|By Gopala Krishna Behara, Prasad Palli||
|December 8, 2012 03:00 PM EST||
The aim of the Architecture Assurance is to provide collaborative architecture processes for assuring complete implementation of the technical solutions that are aligned with the business drivers of an enterprise in a timely environment. The effective sharing of the information across different Business Units (BU) / departments within an enterprise and interoperability across IT systems would ensure the alignment of IT with business. The Architecture Assurance Group (AAG) is involved in reviewing the Project Architecture during the design and development phases of an application/system to help ensure successful project implementation. This review also ensures that the proposed system fits into the existing enterprise environment as well as the future architecture vision.
The goals of Architecture Assurance include some or all of the following:
- Identify inconsistencies in the architecture early, which reduces the cost and risk of changes required later in the life cycle
- Provide an overview of the compliance of architecture to mandated enterprise standards
- Identify where the standards may require modification
- Identify services that are currently application-specific but might be provided as part of the enterprise infrastructure
- Take advantage of advances in technology
- Communicate to management the status of the technical readiness of the project
- Identify and communicate significant architectural gaps to product and service providers
- Establish, own and manage Enterprise Architecture Content
- Provide architecture governance: guidelines and recommendations on business and IT architecture
- Ensure and enforce architecture compliance: review changes and deviations in business and IT architecture
- Resolve architectural ambiguities, issues and conflicts at the enterprise level
- Identify projects that have high architectural risk, and provide assistance to them early and often throughout the project
- Provide guidance to project managers and designers to direct architecture compliance
- Formally review projects to ensure compliance
- Leverage third-party assessments
- Leverage COT's products
The main benefits of these reviews are:
- Architecture is reviewed by a group of experienced architects across the enterprise
- Assistance in leveraging the existing architecture promoting the reusability
- Architecture for plug and play
- Promote simplification and standardization
- Proactively identify risks to the project
- Provide enterprise-wide context to project team
Maintain the integrity of the enterprise IT environment and expand the user community's access to Enter resources
- Does the project presents risk to the IT environment (e.g., infrastructure, other applications, users, enterprise policy)
- Allows Architecture Review Team to proactively recognize when modifications to the architecture are required
- Allows the project team to provide input to the extension of the proposed architecture
- Does the project leverage the existing common services where applicable
- Provides cost effectiveness across the enterprise
Architecture Assurance Methodology
The Architecture Assurance Group is a multi-disciplinary body that is responsible for the maintenance and enforcement of Architecture, Design standards and best practices across the programs/projects. The primary responsibility is to provide governance and ensure compliance of the defined enterprise / solution architecture.
Architecture Assurance is the key success factor in ensuring high quality deliverables for the architecture and design phases. The intent of the Architecture Assurance Process is to ensure that ongoing projects have the right architectural assumptions and that in-flight projects receive architectural guidance throughout the life cycle. This should be a collaborative effort to ensure that project designs and implementations are compliant with the defined architecture
A detailed Architecture Assurance process that achieves these goals is shown in Figure 1.
Architecture/Design Review(s) should be conducted at a stage when there is still time to correct any major inconsistencies or shortcomings in the program/project.
The Architecture/Design Review is typically targeted for the Analysis SDLC phase and at a point in time when:
- Business goals, business requirements, policies are defined
- Ball park clarity of hardware and software requirements & decisions are not finalized
- Project schedules / timelines are defined
- Project risk assessment is done
Architecture Review Criteria is:
- Start Early
- Drive and Participate in architecture workshop
- Establish relation with architecture & design teams
- Involve through architecture & design
- Involve and review the architecture and design decisions on an ongoing basis
- Review the intermittent and final architecture deliverables
- Share architecture best practices
- Mentor architecture and design teams as appropriate
- Architectural Risk Analysis and Mitigation
- Quality attribute analysis of architecture
- Failure and risk analysis of architecture
- Mentor on engineering best practices
- Mentor on Development method, tools & build practices
- Performance and other NFR related best practices
During the review, the architecture review team needs to extract the information like impacted groups, impacted systems, data feeds, software components required such as build, buy and reuse, security requirement, availability, scalability, error handling, capacity sizing, integration with third parties, data center/hosting facility, etc.
Key activities of the Architecture Assurance Group are:
- Conduct planned and random formal architecture review workshops for projects and programs
- Analyze architecture quality attributes against requirements
- Conduct architecture failure and risk analysis and mitigation plan
- Identify areas of non-compliance and options to redress shortcomings
- Conduct formal/informal reviews of intermediate and final architecture deliverables to ensure ongoing compliance and quality
- Review and track architecture and design decisions
In this phase, Architecture Assurance look for a high-level functional fit and nonfunctional fitment of the solution. Also verifies the solution mapping with the design and various options provided for the solution, reasons for the choices, TCO analysis of each option, etc.
In this phase, the verification of the alignment of the solution with the architecture requirements is done. Proper realization of the Architecture Principles, Architecture Patterns, IT Strategy alignment are performed in this phase. Any deviation of the standards needs to be approved by the Architecture Assurance Group.
In this phase, the report will be reviewed in terms of Business, Data, application & Technology. Also, identification of the open items, action items and next steps will be addressed & communicated to the project team
The prepared report will be presented to the Program management & track the observations to the closure. In this Phase, we oversee the updated architecture artifacts
Architecture Review Process
To ensure smooth, timely, and low impact reviews, the involved parties should prepare within the guidelines below. The process flow is shown in Figure 2.
The project architecture team is responsible for:
- Developing a project description that provides sufficient detail for the review team to evaluate architectural risks, including the project size, business impact, NFRs, Architecture Principles
- Sharing project estimates
The Architecture Assurance Team is responsible for:
- Assessing projects for architectural impact during the Proposal/Project Initiation phase of the SDLC processes
- Providing guidance to projects through the design phase to ensure that the final design is architecturally compliant
- Prepare/Customize Architecture Templates, Architecture Checklist
- Participate in the Architecture Review meetings to provide support to project teams and to assist the Architecture Assurance Group in decision making.
- Analyze the filled up Checklist, Summarize the review findings
- Customize Architecture Metrics
As part of the Architecture Review Process the following standards of the system need to be reviewed and agreed
- Business Strategy, Goals & Vision
- IT Strategy
- Existing Budgets, Resource Plans, Project Plans
- Business Scope Description
- Use Case Specification
- Business Requirements Document (BRD)
- Service Level Agreements
- TCO Model (CAPEX/OPEX etc.) - Funding Status
- Build/Buy/Reuse(Retrofit) Considerations
- Business process modeling and workflow system
- Business Process Optimization
- Business Process Analysis
- Business Process Monitoring & SLA's
- Application platform
- Programming/scripting language
- Testing/monitoring tools
- User interface platform
- Enterprise application integration platform
- Conceptual Architecture
- Logical Architecture
- Physical Architecture
- Security Architecture
- Portal platform
- Architecture Frameworks
- Performance Tuning Plan
- Migration Plan
- Tool/Vendor Selection Results
- Data Strategy
- Logical Data Model (LDM)
- Physical Data Model (PDM)
- Data integration platform
- Reporting and data analysis platform
- Server platform and operating system
- Desktop platform and operating system
- Bill of Materials
- H/W & S/W Acquisition/Lease Plan
- Security Implementation/Management Plan
- Deployment Plan
- Operational Readiness Plan
- Release Plan
- Network infrastructure
- System Performance Report
- Disaster Recovery Plan
Architecture Assurance Lead will perform the following activities:
- Assign Review Team
- Disagreement/Issue Resolution
- Review Findings discussion and agreement & communication with the project/program team
Review members will:
- Commit to review all materials in advance
- Prepare detailed questions using this practice standard and Checklist as appropriate
- Conduct any preliminary research as necessary to be an informed team member
- Attend all review meetings
- Provide a final assessment and recommendation based on their interpretation of the impact of the proposed solution architecture and design on the Enterprise Architecture.
Authors like to thank Hari Kishan Burle, General Manager, Wipro Technologies for giving us the required time and support in many ways in bringing this article as part of Architecture Assurance Practice efforts.
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ...
Mar. 2, 2015 02:45 PM EST Reads: 464
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
Mar. 2, 2015 02:00 PM EST Reads: 1,398
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes ...
Mar. 2, 2015 01:45 PM EST Reads: 1,270
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, it is now feasible to create a rich desktop and tuned mobile experience with a single codebase, without compromising performance or usability.
Mar. 2, 2015 01:15 PM EST Reads: 1,191
SYS-CON Events announced today Arista Networks will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Arista Networks was founded to deliver software-driven cloud networking solutions for large data center and computing environments. Arista’s award-winning 10/40/100GbE switches redefine scalability, robustness, and price-performance, with over 3,000 customers and more than three million cloud networking ports depl...
Mar. 2, 2015 01:00 PM EST Reads: 1,587
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, will explain the best practices of continuous testing at high scale, which is r...
Mar. 2, 2015 01:00 PM EST Reads: 1,250
HP and Aruba Networks on Monday announced a definitive agreement for HP to acquire Aruba, a provider of next-generation network access solutions for the mobile enterprise, for $24.67 per share in cash. The equity value of the transaction is approximately $3.0 billion, and net of cash and debt approximately $2.7 billion. Both companies' boards of directors have approved the deal. "Enterprises are facing a mobile-first world and are looking for solutions that help them transition legacy investme...
Mar. 2, 2015 12:45 PM EST Reads: 552
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Mar. 2, 2015 12:00 PM EST Reads: 2,613
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
Mar. 2, 2015 12:00 PM EST Reads: 2,403
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
Mar. 2, 2015 12:00 PM EST Reads: 1,345
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
Mar. 2, 2015 12:00 PM EST Reads: 1,962
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Mar. 2, 2015 11:00 AM EST Reads: 2,766
SYS-CON Media announced that IBM, which offers the world’s deepest portfolio of technologies and expertise that are transforming the future of work, has launched ad campaigns on SYS-CON’s numerous online magazines such as Cloud Computing Journal, Virtualization Journal, SOA World Magazine, and IoT Journal. IBM’s campaigns focus on vendors in the technology marketplace, the future of testing, Big Data and analytics, and mobile platforms.
Mar. 2, 2015 11:00 AM EST Reads: 1,001
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
Mar. 2, 2015 11:00 AM EST Reads: 7,032
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add sc...
Mar. 2, 2015 10:00 AM EST Reads: 4,850
Data-intensive companies that strive to gain insights from data using Big Data analytics tools can gain tremendous competitive advantage by deploying data-centric storage. Organizations generate large volumes of data, the vast majority of which is unstructured. As the volume and velocity of this unstructured data increases, the costs, risks and usability challenges associated with managing the unstructured data (regardless of file type, size or device) increases simultaneously, including end-to-...
Mar. 2, 2015 09:45 AM EST Reads: 2,334
The excitement around the possibilities enabled by Big Data is being tempered by the daunting task of feeding the analytics engines with high quality data on a continuous basis. As the once distinct fields of data integration and data management increasingly converge, cloud-based data solutions providers have emerged that can buffer your organization from the complexities of this continuous data cleansing and management so that you’re free to focus on the end goal: actionable insight.
Mar. 2, 2015 09:30 AM EST Reads: 1,691
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
Mar. 2, 2015 09:00 AM EST Reads: 2,939
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to mak...
Mar. 2, 2015 09:00 AM EST Reads: 1,151
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics arc...
Mar. 2, 2015 09:00 AM EST Reads: 1,348