SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION
A digital telco approach can provide operators with the agility required to thrive in the Networked Society.
This approach requires a transformation of both the front end and back end of an operator’s business.
Applying Enterprise Architecture principles results in six key steps operators should take to bridge the gap
between business, IT and networks and thereby secure an effective transformation.
ericsson White paper
Uen 284 23-3272 | October 2015
How to bridge
the gap between
business, IT and
networks
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • INTRODUCTION  2
Introduction
Telecom markets are increasingly driven by consumer demands for a better user experience,
value-added digital services and competitive pricing. In this fast-changing landscape, business
agility and flexibility are essential.
For operators, a digital telco approach represents a new business and operating model for
creating digital services and responding to consumer demands.This model provides the agility
required to manage the entire digital ecosystem. However, the model also calls for an ICT
transformation of both the front end and back end of an operator’s business.
Successful transformation requires an agile and structured methodology. Here, operators can
benefit from implementing industry-standard Enterprise Architecture (EA) principles.
EA is a practice that bridges the gap between business, IT and networks. It allows an
organization to take a holistic view of its components, and can be used to identify and analyze
the key dimensions of a solution that are needed to deliver a desired business outcome. As a
result, EA is relevant to the development of the whole enterprise – from business strategy, models
and processes, to information systems and technical infrastructure.
This paper describes best practices for operators in leveraging EA principles to bridge the
gap between business, IT and networks and to drive the realization of business benefits.
Business
What?
Innovative
business models
(customer - products
- partners)
How?
Effective and
efficient operating
models
(process - people
- technology)
IT
Networks
Figure 1: EA is relevant to the development of the whole enterprise – from business
strategy, models and processes, to information systems and technical infrastructure.
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • WHY BRIDGE THE GAP?  3
Why bridge
the gap?
Driven by increased demand in relation to digital services, user experience and operational
excellence, operators are facing new business challenges where success will heavily be dependent
on their capability to bridge the gap between business, IT and networks.
Securing this bridging capability is essential to succeed in the necessary ICT transformation
– of both the front end of the operator’s business, which faces both customers and partners,
and the back end, which enables business capabilities.
 Transforming the front end of the business results in:
›› enablement of innovative digital services with shorter time-to-market and with higher
quality, flexibility, automation, simplicity and experience for users and partners
›› digitalization of user and partner channels.
 Transforming the back end of the business results in:
›› Operational efficiencies through process automation and simplification
›› reduced complexity through a catalog-centric and component-based service-oriented
architecture that uses real-time interactions between IT and networks
›› reduced capex and improved business agility and flexibility through Network Functions
Virtualization (NFV), network programmability and cloud infrastructure.
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • THE BENEFITS OF ESTABLISHING AN EA PRACTICE 4
The benefits of
establishing an
EA practice
By establishing an EA practice as a central planning capability, and as an ongoing program with
a solid foundation and tool to support it, an operator will be able to:
 enhance decision-making by gaining a holistic view of its business and a detailed understanding
of its EA artefacts and their relationships
 effectively manage change by enabling impact analysis of affected artefacts and eliminating
discovery time and effort
 plan evolution from as-is to desired architectures by providing guiding principles for planning
and selection of transition states
 better align IT to business by demonstrating alignment between IT initiatives and business
objectives, and expressing architecture work in terms of business outcomes and capabilities
 shorten time to market by promoting re-use of patterns and packaged building blocks.
As shown in Figure 2, EA is composed of
a governance framework, a work method,
a meta-model and a tool:
 The EA governance framework is the
practice by which EA is managed and
controlled at an enterprise-wide level,
ensuring that processes are in place to
ensure the best possible compliance
with the target architecture. Governance
is achieved by setting up the right EA
team structure to operate its EA work
method, and by formalizing the team’s
interactions with the EA stakeholders.
 The EA work method is the process
followed to plan and develop architecture,
identify solutions and govern their
implementation. It is also the process whereby all the relevant architecture artefacts are
gathered and linked to describe the state of an organization from both a business and a
technology perspective.
 The EA meta-model defines how and with what the architecture artefacts are described in a
structured way. It formalizes the relationships between the artefacts to ensure impact analysis
and to provide traceability between the different parts of the architecture.
 The EA tool provides a wide range of modeling capabilities, reporting and publishing
functionalities, and effective, easy-to-use interfaces to define, store and link architectural
artefacts. The output of the EA work method is normally stored in the EA tool, the database
structure of which is customized according to the EA meta-model.
 The EA reference models are frameworks, best practices and reference architectures developed
by external parties that can be applied to develop target architectures. Examples include
TMForum Frameworx, ITIL and TOGAF Foundation Architecture.
Reference
models
Methodology
EA governance framework
directs and
controls
operates
defines
customize
structures
influencesinfluences
EA work method
EA tool
EA meta-model
Figure 2: EA – foundation components.
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP  5
bridging
the gap
Translating business requirements to achievable operational and technical capabilities will require
an end-to-end approach and agile ways of working in cross-functional teams. This will ensure
that business benefits are realized with the speed needed to keep up with market dynamics and
consumer expectations.
In practice, an operator should follow six steps in order to bridge the gap between business,
IT and networks. Each step is a practical result of applying EA principles to the development of
the whole enterprise. The steps are:
 innovate business models
 redefine operating models
 define an EA strategy and IT planning
 realize business benefits
 use EA reference models and tools
 realize end-to-end solutions.
INNOVATE BUSINESS MODELS
Business model innovation will be
increasingly critical for an operator when
realizing its value proposition. Defining
strategic goals and the required business
models will set the priorities for the scope
of both the front-end and back-end
transformations needed. Alexander
Osterwalder’s Business Model Canvas, as
shown in Figure 3, can help illustrate this
process.
For example, consider the value
proposition: “As a market-leading digital
telco, we will offer the market’s most
attractive portfolio of digital services to
retail and enterprise users, with a competitive price and the market’s best-perceived user
experience.” Realizing this proposition will require the operator to implement the following business
capabilities:
 front-end transformation (addresses revenue and value streams, as shown in Figure 3):
›› digitalization and omni-channel access (distribution channels)
›› big data analytics and business intelligence to gain user insights from consumers as
well as retail and enterprise users (customer segments)
›› self-service and social media networking (customer relationship).
 back-end transformation (addresses cost structure, as shown in Figure 3):
›› network programmability, NFV and cloud infrastructure (core capabilities)
›› real-time automation and simplification (activities)
›› shared networks (partner networks).
REDEFINE OPERATING MODELS
Front-end and back-end transformation can lead an operator to rethink its entire operating model.
All dimensions of the operating model – KPIs, technology, processes, people, organization,
partners and alliances – will be impacted. Each dimension will need to be redefined to handle
digital services, manage consumer experiences and secure the agility to manage the entire digital
ecosystem.
Back-end transformation Front-end transformation
Core
capabilities
Customer
segments
Partner
network
Business
enterprise
Offer
Finance
Customer
Activities
(processes)
Cost
structure
Customer
relationship
Distribution
channel
Revenue and
value streams
Value
proposition
Figure 3: Osterwalder Business Model Canvas.
Target
operating
model
Technology
Assets, resources and
locations
IT and network
OSS and BSS
Partners
and alliances
Performance and reporting
Management tenants
Measures and scorecards
Process
Assurance, management
Service quality
Product lifecycle,
development
People management
Leadership
Ways of working
Skills and capabilities
KPI
Goals and metrics
Performance and reporting
Benefit and realization
Organization
Management controls
Structure and governance
Roles and responsibilities
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP  6
For example:
 KPIs: introduce goals and metrics that combine top-line growth, Net Promoter Score and
margin.
 Technology: create an information (catalog)-centric and service-oriented architecture of
applications to increase agility and decrease cost of integrations. Enable flexible infrastructure
ready for the digital services landscape, using cloud, NFV and software-defined
networking technologies.
 Process: automate and simplify end-to-end process flows and
increase the level of self-service in the front end, and the level
of automation and self-organized networking in the back
end.
 People management: establish a user-experience-
centric culture.
 Organization: establish organizational structures
to support agile ways of working in cross-
functional teams.
 Partners and alliances: enable a more
collaborative approach with a new ecosystem
of partners/enterprises and over-the-top
players.
DEFINE AN EA STRATEGY AND IT PLANNING
To define an EA strategy and IT planning –
including the target architecture needed – and
to realize the redefined operating model of an
operator, a holistic assessment approach needs
to be applied. This is shown in Figure 5.
The approach aligns an organization’s strategy,
business, information systems and technology,
and aims to define the future vision, target state
and planning steps by performing the following
activities:
1.	 Scope: Define the focus and scope of the EA
assessment.
2.	 Discover: Assess and evaluate the current state of the
organization and its EA, including strategy capabilities, business
processes and information systems, as well as current and planned
projects.
3.	 Diagnose: Identify pain points and gaps, define process heat maps, complete an information
systems health assessment, present first findings and recommend quick wins.
4.	 Target: Create a target state EA to support the required business capabilities in the form of
business process recommendations and an information systems architecture end game.
5.	 Roadmap: Develop a strategic transition plan and roadmap to achieve the future state through
a set of transformation activities and defined transition architectures.
6.	 Propose: Create a holistic transformation proposal(s).  
REALIZE BUSINESS BENEFITS
Realizing business benefits is a fundamental
objective when practicing EA principles.This
process is driven by the business capabilities
that have been identified as requirements –
for example, by an operator that has decided
to apply a digital telco approach.
A business capability is composed of the
skills, processes, routines, organizational
structures and disciplines that enable firms
to build, employ, and orchestrate assets
relevant to satisfying user needs.
Figure 4: Dimensions of a target operating model.
Align with enterprise strategy
Plan and architect the business
Plan and architect the information systems
Scope ProposeDiscover Diagnose Target Roadmap
Figure 5: EA assessment methodology.
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 7
A business benefit is defined as the result of an action or decision that contributes to meeting
one or more business objectives. It is a measurable outcome from an action, investment, project,
resource or technology, and represents a central element in strategic planning and building
business cases.
Business benefits can be categorized into four types: revenue, operational, customer experience
management and business efficiency benefits.
Realizing business benefits is a continuous improvement process that requires constant
interactions with business stakeholders. This is ensured by applying EA principles and should
follow these phases:
 i) Capture business capability requirements
Based on its strategic ambitions, the operator should capture and prioritize critical business
capability requirements. These could be the business capability requirements of efficiently
and effectively provisioning virtual network functions and services, to give just one example.
 ii) Analyze end-to-end business process impacts
The operator should analyze the business processes that will be impacted by the new business
capability from an end-to-end perspective, by identifying pain points and defining KPIs to
measure business process performance.The aim is to simplify and automate processes, and
to reduce the number of organizational handovers. For example, in a plan-to-provision scenario,
there is a need to analyze the impact on the end-to-end process created by managing virtual
network functions.There is also a requirement to define KPIs, identify pain points and perform
heat mapping to identify potential candidates for simplification and automation.
 iii) Drill down business processes and design use cases
The operator needs to drill down end-to-end processes to further isolate critical steps. It
should illustrate and analyze use cases in activity and sequence diagrams to identify the
expectations on each logical Application Building Block’s (ABB) capabilities and integrations.
In the plan to provision example, the process should be drilled down to individual configurations
and deployment use cases to analyze the detailed requirements for configurations of, and
integrations between, logical application building blocks to support the use cases.
 iv) Define ICT and network capabilities
required and map to commercial off-
the-shelf (COTS) products
The operator should analyze and
define the ICT and network ABB
capabilities required to realize the
prioritized business capabilities
through the use cases. It should audit
the available capabilities of the legacy
applications used and clearly define
the application capability gap per ABB.
There is also a need to identify the key
information entities and information
sources for the target architecture
design, and to define a high-level
logical information model including a
CRUD (create, read, use, delete) matrix
that shows ownership and depen­
dencies.
The most cost-efficient target
architecture design of the ABB
landscape should be created following
architectural principles such as a
catalog-centric approach and service-
orientated architecture. In the plan to
provision example, the functional
capabilities of the legacy applications
Business transformation program
Program governance and methodology
What?
How?
ABB mapping
Solution realization
project
Process drill-down
and use case design
End-to-end business
process analysis
Business capability
requirement capture
Figure 6: Realization of business benefits.
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 8
in the network planning, optimization and configuration domains should be benchmarked
against the requirements of the new ABB capabilities for managing virtual network functions.
The key information entities and information sources should be identified and analyzed for the
target architecture design. Based on the gap identified, a target architecture that includes all
required capabilities can be defined.
 v) Realize solution projects
Operators need to define a roadmap for solution realization, including recommended COTS
software and migration strategies. In the example, the new ABB requirements should be
mapped to a capability evolution of the legacy applications deployed. Alternatively, a roadmap
for a side-by-side replacement with a fit-for-purpose COTS solution suite should be proposed
that fulfills the requirements of managing the resource lifecycle of virtual and non-virtual network
functions.
 
USE EA REFERENCE MODELS AND TOOLS
An operator’s operating model is described in hundreds of different EA artefacts – as end-to-end
processes, use cases, and application and information entities, all with dependencies and inter-
relations. Documenting these in ordinary word processing and drawing tools will not be sufficient
to manage change effectively, improve time to market or achieve operational efficiency. EA
artefacts documented in this way will often end up on a shelf and will not be used for operations
or for driving change.
Driving change in order to increase speed and flexibility in an efficient and effective manner
requires the active use of an EA tool to:
 i) Reduce time to market and streamline documentation
By clearly documenting and continuously housekeeping EA artefacts and their relations to
other artefacts in a structured and consistent way, operators can reduce time to market
when realizing new business benefits through a quicker and more efficient impact analysis
of new business requirements.
 ii) Facilitate communication
By using consistent notation, layering and terminology of EA artefacts, operators can
improve communication with stakeholders and business partners.
 iii) Enable continuous improvement
Operators can enable continuous improvement by establishing a unique repository to
understand and manage impacts on COTS realizations during change, and avoid unwanted
effects and business-impacting mistakes when performing change.
By using an EA tool, new business requirements will be managed with shorter time to
market and the quality of changes will be improved, which contributes to operational
efficiency.
 
REALIZE END-TO-END SOLUTIONS
End-to-end solutions should be realized by building a transformation roadmap and following two
practical considerations:
Best-of-suite solution
The traditional best-of-breed solution approach – in which operators cherry-pick different vendor
software products and stitch them together with large integration efforts between multiple
systems, data sources, information models and customized architectures and solutions – is no
longer recommended. It takes too much time, effort and expense for an operator to develop,
manage and evolve custom-built solutions and OSS/BSS architectures.
Operators require OSS/BSS solutions that are industrialized, supported and shared with other
actors in the marketplace to the largest extent possible. Instead of a best-of-breed solution,
operators need a best-of-suite approach that meets evolved OSS/BSS demands, improves time
to market, reduces TCO and simplifies solution evolution.
By using horizontal software platforms and supported solutions, the operator can also reduce
overall transformation complexity. When going for a best-of-suite approach, a strategy should
be in place to avoid vendor lock-in and a one-size-fits-all approach.
An Application Building Block
(ABB) is a well-defined set of
application functions developed to
support business processes and
associated data. An ABB
represents a coarse-grained
functional component of an
application that should in most
instances be able to run on its
own, meaning that an ABB is a
self-contained piece of software
that may be purchased in the open
market individually or as part of a
much larger suite of applications.
In addition, a COTS product can
correspond to a single ABB or to a
set of ABBs.
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 9
Side-by-side versus step-by-step
In some cases, a step-by-step evolution can be the right approach to complement the existing
capabilities of an operator’s legacy OSS/BSS landscape with additional application capabilities
for a specific and clearly defined purpose.
However, transformation of the back-end and front-end architectures to fully support the
application capabilities required by a redefined operating model requires a more pervasive change,
preferably realized using a side-by-side migration strategy.
Using standard components and a modern EA that incorporates clear views about data
separation, it is now possible to start building a catalog-driven architecture based on common
master data repositories.This deals with key data entities such as users, products and resources.
When going for a side-by-side approach, a sound data migration strategy should be in place,
in which introducing and maintaining master data repositories plays an important role.  
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • CONCLUSION 10
Conclusion
A digital telco approach can provide operators with the agility required to thrive in the Networked
Society. However, the model requires an ICT transformation of both the front end and back end
of an operator’s business.
EA is concerned with planning the development of the whole enterprise, including its business
processes, information systems and technical infrastructure, and can therefore be a vehicle to
bridge the gap between business, IT and networks.
Operators should therefore apply EA principles to steer decision-making towards the evolution
of the future state architecture. They should establish an EA practice as a central planning
capability, and as an ongoing program with a solid foundation and tool to support it.
The following aspects serve as the foundation for ICT transformation and act as a
recommendation to all operators:
 Innovate business models, based on the enterprise business strategy, to respond to consumer
demands in digital services. This will set the right scope of priorities for the front-end and
back-end transformations needed.
 Redefine the operating model to handle digital services, manage consumer experiences, and
secure both operational excellence and the agility to manage the full digital ecosystem.
 Define an EA strategy and IT planning by applying a holistic assessment model based on
principles of scoping, discovery, diagnosis, targeting, roadmap and proposing.
 Realize business benefits as a continuous improvement process that builds on constant
interactions with business stakeholders.
 Use EA reference models and tools to manage new business requirements with shorter time
to market and to improve the quality of changes.
 Realize end-to-end solutions by building a transformation roadmap and applying a side-by-
side migration strategy using best-of-suite solutions.
HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • GLOSSARY • FURTHER READING 11
ABB		Application Building Block
COTS		commercial off-the-shelf
CRUD		create, read, use, delete
EA		Enterprise Architecture
NFV		Network Functions Virtualization
 Ericsson, White Paper:The real-time cloud – combining cloud, NFV and service provider SDN, February 2014, available
at: http://www.ericsson.com/news/140220-the-real-time-cloud_244099438_c?
 Ericsson, White Paper: Next-generation data center infrastructure – making hyperscale available, February 2015,
available at: http://www.ericsson.com/news/150227-next-generation-data-center-infrastructure_244069647_c?
GLOSSARY
Further reading
© 2015 Ericsson AB – All rights reserved

Contenu connexe

Tendances

What is Enterprise Architecture?
What is Enterprise Architecture?What is Enterprise Architecture?
What is Enterprise Architecture?BOC Group
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementKanishka Gopal
 
Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture GovernanceRakesh Sharan
 
Enterprise Architecture
Enterprise ArchitectureEnterprise Architecture
Enterprise ArchitectureVikas Grover
 
Ecommerce Success blueprint
Ecommerce Success blueprintEcommerce Success blueprint
Ecommerce Success blueprinteComNation
 
Digital Transformation - an introduction
Digital Transformation - an introductionDigital Transformation - an introduction
Digital Transformation - an introductionsimonbarna
 
An Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio RationalizationAn Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio RationalizationCognizant
 
Lect 1 Introduction to ERP
Lect 1 Introduction to ERPLect 1 Introduction to ERP
Lect 1 Introduction to ERPWaqas Rafique
 
Retail Industry Enterprise Architecture Review
Retail Industry Enterprise Architecture ReviewRetail Industry Enterprise Architecture Review
Retail Industry Enterprise Architecture ReviewLakshmana Kattula
 
Sample client presentation
Sample client presentationSample client presentation
Sample client presentationJakub Malobecki
 
Bridging business analysis and business architecture - The Open Group webinar
Bridging business analysis and business architecture - The Open Group webinarBridging business analysis and business architecture - The Open Group webinar
Bridging business analysis and business architecture - The Open Group webinarCraig Martin
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - FundamentalEryk Budi Pratama
 
IT Strategy
IT Strategy IT Strategy
IT Strategy Tu Pham
 
Augmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessmentAugmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessmentPrashanth Panduranga
 

Tendances (20)

What is Enterprise Architecture?
What is Enterprise Architecture?What is Enterprise Architecture?
What is Enterprise Architecture?
 
EA maturity models
EA maturity modelsEA maturity models
EA maturity models
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture Governance
 
EA Report.pdf
EA Report.pdfEA Report.pdf
EA Report.pdf
 
Enterprise Architecture
Enterprise ArchitectureEnterprise Architecture
Enterprise Architecture
 
Ecommerce Success blueprint
Ecommerce Success blueprintEcommerce Success blueprint
Ecommerce Success blueprint
 
Digital Transformation - an introduction
Digital Transformation - an introductionDigital Transformation - an introduction
Digital Transformation - an introduction
 
Digital Business - Accenture
Digital Business - AccentureDigital Business - Accenture
Digital Business - Accenture
 
An Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio RationalizationAn Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio Rationalization
 
Lect 1 Introduction to ERP
Lect 1 Introduction to ERPLect 1 Introduction to ERP
Lect 1 Introduction to ERP
 
Retail Industry Enterprise Architecture Review
Retail Industry Enterprise Architecture ReviewRetail Industry Enterprise Architecture Review
Retail Industry Enterprise Architecture Review
 
Sample client presentation
Sample client presentationSample client presentation
Sample client presentation
 
Bridging business analysis and business architecture - The Open Group webinar
Bridging business analysis and business architecture - The Open Group webinarBridging business analysis and business architecture - The Open Group webinar
Bridging business analysis and business architecture - The Open Group webinar
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
 
IT Strategy
IT Strategy IT Strategy
IT Strategy
 
Augmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessmentAugmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessment
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio Management
 
Solution Architecture
Solution ArchitectureSolution Architecture
Solution Architecture
 

En vedette

Gov ict conf.2014v10
Gov ict conf.2014v10Gov ict conf.2014v10
Gov ict conf.2014v10Ben Grinnell
 
Frank Ray - Bridging the gap between business and technology
Frank Ray - Bridging the gap between business and technologyFrank Ray - Bridging the gap between business and technology
Frank Ray - Bridging the gap between business and technologyFrank Ray
 
Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...
Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...
Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...Pink Elephant
 
Why New-age IT Operating Models are Necessary for Enhanced Operational Agility
Why New-age IT Operating Models are Necessary for Enhanced Operational AgilityWhy New-age IT Operating Models are Necessary for Enhanced Operational Agility
Why New-age IT Operating Models are Necessary for Enhanced Operational AgilityCognizant
 
Target operating model definition
Target operating model definitionTarget operating model definition
Target operating model definitionStuart Robb
 
Module 5 generic competitive strategies (1)
Module 5 generic competitive strategies (1)Module 5 generic competitive strategies (1)
Module 5 generic competitive strategies (1)citech
 
Accenture 2014 AWS re:Invent Enterprise Migration Breakout Session
Accenture 2014 AWS re:Invent Enterprise Migration Breakout SessionAccenture 2014 AWS re:Invent Enterprise Migration Breakout Session
Accenture 2014 AWS re:Invent Enterprise Migration Breakout SessionTom Laszewski
 
Dlr investor-day-presentation-10-06-15-final
Dlr investor-day-presentation-10-06-15-finalDlr investor-day-presentation-10-06-15-final
Dlr investor-day-presentation-10-06-15-finalir_digitalrealty
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 

En vedette (10)

Gov ict conf.2014v10
Gov ict conf.2014v10Gov ict conf.2014v10
Gov ict conf.2014v10
 
Frank Ray - Bridging the gap between business and technology
Frank Ray - Bridging the gap between business and technologyFrank Ray - Bridging the gap between business and technology
Frank Ray - Bridging the gap between business and technology
 
Rss & atom
Rss & atomRss & atom
Rss & atom
 
Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...
Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...
Effective BRM: How To Build An Effective Bridge Between Business and IT - Sur...
 
Why New-age IT Operating Models are Necessary for Enhanced Operational Agility
Why New-age IT Operating Models are Necessary for Enhanced Operational AgilityWhy New-age IT Operating Models are Necessary for Enhanced Operational Agility
Why New-age IT Operating Models are Necessary for Enhanced Operational Agility
 
Target operating model definition
Target operating model definitionTarget operating model definition
Target operating model definition
 
Module 5 generic competitive strategies (1)
Module 5 generic competitive strategies (1)Module 5 generic competitive strategies (1)
Module 5 generic competitive strategies (1)
 
Accenture 2014 AWS re:Invent Enterprise Migration Breakout Session
Accenture 2014 AWS re:Invent Enterprise Migration Breakout SessionAccenture 2014 AWS re:Invent Enterprise Migration Breakout Session
Accenture 2014 AWS re:Invent Enterprise Migration Breakout Session
 
Dlr investor-day-presentation-10-06-15-final
Dlr investor-day-presentation-10-06-15-finalDlr investor-day-presentation-10-06-15-final
Dlr investor-day-presentation-10-06-15-final
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 

Similaire à White Paper: How to bridge the gap between business, IT and networks – applying Enterprise Architecture principles to ICT transformation

Enterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service ProvidersEnterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service ProvidersPritam Dey
 
Business Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the EnterpriseBusiness Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the EnterpriseMassimo Talia
 
Creating an Agile Enterprise Architecture
Creating an Agile Enterprise ArchitectureCreating an Agile Enterprise Architecture
Creating an Agile Enterprise ArchitectureCognizant
 
Bending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT SimplificationBending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT SimplificationCognizant
 
Landing Page and Case Management
Landing Page and Case ManagementLanding Page and Case Management
Landing Page and Case ManagementIRJET Journal
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation William Francis
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementNIIT Technologies
 
Removing the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateRemoving the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateCorso
 
Architecture and Optimisationapr
Architecture and OptimisationaprArchitecture and Optimisationapr
Architecture and OptimisationaprFrank Curry
 
Lesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptxLesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptxcalf_ville86
 
IRJET- Implementation of Business Ease Android Application for Akhil Bhar...
IRJET-  	  Implementation of Business Ease Android Application for Akhil Bhar...IRJET-  	  Implementation of Business Ease Android Application for Akhil Bhar...
IRJET- Implementation of Business Ease Android Application for Akhil Bhar...IRJET Journal
 
A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...
A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...
A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...ijaia
 
Process architecture vs modeling
Process architecture vs modelingProcess architecture vs modeling
Process architecture vs modelingGraham McLeod
 
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...SuhaimiHasim1
 
Digital transformation through integration
Digital transformation through integrationDigital transformation through integration
Digital transformation through integrationCetrixSaudi
 
Module_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptxModule_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptxreiscristelle
 
ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2Sukumar Daniel
 

Similaire à White Paper: How to bridge the gap between business, IT and networks – applying Enterprise Architecture principles to ICT transformation (20)

Managing study.pptx
Managing study.pptxManaging study.pptx
Managing study.pptx
 
Enterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service ProvidersEnterprise Architecture for Communication Service Providers
Enterprise Architecture for Communication Service Providers
 
Business Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the EnterpriseBusiness Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the Enterprise
 
Creating an Agile Enterprise Architecture
Creating an Agile Enterprise ArchitectureCreating an Agile Enterprise Architecture
Creating an Agile Enterprise Architecture
 
Bending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT SimplificationBending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT Simplification
 
Landing Page and Case Management
Landing Page and Case ManagementLanding Page and Case Management
Landing Page and Case Management
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
H04124548
H04124548H04124548
H04124548
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure management
 
Removing the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateRemoving the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMate
 
Architecture and Optimisationapr
Architecture and OptimisationaprArchitecture and Optimisationapr
Architecture and Optimisationapr
 
Lesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptxLesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptx
 
IRJET- Implementation of Business Ease Android Application for Akhil Bhar...
IRJET-  	  Implementation of Business Ease Android Application for Akhil Bhar...IRJET-  	  Implementation of Business Ease Android Application for Akhil Bhar...
IRJET- Implementation of Business Ease Android Application for Akhil Bhar...
 
A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...
A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...
A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...
 
Process architecture vs modeling
Process architecture vs modelingProcess architecture vs modeling
Process architecture vs modeling
 
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
 
Soa 2013
Soa 2013Soa 2013
Soa 2013
 
Digital transformation through integration
Digital transformation through integrationDigital transformation through integration
Digital transformation through integration
 
Module_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptxModule_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptx
 
ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2
 

Plus de Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

Plus de Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

White Paper: How to bridge the gap between business, IT and networks – applying Enterprise Architecture principles to ICT transformation

  • 1. APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can provide operators with the agility required to thrive in the Networked Society. This approach requires a transformation of both the front end and back end of an operator’s business. Applying Enterprise Architecture principles results in six key steps operators should take to bridge the gap between business, IT and networks and thereby secure an effective transformation. ericsson White paper Uen 284 23-3272 | October 2015 How to bridge the gap between business, IT and networks
  • 2. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • INTRODUCTION 2 Introduction Telecom markets are increasingly driven by consumer demands for a better user experience, value-added digital services and competitive pricing. In this fast-changing landscape, business agility and flexibility are essential. For operators, a digital telco approach represents a new business and operating model for creating digital services and responding to consumer demands.This model provides the agility required to manage the entire digital ecosystem. However, the model also calls for an ICT transformation of both the front end and back end of an operator’s business. Successful transformation requires an agile and structured methodology. Here, operators can benefit from implementing industry-standard Enterprise Architecture (EA) principles. EA is a practice that bridges the gap between business, IT and networks. It allows an organization to take a holistic view of its components, and can be used to identify and analyze the key dimensions of a solution that are needed to deliver a desired business outcome. As a result, EA is relevant to the development of the whole enterprise – from business strategy, models and processes, to information systems and technical infrastructure. This paper describes best practices for operators in leveraging EA principles to bridge the gap between business, IT and networks and to drive the realization of business benefits. Business What? Innovative business models (customer - products - partners) How? Effective and efficient operating models (process - people - technology) IT Networks Figure 1: EA is relevant to the development of the whole enterprise – from business strategy, models and processes, to information systems and technical infrastructure.
  • 3. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • WHY BRIDGE THE GAP? 3 Why bridge the gap? Driven by increased demand in relation to digital services, user experience and operational excellence, operators are facing new business challenges where success will heavily be dependent on their capability to bridge the gap between business, IT and networks. Securing this bridging capability is essential to succeed in the necessary ICT transformation – of both the front end of the operator’s business, which faces both customers and partners, and the back end, which enables business capabilities. Transforming the front end of the business results in: ›› enablement of innovative digital services with shorter time-to-market and with higher quality, flexibility, automation, simplicity and experience for users and partners ›› digitalization of user and partner channels. Transforming the back end of the business results in: ›› Operational efficiencies through process automation and simplification ›› reduced complexity through a catalog-centric and component-based service-oriented architecture that uses real-time interactions between IT and networks ›› reduced capex and improved business agility and flexibility through Network Functions Virtualization (NFV), network programmability and cloud infrastructure.
  • 4. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • THE BENEFITS OF ESTABLISHING AN EA PRACTICE 4 The benefits of establishing an EA practice By establishing an EA practice as a central planning capability, and as an ongoing program with a solid foundation and tool to support it, an operator will be able to: enhance decision-making by gaining a holistic view of its business and a detailed understanding of its EA artefacts and their relationships effectively manage change by enabling impact analysis of affected artefacts and eliminating discovery time and effort plan evolution from as-is to desired architectures by providing guiding principles for planning and selection of transition states better align IT to business by demonstrating alignment between IT initiatives and business objectives, and expressing architecture work in terms of business outcomes and capabilities shorten time to market by promoting re-use of patterns and packaged building blocks. As shown in Figure 2, EA is composed of a governance framework, a work method, a meta-model and a tool: The EA governance framework is the practice by which EA is managed and controlled at an enterprise-wide level, ensuring that processes are in place to ensure the best possible compliance with the target architecture. Governance is achieved by setting up the right EA team structure to operate its EA work method, and by formalizing the team’s interactions with the EA stakeholders. The EA work method is the process followed to plan and develop architecture, identify solutions and govern their implementation. It is also the process whereby all the relevant architecture artefacts are gathered and linked to describe the state of an organization from both a business and a technology perspective. The EA meta-model defines how and with what the architecture artefacts are described in a structured way. It formalizes the relationships between the artefacts to ensure impact analysis and to provide traceability between the different parts of the architecture. The EA tool provides a wide range of modeling capabilities, reporting and publishing functionalities, and effective, easy-to-use interfaces to define, store and link architectural artefacts. The output of the EA work method is normally stored in the EA tool, the database structure of which is customized according to the EA meta-model. The EA reference models are frameworks, best practices and reference architectures developed by external parties that can be applied to develop target architectures. Examples include TMForum Frameworx, ITIL and TOGAF Foundation Architecture. Reference models Methodology EA governance framework directs and controls operates defines customize structures influencesinfluences EA work method EA tool EA meta-model Figure 2: EA – foundation components.
  • 5. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 5 bridging the gap Translating business requirements to achievable operational and technical capabilities will require an end-to-end approach and agile ways of working in cross-functional teams. This will ensure that business benefits are realized with the speed needed to keep up with market dynamics and consumer expectations. In practice, an operator should follow six steps in order to bridge the gap between business, IT and networks. Each step is a practical result of applying EA principles to the development of the whole enterprise. The steps are: innovate business models redefine operating models define an EA strategy and IT planning realize business benefits use EA reference models and tools realize end-to-end solutions. INNOVATE BUSINESS MODELS Business model innovation will be increasingly critical for an operator when realizing its value proposition. Defining strategic goals and the required business models will set the priorities for the scope of both the front-end and back-end transformations needed. Alexander Osterwalder’s Business Model Canvas, as shown in Figure 3, can help illustrate this process. For example, consider the value proposition: “As a market-leading digital telco, we will offer the market’s most attractive portfolio of digital services to retail and enterprise users, with a competitive price and the market’s best-perceived user experience.” Realizing this proposition will require the operator to implement the following business capabilities: front-end transformation (addresses revenue and value streams, as shown in Figure 3): ›› digitalization and omni-channel access (distribution channels) ›› big data analytics and business intelligence to gain user insights from consumers as well as retail and enterprise users (customer segments) ›› self-service and social media networking (customer relationship). back-end transformation (addresses cost structure, as shown in Figure 3): ›› network programmability, NFV and cloud infrastructure (core capabilities) ›› real-time automation and simplification (activities) ›› shared networks (partner networks). REDEFINE OPERATING MODELS Front-end and back-end transformation can lead an operator to rethink its entire operating model. All dimensions of the operating model – KPIs, technology, processes, people, organization, partners and alliances – will be impacted. Each dimension will need to be redefined to handle digital services, manage consumer experiences and secure the agility to manage the entire digital ecosystem. Back-end transformation Front-end transformation Core capabilities Customer segments Partner network Business enterprise Offer Finance Customer Activities (processes) Cost structure Customer relationship Distribution channel Revenue and value streams Value proposition Figure 3: Osterwalder Business Model Canvas.
  • 6. Target operating model Technology Assets, resources and locations IT and network OSS and BSS Partners and alliances Performance and reporting Management tenants Measures and scorecards Process Assurance, management Service quality Product lifecycle, development People management Leadership Ways of working Skills and capabilities KPI Goals and metrics Performance and reporting Benefit and realization Organization Management controls Structure and governance Roles and responsibilities HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 6 For example: KPIs: introduce goals and metrics that combine top-line growth, Net Promoter Score and margin. Technology: create an information (catalog)-centric and service-oriented architecture of applications to increase agility and decrease cost of integrations. Enable flexible infrastructure ready for the digital services landscape, using cloud, NFV and software-defined networking technologies. Process: automate and simplify end-to-end process flows and increase the level of self-service in the front end, and the level of automation and self-organized networking in the back end. People management: establish a user-experience- centric culture. Organization: establish organizational structures to support agile ways of working in cross- functional teams. Partners and alliances: enable a more collaborative approach with a new ecosystem of partners/enterprises and over-the-top players. DEFINE AN EA STRATEGY AND IT PLANNING To define an EA strategy and IT planning – including the target architecture needed – and to realize the redefined operating model of an operator, a holistic assessment approach needs to be applied. This is shown in Figure 5. The approach aligns an organization’s strategy, business, information systems and technology, and aims to define the future vision, target state and planning steps by performing the following activities: 1. Scope: Define the focus and scope of the EA assessment. 2. Discover: Assess and evaluate the current state of the organization and its EA, including strategy capabilities, business processes and information systems, as well as current and planned projects. 3. Diagnose: Identify pain points and gaps, define process heat maps, complete an information systems health assessment, present first findings and recommend quick wins. 4. Target: Create a target state EA to support the required business capabilities in the form of business process recommendations and an information systems architecture end game. 5. Roadmap: Develop a strategic transition plan and roadmap to achieve the future state through a set of transformation activities and defined transition architectures. 6. Propose: Create a holistic transformation proposal(s).   REALIZE BUSINESS BENEFITS Realizing business benefits is a fundamental objective when practicing EA principles.This process is driven by the business capabilities that have been identified as requirements – for example, by an operator that has decided to apply a digital telco approach. A business capability is composed of the skills, processes, routines, organizational structures and disciplines that enable firms to build, employ, and orchestrate assets relevant to satisfying user needs. Figure 4: Dimensions of a target operating model. Align with enterprise strategy Plan and architect the business Plan and architect the information systems Scope ProposeDiscover Diagnose Target Roadmap Figure 5: EA assessment methodology.
  • 7. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 7 A business benefit is defined as the result of an action or decision that contributes to meeting one or more business objectives. It is a measurable outcome from an action, investment, project, resource or technology, and represents a central element in strategic planning and building business cases. Business benefits can be categorized into four types: revenue, operational, customer experience management and business efficiency benefits. Realizing business benefits is a continuous improvement process that requires constant interactions with business stakeholders. This is ensured by applying EA principles and should follow these phases: i) Capture business capability requirements Based on its strategic ambitions, the operator should capture and prioritize critical business capability requirements. These could be the business capability requirements of efficiently and effectively provisioning virtual network functions and services, to give just one example. ii) Analyze end-to-end business process impacts The operator should analyze the business processes that will be impacted by the new business capability from an end-to-end perspective, by identifying pain points and defining KPIs to measure business process performance.The aim is to simplify and automate processes, and to reduce the number of organizational handovers. For example, in a plan-to-provision scenario, there is a need to analyze the impact on the end-to-end process created by managing virtual network functions.There is also a requirement to define KPIs, identify pain points and perform heat mapping to identify potential candidates for simplification and automation. iii) Drill down business processes and design use cases The operator needs to drill down end-to-end processes to further isolate critical steps. It should illustrate and analyze use cases in activity and sequence diagrams to identify the expectations on each logical Application Building Block’s (ABB) capabilities and integrations. In the plan to provision example, the process should be drilled down to individual configurations and deployment use cases to analyze the detailed requirements for configurations of, and integrations between, logical application building blocks to support the use cases. iv) Define ICT and network capabilities required and map to commercial off- the-shelf (COTS) products The operator should analyze and define the ICT and network ABB capabilities required to realize the prioritized business capabilities through the use cases. It should audit the available capabilities of the legacy applications used and clearly define the application capability gap per ABB. There is also a need to identify the key information entities and information sources for the target architecture design, and to define a high-level logical information model including a CRUD (create, read, use, delete) matrix that shows ownership and depen­ dencies. The most cost-efficient target architecture design of the ABB landscape should be created following architectural principles such as a catalog-centric approach and service- orientated architecture. In the plan to provision example, the functional capabilities of the legacy applications Business transformation program Program governance and methodology What? How? ABB mapping Solution realization project Process drill-down and use case design End-to-end business process analysis Business capability requirement capture Figure 6: Realization of business benefits.
  • 8. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 8 in the network planning, optimization and configuration domains should be benchmarked against the requirements of the new ABB capabilities for managing virtual network functions. The key information entities and information sources should be identified and analyzed for the target architecture design. Based on the gap identified, a target architecture that includes all required capabilities can be defined. v) Realize solution projects Operators need to define a roadmap for solution realization, including recommended COTS software and migration strategies. In the example, the new ABB requirements should be mapped to a capability evolution of the legacy applications deployed. Alternatively, a roadmap for a side-by-side replacement with a fit-for-purpose COTS solution suite should be proposed that fulfills the requirements of managing the resource lifecycle of virtual and non-virtual network functions.   USE EA REFERENCE MODELS AND TOOLS An operator’s operating model is described in hundreds of different EA artefacts – as end-to-end processes, use cases, and application and information entities, all with dependencies and inter- relations. Documenting these in ordinary word processing and drawing tools will not be sufficient to manage change effectively, improve time to market or achieve operational efficiency. EA artefacts documented in this way will often end up on a shelf and will not be used for operations or for driving change. Driving change in order to increase speed and flexibility in an efficient and effective manner requires the active use of an EA tool to: i) Reduce time to market and streamline documentation By clearly documenting and continuously housekeeping EA artefacts and their relations to other artefacts in a structured and consistent way, operators can reduce time to market when realizing new business benefits through a quicker and more efficient impact analysis of new business requirements. ii) Facilitate communication By using consistent notation, layering and terminology of EA artefacts, operators can improve communication with stakeholders and business partners. iii) Enable continuous improvement Operators can enable continuous improvement by establishing a unique repository to understand and manage impacts on COTS realizations during change, and avoid unwanted effects and business-impacting mistakes when performing change. By using an EA tool, new business requirements will be managed with shorter time to market and the quality of changes will be improved, which contributes to operational efficiency.   REALIZE END-TO-END SOLUTIONS End-to-end solutions should be realized by building a transformation roadmap and following two practical considerations: Best-of-suite solution The traditional best-of-breed solution approach – in which operators cherry-pick different vendor software products and stitch them together with large integration efforts between multiple systems, data sources, information models and customized architectures and solutions – is no longer recommended. It takes too much time, effort and expense for an operator to develop, manage and evolve custom-built solutions and OSS/BSS architectures. Operators require OSS/BSS solutions that are industrialized, supported and shared with other actors in the marketplace to the largest extent possible. Instead of a best-of-breed solution, operators need a best-of-suite approach that meets evolved OSS/BSS demands, improves time to market, reduces TCO and simplifies solution evolution. By using horizontal software platforms and supported solutions, the operator can also reduce overall transformation complexity. When going for a best-of-suite approach, a strategy should be in place to avoid vendor lock-in and a one-size-fits-all approach. An Application Building Block (ABB) is a well-defined set of application functions developed to support business processes and associated data. An ABB represents a coarse-grained functional component of an application that should in most instances be able to run on its own, meaning that an ABB is a self-contained piece of software that may be purchased in the open market individually or as part of a much larger suite of applications. In addition, a COTS product can correspond to a single ABB or to a set of ABBs.
  • 9. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • BRIDGING THE GAP 9 Side-by-side versus step-by-step In some cases, a step-by-step evolution can be the right approach to complement the existing capabilities of an operator’s legacy OSS/BSS landscape with additional application capabilities for a specific and clearly defined purpose. However, transformation of the back-end and front-end architectures to fully support the application capabilities required by a redefined operating model requires a more pervasive change, preferably realized using a side-by-side migration strategy. Using standard components and a modern EA that incorporates clear views about data separation, it is now possible to start building a catalog-driven architecture based on common master data repositories.This deals with key data entities such as users, products and resources. When going for a side-by-side approach, a sound data migration strategy should be in place, in which introducing and maintaining master data repositories plays an important role.  
  • 10. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • CONCLUSION 10 Conclusion A digital telco approach can provide operators with the agility required to thrive in the Networked Society. However, the model requires an ICT transformation of both the front end and back end of an operator’s business. EA is concerned with planning the development of the whole enterprise, including its business processes, information systems and technical infrastructure, and can therefore be a vehicle to bridge the gap between business, IT and networks. Operators should therefore apply EA principles to steer decision-making towards the evolution of the future state architecture. They should establish an EA practice as a central planning capability, and as an ongoing program with a solid foundation and tool to support it. The following aspects serve as the foundation for ICT transformation and act as a recommendation to all operators: Innovate business models, based on the enterprise business strategy, to respond to consumer demands in digital services. This will set the right scope of priorities for the front-end and back-end transformations needed. Redefine the operating model to handle digital services, manage consumer experiences, and secure both operational excellence and the agility to manage the full digital ecosystem. Define an EA strategy and IT planning by applying a holistic assessment model based on principles of scoping, discovery, diagnosis, targeting, roadmap and proposing. Realize business benefits as a continuous improvement process that builds on constant interactions with business stakeholders. Use EA reference models and tools to manage new business requirements with shorter time to market and to improve the quality of changes. Realize end-to-end solutions by building a transformation roadmap and applying a side-by- side migration strategy using best-of-suite solutions.
  • 11. HOW TO BRIDGE THE GAP BETWEEN BUSINESS, IT AND NETWORKS • GLOSSARY • FURTHER READING 11 ABB Application Building Block COTS commercial off-the-shelf CRUD create, read, use, delete EA Enterprise Architecture NFV Network Functions Virtualization Ericsson, White Paper:The real-time cloud – combining cloud, NFV and service provider SDN, February 2014, available at: http://www.ericsson.com/news/140220-the-real-time-cloud_244099438_c? Ericsson, White Paper: Next-generation data center infrastructure – making hyperscale available, February 2015, available at: http://www.ericsson.com/news/150227-next-generation-data-center-infrastructure_244069647_c? GLOSSARY Further reading © 2015 Ericsson AB – All rights reserved