|By Gopala Krishna Behara, Prasad Palli||
|December 8, 2012 03:00 PM EST||
The aim of the Architecture Assurance is to provide collaborative architecture processes for assuring complete implementation of the technical solutions that are aligned with the business drivers of an enterprise in a timely environment. The effective sharing of the information across different Business Units (BU) / departments within an enterprise and interoperability across IT systems would ensure the alignment of IT with business. The Architecture Assurance Group (AAG) is involved in reviewing the Project Architecture during the design and development phases of an application/system to help ensure successful project implementation. This review also ensures that the proposed system fits into the existing enterprise environment as well as the future architecture vision.
The goals of Architecture Assurance include some or all of the following:
- Identify inconsistencies in the architecture early, which reduces the cost and risk of changes required later in the life cycle
- Provide an overview of the compliance of architecture to mandated enterprise standards
- Identify where the standards may require modification
- Identify services that are currently application-specific but might be provided as part of the enterprise infrastructure
- Take advantage of advances in technology
- Communicate to management the status of the technical readiness of the project
- Identify and communicate significant architectural gaps to product and service providers
- Establish, own and manage Enterprise Architecture Content
- Provide architecture governance: guidelines and recommendations on business and IT architecture
- Ensure and enforce architecture compliance: review changes and deviations in business and IT architecture
- Resolve architectural ambiguities, issues and conflicts at the enterprise level
- Identify projects that have high architectural risk, and provide assistance to them early and often throughout the project
- Provide guidance to project managers and designers to direct architecture compliance
- Formally review projects to ensure compliance
- Leverage third-party assessments
- Leverage COT's products
The main benefits of these reviews are:
- Architecture is reviewed by a group of experienced architects across the enterprise
- Assistance in leveraging the existing architecture promoting the reusability
- Architecture for plug and play
- Promote simplification and standardization
- Proactively identify risks to the project
- Provide enterprise-wide context to project team
Maintain the integrity of the enterprise IT environment and expand the user community's access to Enter resources
- Does the project presents risk to the IT environment (e.g., infrastructure, other applications, users, enterprise policy)
- Allows Architecture Review Team to proactively recognize when modifications to the architecture are required
- Allows the project team to provide input to the extension of the proposed architecture
- Does the project leverage the existing common services where applicable
- Provides cost effectiveness across the enterprise
Architecture Assurance Methodology
The Architecture Assurance Group is a multi-disciplinary body that is responsible for the maintenance and enforcement of Architecture, Design standards and best practices across the programs/projects. The primary responsibility is to provide governance and ensure compliance of the defined enterprise / solution architecture.
Architecture Assurance is the key success factor in ensuring high quality deliverables for the architecture and design phases. The intent of the Architecture Assurance Process is to ensure that ongoing projects have the right architectural assumptions and that in-flight projects receive architectural guidance throughout the life cycle. This should be a collaborative effort to ensure that project designs and implementations are compliant with the defined architecture
A detailed Architecture Assurance process that achieves these goals is shown in Figure 1.
Architecture/Design Review(s) should be conducted at a stage when there is still time to correct any major inconsistencies or shortcomings in the program/project.
The Architecture/Design Review is typically targeted for the Analysis SDLC phase and at a point in time when:
- Business goals, business requirements, policies are defined
- Ball park clarity of hardware and software requirements & decisions are not finalized
- Project schedules / timelines are defined
- Project risk assessment is done
Architecture Review Criteria is:
- Start Early
- Drive and Participate in architecture workshop
- Establish relation with architecture & design teams
- Involve through architecture & design
- Involve and review the architecture and design decisions on an ongoing basis
- Review the intermittent and final architecture deliverables
- Share architecture best practices
- Mentor architecture and design teams as appropriate
- Architectural Risk Analysis and Mitigation
- Quality attribute analysis of architecture
- Failure and risk analysis of architecture
- Mentor on engineering best practices
- Mentor on Development method, tools & build practices
- Performance and other NFR related best practices
During the review, the architecture review team needs to extract the information like impacted groups, impacted systems, data feeds, software components required such as build, buy and reuse, security requirement, availability, scalability, error handling, capacity sizing, integration with third parties, data center/hosting facility, etc.
Key activities of the Architecture Assurance Group are:
- Conduct planned and random formal architecture review workshops for projects and programs
- Analyze architecture quality attributes against requirements
- Conduct architecture failure and risk analysis and mitigation plan
- Identify areas of non-compliance and options to redress shortcomings
- Conduct formal/informal reviews of intermediate and final architecture deliverables to ensure ongoing compliance and quality
- Review and track architecture and design decisions
In this phase, Architecture Assurance look for a high-level functional fit and nonfunctional fitment of the solution. Also verifies the solution mapping with the design and various options provided for the solution, reasons for the choices, TCO analysis of each option, etc.
In this phase, the verification of the alignment of the solution with the architecture requirements is done. Proper realization of the Architecture Principles, Architecture Patterns, IT Strategy alignment are performed in this phase. Any deviation of the standards needs to be approved by the Architecture Assurance Group.
In this phase, the report will be reviewed in terms of Business, Data, application & Technology. Also, identification of the open items, action items and next steps will be addressed & communicated to the project team
The prepared report will be presented to the Program management & track the observations to the closure. In this Phase, we oversee the updated architecture artifacts
Architecture Review Process
To ensure smooth, timely, and low impact reviews, the involved parties should prepare within the guidelines below. The process flow is shown in Figure 2.
The project architecture team is responsible for:
- Developing a project description that provides sufficient detail for the review team to evaluate architectural risks, including the project size, business impact, NFRs, Architecture Principles
- Sharing project estimates
The Architecture Assurance Team is responsible for:
- Assessing projects for architectural impact during the Proposal/Project Initiation phase of the SDLC processes
- Providing guidance to projects through the design phase to ensure that the final design is architecturally compliant
- Prepare/Customize Architecture Templates, Architecture Checklist
- Participate in the Architecture Review meetings to provide support to project teams and to assist the Architecture Assurance Group in decision making.
- Analyze the filled up Checklist, Summarize the review findings
- Customize Architecture Metrics
As part of the Architecture Review Process the following standards of the system need to be reviewed and agreed
- Business Strategy, Goals & Vision
- IT Strategy
- Existing Budgets, Resource Plans, Project Plans
- Business Scope Description
- Use Case Specification
- Business Requirements Document (BRD)
- Service Level Agreements
- TCO Model (CAPEX/OPEX etc.) - Funding Status
- Build/Buy/Reuse(Retrofit) Considerations
- Business process modeling and workflow system
- Business Process Optimization
- Business Process Analysis
- Business Process Monitoring & SLA's
- Application platform
- Programming/scripting language
- Testing/monitoring tools
- User interface platform
- Enterprise application integration platform
- Conceptual Architecture
- Logical Architecture
- Physical Architecture
- Security Architecture
- Portal platform
- Architecture Frameworks
- Performance Tuning Plan
- Migration Plan
- Tool/Vendor Selection Results
- Data Strategy
- Logical Data Model (LDM)
- Physical Data Model (PDM)
- Data integration platform
- Reporting and data analysis platform
- Server platform and operating system
- Desktop platform and operating system
- Bill of Materials
- H/W & S/W Acquisition/Lease Plan
- Security Implementation/Management Plan
- Deployment Plan
- Operational Readiness Plan
- Release Plan
- Network infrastructure
- System Performance Report
- Disaster Recovery Plan
Architecture Assurance Lead will perform the following activities:
- Assign Review Team
- Disagreement/Issue Resolution
- Review Findings discussion and agreement & communication with the project/program team
Review members will:
- Commit to review all materials in advance
- Prepare detailed questions using this practice standard and Checklist as appropriate
- Conduct any preliminary research as necessary to be an informed team member
- Attend all review meetings
- Provide a final assessment and recommendation based on their interpretation of the impact of the proposed solution architecture and design on the Enterprise Architecture.
Authors like to thank Hari Kishan Burle, General Manager, Wipro Technologies for giving us the required time and support in many ways in bringing this article as part of Architecture Assurance Practice efforts.
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust IT industrialization – allowing customers to provide amazing user experiences with optimized IT per...
May. 27, 2015 03:30 PM EDT Reads: 985
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
May. 27, 2015 02:00 PM EDT Reads: 2,110
The world is at a tipping point where the technology, the device and global adoption are converging to such a point that we will see an explosion of a world where smartphone devices not only allow us to talk to each other, but allow for communication between everything – serving as a central hub from which we control our world – MediaTek is at the heart of both driving this and allowing the markets to drive this reality forward themselves. The next wave of consumer gadgets is here – smart, connected, and small. If your ambitions are big, so are ours. In his session at @ThingsExpo, Jack Hu, D...
May. 27, 2015 12:49 PM EDT Reads: 686
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
May. 27, 2015 12:00 PM EDT Reads: 2,402
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
May. 27, 2015 12:00 PM EDT Reads: 2,360
We’re entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems – call it what you want, but it’s happening, and its potential is huge. IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can “command and control” thi...
May. 27, 2015 11:51 AM EDT Reads: 647
As the Internet of Things unfolds, mobile and wearable devices are blurring the line between physical and digital, integrating ever more closely with our interests, our routines, our daily lives. Contextual computing and smart, sensor-equipped spaces bring the potential to walk through a world that recognizes us and responds accordingly. We become continuous transmitters and receivers of data. In his session at @ThingsExpo, Andrew Bolwell, Director of Innovation for HP's Printing and Personal Systems Group, discussed how key attributes of mobile technology – touch input, sensors, social, and ...
May. 27, 2015 11:30 AM EDT Reads: 4,366
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
May. 27, 2015 11:15 AM EDT Reads: 2,823
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will addresses this very serious issue of profound change in the industry.
May. 27, 2015 10:30 AM EDT Reads: 1,378
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
May. 27, 2015 10:30 AM EDT Reads: 5,506
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fil...
May. 27, 2015 10:00 AM EDT Reads: 2,283
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
May. 27, 2015 09:30 AM EDT Reads: 7,160
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
May. 27, 2015 09:30 AM EDT Reads: 4,668
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
May. 27, 2015 07:30 AM EDT Reads: 5,756
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
May. 27, 2015 04:30 AM EDT Reads: 4,366
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
May. 27, 2015 03:00 AM EDT Reads: 6,034
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
May. 27, 2015 02:30 AM EDT Reads: 5,701
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
May. 27, 2015 02:00 AM EDT Reads: 6,455
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a business application to multiple users (multi-tenancy). Docker, a container technology, was used to ...
May. 27, 2015 01:00 AM EDT Reads: 2,662
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
May. 26, 2015 09:00 PM EDT Reads: 5,300