase E: Opportunities & Solutions
reconciling
- 29. Interoperability Requirements
recovery
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.11 Phase F: Migration Planning
Red Books
- 25. Architecture Patterns
- 25.1 Introduction
- 25.3 IBM Patterns for e-Business
redesign
- 16. Phase H: Architecture Change Management
reduce
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
reference
- 3. Definitions
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
- 41. Architecture Repository
- 41.3 Reference Library
- 41.7 External Repositories
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
referenced
- Frontmatter
reference data
- 5. Introduction
Reference Library
- 2. Core Concepts
- 41. Architecture Repository
reference models
- 1. Introduction
- 3. Definitions
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
references
- 21. Security Architecture and the ADM
refine
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
refining
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 29. Interoperability Requirements
reflect
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.12 Phase G: Implementation Governance
regarding
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
regulate
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
regulatory
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.8 Phase C: Information Systems Architectures
related
- 13. Phase E: Opportunities & Solutions
relating
- 6. Preliminary Phase
- 6.2 Approach
relationship
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 34. Content Metamodel
- 39. Enterprise Continuum
- 39.6 The Enterprise Continuum and Your Organization
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 49. Architecture Contracts
relay system
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
release
release notes
relocation transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
replication transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
reporting
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
repositories
- 41. Architecture Repository
repository
- 2. Core Concepts
- 3. Definitions
- 5. Introduction
- 5.1 ADM Overview
- 8. Phase B: Business Architecture
- 8.2 Approach
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.2 Approach
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 12. Phase D: Technology Architecture
- 12.2 Approach
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.6 Developing a Data Flow View
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 41. Architecture Repository
- 41.6 The Enterprise Repository
request
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Request for Architecture Work
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
requests
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
required
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 21.9 Phase D: Technology Architecture
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 34.4.1 Governance Extensions
- 34.4.2 Services Extensions
- 34.4.3 Process Modeling Extensions
- 34.4.4 Data Extensions
- 34.4.5 Infrastructure Consolidation Extensions
- 34.4.6 Motivation Extensions
requirement
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
Requirement for Architecture Work
- 6. Preliminary Phase
- 6.2 Approach
requirements
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 7. Phase A: Architecture Vision
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.2 Requirements Development
- 17.2.3 Resources
Requirements-Based
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.4 Technology Principles
Requirements catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.8 Requirements Management
Requirements Impact Assessment
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Requirements Repository
- 41. Architecture Repository
- 41.6 The Enterprise Repository
requirements tools
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.3 Resources
residual
- 31. Risk Management
residual risk assessment
- 31. Risk Management
resolution
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
resolve
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
resource
- 4. Release Notes
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 14. Phase F: Migration Planning
- A. Glossary of Supplementary Definitions
Resource-Event-Agent
- 8. Phase B: Business Architecture
- 8.2 Approach
resource management
resources
- 15. Phase G: Implementation Governance
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 25. Architecture Patterns
responsibilities
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 47. Architecture Board
responsibility
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 50. Architecture Governance
- 50.1 Introduction
- 50.1.5 Architecture Governance: Overview
responsive
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.4 Technology Principles
results
- 13. Phase E: Opportunities & Solutions
re-usable
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
re-use
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
- 39. Enterprise Continuum
review
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.12 Phase G: Implementation Governance
- 48. Architecture Compliance
reviewers
- Frontmatter
- Participants
reviewing
- 26. Business Scenarios and Business Goals
- 26.3 Creating the Business Scenario
reviews
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
- 48.6 Architecture Compliance Review Guidelines
revisit
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
rigor
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
risk
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.9 Phase D: Technology Architecture
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 31. Risk Management
risk assessment
- 31. Risk Management
risk classification
- 31. Risk Management
risk identification
- 31. Risk Management
risk management
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 31. Risk Management
- A. Glossary of Supplementary Definitions
risk management, best practice
- 31. Risk Management
Risk Management Plan
- 31. Risk Management
risk monitoring
- 31. Risk Management
risks
- 7. Phase A: Architecture Vision
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
- 30. Business Transformation Readiness Assessment
- 30.4 Assess Readiness Factors
RM
- 3. Definitions
RM-ODP
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
roadmap
- 3. Definitions
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
roadmap components
- 8. Phase B: Business Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
role
- 3. Definitions
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 47. Architecture Board
- 49. Architecture Contracts
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
- 52.5 Enterprise Architecture Role and Skill Definitions
- 52.6 Generic Role and Skills of the Enterprise Architect
Role/Application
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Role/Application matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Role catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
roles
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
- 52. Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
RosettaNet
- 8. Phase B: Business Architecture
- 8.2 Approach
SA-CMM
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
safe
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
safety-critical/mission-critical/non-critical
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
said
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
sample
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 24.3.1 Identify Stakeholders
SANS Institute
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
SBB
- 3. Definitions
- 25. Architecture Patterns
- 25.1 Introduction
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.8 Developing an Acquirer View
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.1 Overview
- 37.2 Introduction to Building Blocks
scalability
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- A. Glossary of Supplementary Definitions
SCAMPI
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
scenario
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.3 Resources
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 26. Business Scenarios and Business Goals
schedule
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
scope
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 7.4 Steps
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
scoping
- 5. Introduction
scoping the architecture
- 5. Introduction
scripts
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
SE-CMM
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
secure
- 7. Phase A: Architecture Vision
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
security
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 21. Security Architecture and the ADM
- 21.3 Guidance on Security for the Architecture Domains
- 21.4 ADM Architecture Requirements Management
- 21.5 Preliminary Phase
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- Determine whom/how much it is acceptable to inconvenience in utilizing security measures
- Determine and document appropriate security forensic processes
- Determine and document how much security (cost) is justified by the threats and the value of the assets at risk
- Assess alignment or conflict of identified security policies with business goals
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
security architecture
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 21. Security Architecture and the ADM
security, architecture domains
- 21. Security Architecture and the ADM
security association
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
security context
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
security management
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
security mechanisms
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
Security/Protection
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
security-related
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
security-relevant
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
security services
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
security services, allocation
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
security-specific
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
segment
- 3. Definitions
Segment Architecture
- 3. Definitions
- 20. Applying the ADM across the Architecture Landscape
- 41. Architecture Repository
SEI
- 51. Architecture Maturity Models
select
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
selected
- 6. Preliminary Phase
sensitivity
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
sequence
- A. Glossary of Supplementary Definitions
server
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
- A. Glossary of Supplementary Definitions
service
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.4.3 Application Platform Service Qualities
Service/Function
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
Service/Information
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
service-level agreement
- 25. Architecture Patterns
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 47. Architecture Board
- 49. Architecture Contracts
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
service management
Service Management Repository
- 41. Architecture Repository
service orientation
- 3. Definitions
service-orientation
- 22. Using TOGAF to Define & Govern SOAs
- 22.5 Enterprise Architecture and SOA
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
Service Oriented Architecture
- 3. Definitions
Service-Oriented Architecture
service qualities
- A. Glossary of Supplementary Definitions
service qualities, Application Platform
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
service qualities, TRM
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.4.3 Application Platform Service Qualities
services
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 35.7.5 Developing a Communications Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.3 TRM in Detail
- 43.3.4 Application Platform
- 43.4 Application Platform - Taxonomy
- 43.4.2 Application Platform Service Categories
- 43.5 Detailed Platform Taxonomy
- 43.5.1 Data Interchange Services
- 43.5.2 Data Management Services
- 43.5.3 Graphics and Imaging Services
- 43.5.4 International Operation Services
- 43.5.5 Location and Directory Services
- 43.5.6 Network Services
- 43.5.7 Operating System Services
- 43.5.8 Software Engineering Services
- 43.5.9 Transaction Processing Services
- 43.5.10 User Interface Services
- 43.5.11 Security Services
- 43.5.12 System and Network Management Services
- 43.5.13 Object-Oriented Provision of Services
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.2 Software Services and Middleware Checklist
- 48.5.4 Information Management Checklists
- A. Glossary of Supplementary Definitions
services extensions
- 34. Content Metamodel
- 34.4 Content Metamodel Extensions
services, network
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
services, operating system
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
services, system security management
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
set
- 23. Architecture Principles
setting
- 47. Architecture Board
shared
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.2 Data Principles
sharing
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
SIB
- 2. Core Concepts
- 3. Definitions
- 41. Architecture Repository
sign-off
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
simple
- 35. Architectural Artifacts
- 35.1 Basic Concepts
simplification change
- 16. Phase H: Architecture Change Management
- 16.2 Approach
size
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
skill
- 15. Phase G: Implementation Governance
- 52. Architecture Skills Framework
- 52.2 Need for an Enterprise Architecture Skills Framework
- 52.4 Enterprise Architecture Role and Skill Categories
SLA
- 25. Architecture Patterns
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 47. Architecture Board
- 49. Architecture Contracts
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
SMAP
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
SMART
- 26. Business Scenarios and Business Goals
- 26.1 Introduction
- 26.9 Guidelines on Goals and Objectives
- 26.9.2 Importance of SMART Objectives
SNA
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
SOA
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 22. Using TOGAF to Define & Govern SOAs
SOA levels
- 22. Using TOGAF to Define & Govern SOAs
SOAs
SOA-Specific
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
software
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
Software Distribution diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
Software Engineering diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
software engineering services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
Software Engineering view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
software modularity
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
software portability
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
software re-use
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
software tiers
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
solution
- 3. Definitions
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
solution architect
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
Solution Architecture
- 3. Definitions
solution building block
- 3. Definitions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
Solution Concept diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
solutions
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 15. Phase G: Implementation Governance
- 21. Security Architecture and the ADM
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.3 Architecture Development: Phases B, C, and D
- 28. Migration Planning Techniques
- 29. Interoperability Requirements
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.2 Solutions Continuum
Solutions Continuum
- 2. Core Concepts
- 3. Definitions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
Solutions Repository
- 41. Architecture Repository
- 41.6 The Enterprise Repository
some
- 25. Architecture Patterns
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
something
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
space
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 44.1.4 Key Business and Technical Drivers
specific
- 52. Architecture Skills Framework
- 52.3 Goals/Rationale
specifically
- 1. Introduction
- 1.2 Executive Overview
specification
- 22. Using TOGAF to Define & Govern SOAs
- 22.6 SOA and Levels
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 37. Building Blocks
- 37.2 Introduction to Building Blocks
- 37.2.3 Architecture Building Blocks
- 37.2.4 Solution Building Blocks
- 37.3 Building Blocks and the ADM
- A. Glossary of Supplementary Definitions
SQL
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
stability
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
stakeholder
- 3. Definitions
- 8. Phase B: Business Architecture
- 8.4 Steps
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.2 Phase A: Architecture Vision
- 24. Stakeholder Management
- 24.2 Approach to Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 24.3.1 Identify Stakeholders
- 24.3.2 Classify Stakeholder Positions
- 24.3.3 Determine Stakeholder Management Approach
stakeholder management
- 2. Core Concepts
- 3. Definitions
- 24. Stakeholder Management
Stakeholder Management, process steps
- 24. Stakeholder Management
Stakeholder Map matrix
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
stakeholders
- 7. Phase A: Architecture Vision
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.2 Phase A: Architecture Vision
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.1 Developing a Business Architecture View
- 35.7.2 Developing an Enterprise Security View
- 35.7.3 Developing a Software Engineering View
- 35.7.4 Developing a System Engineering View
- 35.7.5 Developing a Communications Engineering View
- 35.7.6 Developing a Data Flow View
- 35.7.7 Developing an Enterprise Manageability View
- 35.7.8 Developing an Acquirer View
standard
- 41. Architecture Repository
- 41.4 Standards Information Base
standardization
- 42. Tools for Architecture Development
standards
- 3. Definitions
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
- 41. Architecture Repository
- 41.4 Standards Information Base
standards, classification
- 41. Architecture Repository
- 41.4 Standards Information Base
Standards Information Base
- 2. Core Concepts
- 3. Definitions
- 41. Architecture Repository
- 41.4 Standards Information Base
standards, lifecycle
- 41. Architecture Repository
- 41.4 Standards Information Base
standards, types of
- 41. Architecture Repository
- 41.4 Standards Information Base
state
- 20. Applying the ADM across the Architecture Landscape
- 28. Migration Planning Techniques
statement
- 7. Phase A: Architecture Vision
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 49. Architecture Contracts
- 49.2 Contents
Statement of Architecture Work
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 49. Architecture Contracts
- 49.2 Contents
states
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
status
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
STEP Framework
- 8. Phase B: Business Architecture
- 8.2 Approach
steps
- 6. Preliminary Phase
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 15. Phase G: Implementation Governance
- 16. Phase H: Architecture Change Management
- 17. ADM Architecture Requirements Management
- 24. Stakeholder Management
- 27. Gap Analysis
- 48. Architecture Compliance
- 48.4 Architecture Compliance Review Process
steward
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.2 Data Principles
storage
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.3 Infrastructure Applications
stored/created/used
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
strategic
- 3. Definitions
Strategic Architecture
- 3. Definitions
- 20. Applying the ADM across the Architecture Landscape
- 41. Architecture Repository
strategy
- 13. Phase E: Opportunities & Solutions
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
- 47. Architecture Board
- 47.4 Operation of the Architecture Board
- 47.4.3 Agenda
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
strict
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
strict isolation
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
structure
- 1. Introduction
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 4.3 Mapping of the TOGAF 8.1.1 Structure to TOGAF 9
- 4.4 Mapping of TOGAF 9 Structure to TOGAF 8.1.1
- 5. Introduction
- 5.2 Architecture Development Cycle
- 33. Introduction
- 38. Introduction
- 45. Introduction
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
structured analysis
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
style
- 3. Definitions
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 18. Introduction
subsystems
- 21. Security Architecture and the ADM
success
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 50. Architecture Governance
- 50.3 Architecture Governance in Practice
successful
- 21. Security Architecture and the ADM
- 21.12 Phase G: Implementation Governance
- A. Glossary of Supplementary Definitions
suggested
- 27. Gap Analysis
summary
- 5. Introduction
- 22. Using TOGAF to Define & Govern SOAs
- 26. Business Scenarios and Business Goals
- 29. Interoperability Requirements
- 31. Risk Management
- 32. Capability-Based Planning
supplementary
supplier
- A. Glossary of Supplementary Definitions
supplier management
- 2. Core Concepts
- A. Glossary of Supplementary Definitions
support
- 6. Preliminary Phase
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 22. Using TOGAF to Define & Govern SOAs
- 22.7 Using TOGAF for SOA
- 22.7.1 Preliminary Phase
supporting
- 5. Introduction
- 5.1 ADM Overview
SW-CMM
- 51. Architecture Maturity Models
- 51.4 Capability Maturity Models Integration (CMMI)
system
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
- 21.6 Phase A: Architecture Vision
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
- 21.12 Phase G: Implementation Governance
- Implement methods and procedures to review evidence produced by the system that reflects operational stability and adherence to security policies
- Implement necessary training to ensure correct deployment, configuration, and operations of security-relevant subsystems and components; ensure awareness training of all users and non-privileged operators of the system and/or its components
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
- 35.7.4 Developing a System Engineering View
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
- 44.3.4 Application Platform
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- A. Glossary of Supplementary Definitions
- A.7 Business System
- A.13 Communications System
- A.26 Database Management System
- A.31 Enterprise Resource Planning (ERP) System
- A.41 Information System (IS)
- A.42 Information System Service
- A.59 Open System
- A.61 Operating System Service
- A.83 System
- A.84 System and Network Management Service
- A.85 System Stakeholder
system and network management service
- A. Glossary of Supplementary Definitions
system architect
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
System Engineering view
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
system management services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
systems
- 9. Phase C: Information Systems Architectures
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
system(s
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
systems
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
system security management services
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
system stakeholder
- A. Glossary of Supplementary Definitions
table
- 28. Migration Planning Techniques
TADG
- 25. Architecture Patterns
- 25.1 Introduction
- 25.2 US Treasury Architecture Development Guidance (TADG)
TAFIM
- 1. Introduction
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
tailor
- 6. Preliminary Phase
- 24. Stakeholder Management
- 24.3 Steps in the Stakeholder Management Process
tailored
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
Tailored Architecture Framework
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
tailoring
- 48. Architecture Compliance
- 48.6 Architecture Compliance Review Guidelines
Take-On
- 50. Architecture Governance
- 50.2 Architecture Governance Framework
- 50.2.1 Architecture Governance Framework - Conceptual Structure
target
- 3. Definitions
- 7. Phase A: Architecture Vision
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
Target Architecture
- 3. Definitions
Target Architecture Description
- 5. Introduction
- 5.5 Scoping the Architecture
target first
- 19. Applying Iteration to the ADM
targets
- 16. Phase H: Architecture Change Management
taxonomy
- 3. Definitions
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 43.4 Application Platform - Taxonomy
- 43.4.1 Basic Principles
- 43.4.3 Application Platform Service Qualities
taxonomy of architecture views
- 3. Definitions
TCP/IP
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.5 Developing a Communications Engineering View
team
- 6. Preliminary Phase
technical
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.4 Technology Principles
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
- 43. Foundation Architecture: Technical Reference Model
- 44. Integrated Information Infrastructure Reference Model
- 44.1 Basic Concepts
- 52. Architecture Skills Framework
- 52.5 Enterprise Architecture Role and Skill Definitions
- 52.6 Generic Role and Skills of the Enterprise Architect
- 52.6.3 Key Characteristics of an Enterprise Architect
- Frontmatter
- Participants
Technical Reference Model
technique
- 5. Introduction
- 5.1 ADM Overview
- 18. Introduction
- 28. Migration Planning Techniques
technologies
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
technology
- 3. Definitions
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 12.4.2 Develop Baseline Technology Architecture Description
- 12.4.3 Develop Target Technology Architecture Description
- 12.4.8 Finalize the Technology Architecture
Technology Architecture
- 2. Core Concepts
- 3. Definitions
- 12. Phase D: Technology Architecture
technology building blocks
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
technology component
- 34. Content Metamodel
- 34.2 Content Metamodel Vision and Concepts
- 34.2.1 Core Content Metamodel Concepts
- A. Glossary of Supplementary Definitions
technology governance
- 50. Architecture Governance
Technology Portfolio catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
technology principles, examples
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
Technology Standards
- 41. Architecture Repository
- 41.4 Standards Information Base
Technology Standards catalog
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.6 Phase D: Technology Architecture
TeleManagement Forum
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 12. Phase D: Technology Architecture
- 12.2 Approach
template
- 24. Stakeholder Management
terminology
- 25. Architecture Patterns
- 25.1 Introduction
- 48. Architecture Compliance
terminology tailoring
- 6. Preliminary Phase
terms
- 52. Architecture Skills Framework
- 52.6 Generic Role and Skills of the Enterprise Architect
tested
- 21. Security Architecture and the ADM
- 21.10 Phase E: Opportunities & Solutions
textual
- 26. Business Scenarios and Business Goals
- 26.8 Business Scenario Documentation
that
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 21.10 Phase E: Opportunities & Solutions
- 21.12 Phase G: Implementation Governance
their
- 26. Business Scenarios and Business Goals
- 26.7 Developing Business Scenarios
- 26.7.2 Questions to Ask for Each Area
this
- 4. Release Notes
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- Frontmatter
- Preface
threats
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
Three-Tier
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
through
- 14. Phase F: Migration Planning
tier
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
time
- 5. Introduction
- 5.5 Scoping the Architecture
- 20. Applying the ADM across the Architecture Landscape
- A. Glossary of Supplementary Definitions
time period
- 5. Introduction
- 5.5 Scoping the Architecture
- A. Glossary of Supplementary Definitions
time period, enterprise
- 5. Introduction
timing
- 14. Phase F: Migration Planning
- 48. Architecture Compliance
- 48.3 Architecture Compliance Reviews
TMF
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.2 Approach
- 12. Phase D: Technology Architecture
- 12.2 Approach
TOGAF
- 1. Introduction
TOGAF ADM
- 16. Phase H: Architecture Change Management
- 36. Architecture Deliverables
- 39. Enterprise Continuum
TOGAF TRM
- 12. Phase D: Technology Architecture
- 12.2 Approach
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.4 Developing a System Engineering View
- 39. Enterprise Continuum
- 39.4 Enterprise Continuum in Detail
- 39.4.1 Architecture Continuum
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
tool
- 6. Preliminary Phase
- 6.4 Steps
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 17. ADM Architecture Requirements Management
- 17.2 Approach
- 17.2.3 Resources
- 21. Security Architecture and the ADM
- 21.5 Preliminary Phase
- 35. Architectural Artifacts
- 42. Tools for Architecture Development
trademarks
- Frontmatter
training
- 21. Security Architecture and the ADM
transaction
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
transaction processing services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
transaction sequence
- A. Glossary of Supplementary Definitions
transaction transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
transformation
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
transformation readiness assessment
- 30. Business Transformation Readiness Assessment
- 30.1 Introduction
transition
- 3. Definitions
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
- 28. Migration Planning Techniques
Transition Architecture
- 3. Definitions
Transition Architecture Description
- 5. Introduction
- 5.5 Scoping the Architecture
Transition Planning
- 19. Applying Iteration to the ADM
transparency
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
treasury
- 25. Architecture Patterns
triggering
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
triggers
- 47. Architecture Board
- 47.3 Setting Up the Architecture Board
TRM
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 43.3 TRM in Detail
- 43.3.2 TRM Entities and Interfaces
- 43.3.4 Application Platform
TRM, detail
- 43. Foundation Architecture: Technical Reference Model
TRM graphic
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
- 43.4 Application Platform - Taxonomy
TRMs
- 43. Foundation Architecture: Technical Reference Model
- 43.1 Concepts
trust
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
trustee
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.2 Data Principles
trying
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
Two-Tier
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
types
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
- 10. Phase C: Information Systems Architectures - Data Architecture
- 10.4 Steps
- 10.4.1 Select Reference Models, Viewpoints, and Tools
- 11. Phase C: Information Systems Architectures - Application Architecture
- 11.4 Steps
- 11.4.1 Select Reference Models, Viewpoints, and Tools
- 12. Phase D: Technology Architecture
- 12.4 Steps
- 12.4.1 Select Reference Models, Viewpoints, and Tools
- 41. Architecture Repository
- 41.4 Standards Information Base
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
UML
- 8. Phase B: Business Architecture
- 8.2 Approach
under
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
- 51. Architecture Maturity Models
- 51.3 US DoC ACMM Framework
- 51.3.3 Example: Enterprise Architecture Process Maturity Levels
understand
- 20. Applying the ADM across the Architecture Landscape
up
- 47. Architecture Board
update
- 14. Phase F: Migration Planning
upon
- 21. Security Architecture and the ADM
- 21.11 Phase F: Migration Planning
US
- 25. Architecture Patterns
- 51. Architecture Maturity Models
usability
- 4. Release Notes
- 4.2 The Benefits of TOGAF 9
US DoD
use
- 4. Release Notes
- 4.5 Using TOGAF
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.1 Business Principles
- 25. Architecture Patterns
- 25.1 Introduction
Use-Case
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.3 Phase B: Business Architecture
- 35.6.5 Phase C: Application Architecture
- A. Glossary of Supplementary Definitions
use-case analysis
- 8. Phase B: Business Architecture
- 8.4 Steps
- 8.4.1 Select Reference Models, Viewpoints, and Tools
use-case model
- 8. Phase B: Business Architecture
- 8.2 Approach
used
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
useful
- 21. Security Architecture and the ADM
- 21.4 ADM Architecture Requirements Management
user
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.5 Phase C: Application Architecture
- 43. Foundation Architecture: Technical Reference Model
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
user interface services
- 43. Foundation Architecture: Technical Reference Model
- 43.4 Application Platform - Taxonomy
- 43.5 Detailed Platform Taxonomy
- A. Glossary of Supplementary Definitions
users
- 21. Security Architecture and the ADM
- 49. Architecture Contracts
uses
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
using
- 1. Introduction
- 1.2 Executive Overview
- 2. Core Concepts
- 4. Release Notes
- 18. Introduction
- 22. Using TOGAF to Define & Govern SOAs
utilities
- 44. Integrated Information Infrastructure Reference Model
- 44.3 Detailed Taxonomy
utilizing
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
v
- 38. Introduction
validate
- 13. Phase E: Opportunities & Solutions
- 13.4 Steps
validation
- 14. Phase F: Migration Planning
value
- 7. Phase A: Architecture Vision
- 14. Phase F: Migration Planning
- 16. Phase H: Architecture Change Management
- 16.4 Steps
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 28. Migration Planning Techniques
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
Value Chain diagram
- 35. Architectural Artifacts
- 35.6 Architectural Artifacts by ADM Phase
- 35.6.2 Phase A: Architecture Vision
values
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.4 Information Management Checklists
vehicle
- 14. Phase F: Migration Planning
vendor
- 26. Business Scenarios and Business Goals
- 26.9 Guidelines on Goals and Objectives
- 26.9.3 Categories of Goals and Objectives
versus
- 16. Phase H: Architecture Change Management
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
view
- 3. Definitions
- 35. Architectural Artifacts
- 35.1 Basic Concepts
- 35.2 Developing Views in the ADM
- 35.7 Recommended Architecture Views to be Developed
- 35.7.1 Developing a Business Architecture View
view, Acquirer
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
view, Communications Engineering
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
view, Data Flow
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
view, Enterprise Manageability
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
view, Enterprise Security
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
viewpoint
- 3. Definitions
- 8. Phase B: Business Architecture
- 10. Phase C: Information Systems Architectures - Data Architecture
- 11. Phase C: Information Systems Architectures - Application Architecture
- 12. Phase D: Technology Architecture
- 24. Stakeholder Management
- 35. Architectural Artifacts
- 35.1 Basic Concepts
viewpoints, examples
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
views
- 3. Definitions
- 24. Stakeholder Management
- 25. Architecture Patterns
- 25.1 Introduction
- 25.1.3 Terminology
- 35. Architectural Artifacts
views, creation
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
views, examples
- 35. Architectural Artifacts
- 35.4 Views and Viewpoints
views, guidelines
- 35. Architectural Artifacts
- 35.2 Developing Views in the ADM
view, Software Engineering
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
view, System Engineering
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
VII
- 45. Introduction
vision
- 3. Definitions
- 7. Phase A: Architecture Vision
- 7.2 Approach
- 7.4 Steps
vocabulary
- 23. Architecture Principles
- 23.6 Example Set of Architecture Principles
- 23.6.2 Data Principles
warrant
- 21. Security Architecture and the ADM
- 21.8 Phase C: Information Systems Architectures
we
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
what
- 1. Introduction
- 2. Core Concepts
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
what's
- 4. Release Notes
where
- 21. Security Architecture and the ADM
- 21.9 Phase D: Technology Architecture
- 48. Architecture Compliance
- 48.5 Architecture Compliance Review Checklists
- 48.5.7 System Engineering/Overall Architecture Checklists
which
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
who
- 1. Introduction
- 1.2 Executive Overview
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
whom/how
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
why
- 1. Introduction
- 4. Release Notes
will
- 21. Security Architecture and the ADM
- 21.6 Phase A: Architecture Vision
- 21.7 Phase B: Business Architecture
- 21.9 Phase D: Technology Architecture
- 21.11 Phase F: Migration Planning
within
- 4. Release Notes
- 4.1 What's New in TOGAF 9?
- 19. Applying Iteration to the ADM
- 19.5 Iteration Considerations
- 40. Architecture Partitioning
- 40.2 Applying Classification to Create Partitioned Architectures
- 41. Architecture Repository
- 41.4 Standards Information Base
- 50. Architecture Governance
- 50.1 Introduction
work
- 3. Definitions
- 6. Preliminary Phase
- 6.2 Approach
- 7. Phase A: Architecture Vision
- 13. Phase E: Opportunities & Solutions
- 14. Phase F: Migration Planning
- 36. Architecture Deliverables
- 36.2 Deliverable Descriptions
- 49. Architecture Contracts
- 49.2 Contents
work package
- 3. Definitions
would
- 1. Introduction
wrapping process
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.2 Developing an Enterprise Security View
wrong
- 21. Security Architecture and the ADM
- 21.7 Phase B: Business Architecture
- 21.8 Phase C: Information Systems Architectures
- 21.9 Phase D: Technology Architecture
- 21.10 Phase E: Opportunities & Solutions
- 21.11 Phase F: Migration Planning
- 21.12 Phase G: Implementation Governance
- 21.13 Phase H: Architecture Change Management
XML
- 35. Architectural Artifacts
- 35.7 Recommended Architecture Views to be Developed
- 35.7.3 Developing a Software Engineering View
your
- 39. Enterprise Continuum
- 39.6 The Enterprise Continuum and Your Organization
Zachman Framework
- 5. Introduction
The TOGAF document set is designed for use with frames. To navigate around the document:
Downloads of TOGAF®, an Open Group Standard, are available under license from the TOGAF information web site. The license is free to any organization wishing to use the TOGAF standard entirely for internal purposes (for example, to develop an information system architecture for use within that organization). A book is also available (in hardcopy and pdf) from The Open Group Bookstore as document G116.