Marc Lankhorst & Danny Weinberger

Enterprise Architecture and Agile Development: Opposites Attract?

Posted by Marc Lankhorst & Danny Weinberger on 28 May 2015

Tags: Enterprise Architecture Management

Agility has become a key ability of enterprises. The pace at which customers require changes, at which new laws and regulations affect services and introduce processes, and the ease with which competitors can disrupt your business, as Google and Apple do nowadays, leads to tremendous pressure. Pressure to change rapidly, to adopt new technologies, to generate growth, to scale up or to reduce cost. So in many organizations, being agile is as crucial as being able to innovate. Innovation and agility are necessary competences for a sustainable business.

0 Comments | Read the full post
Marc Lankhorst & Danny Weinberger

Enterprise Architecture und Agile Development: Gegensätze ziehen sich an?

Posted by Marc Lankhorst & Danny Weinberger on 28 May 2015

Tags: Enterprise Architecture Management

Agilität ist zu einer wichtigen Fähigkeit der Unternehmen geworden. Das Tempo, bei dem die Kunden sich verändern, bei dem neue Gesetze und Verordnungen ihre Dienstleistungen und Prozesse beeinflussen und die Schnelligkeit, mit der Wettbewerber, wie Google und Apple, sie herausfordern, führt allzu oft zu einem enormen Druck auf das Unternehmen. Dabei kann sich der Druck in unterschiedlicher Art und Weise bemerkbar machen, wie zum Beispiel Druck sich schnell zu verändert, oder neue Technologien einzuführen, Wachstum zu generieren oder Kosten zu reduzieren. In Folge dessen ist die Agilität schlichtweg notwendig, um überhaupt mit ständigen Innovationen schnell auf dem Markt agieren zu können. Beides, Innovation und Flexibilität, sind für eine nachhaltige Positionierung am Markt notwendig.

0 Comments | Read the full post
Ton Baas

BYOD – The Good, The Bad & The Ugly

Posted by Ton Baas on 26 May 2015

Tags: Enterprise Architecture Management

Bring your own device, bring your own technology, bring your own phone or IT consumerisation (respectively BYOD, BYOT, BYOP). Whatever you want to call it, anno 2015 everybody knows the concept of bringing your privately owned device to access company information and applications. This was thrown in high gear with the proliferation of smartphones and tablets, making it impossible to imagine a working world without the concept. However people stand divided regarding the effects of BYOD. In this blog we discuss the good, the bad & the ugly regarding BYOD – leading to the conclusion that it is all about a good BYOD strategy, policy and plan how things work out for your organization.  As we always like to finish on a positive note we’ll start with the bad and the ugly and finish with the good.

0 Comments | Read the full post
Remco Blom

Information Security: 7 communication tips to involve your business

Posted by Remco Blom on 22 May 2015

Tags: Enterprise Architecture Management

Sharing knowledge and good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round tables. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions. After presentations on “Security is not an IT problem” and the lacking relations between policies and measures in many organizations, we had a World Café on various topics. After reading this blog we would like you to share your best and worst practices by posting a comment to this blog.  

0 Comments | Read the full post
Maher Dara

Application portfolio management for beginners with SMART

Posted by Maher Dara on 19 May 2015

Tags: Enterprise Architecture Management

Everybody is familiar with the SMART abbreviation. It stand for Specific, Measurable, Acceptable, Realistic and Time bounded. But this blog is not about that kind of SMART. In this blog I will discuss how to apply another type of SMART within the context of Enterprise portfolio management. 

0 Comments | Read the full post
Bas van Gils and Martin van Battum

“Force Generation” Architecture: Sustain and support

Posted by Bas van Gils and Martin van Battum on 15 May 2015

Tags: Enterprise Architecture Management

Ready for the end of the mission? In our articles so far we covered and discussed the different stadia of development in ‘Force Generation’ Architecture: cold phase, transition phase and warm phase

0 Comments | Read the full post
Remco Blom

Information Security: a necessity of life

Posted by Remco Blom on 12 May 2015

Tags: Enterprise Architecture Management

Sharing knowledge an good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round tables. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions. After presentations on “Security is not an IT problem”, the lacking relations between policies and measures in many organizations, we had a World Café on various topics. Please share your good and worst practices by reacting to this blog. 

0 Comments | Read the full post
Bas van Gils and Martin van Battum

“Force Generation” Architecture: Warm phase

Posted by Bas van Gils and Martin van Battum on 08 May 2015

Tags: Enterprise Architecture Management

In this fifth posting we will address the warm phase of ‘Force Generation’ Architecture: deployment and sustainment of the deployment. As in previous articles we will walk the military path first, next we will share the developments in the architecture case. Let us first address one of many questions regarding this series about Force Generation Architecture (the military way).

0 Comments | Read the full post
Remco Blom

From Security Architecture to a Secure Architecture

Posted by Remco Blom on 01 May 2015

Tags: Enterprise Architecture Management

Sharing knowledge and good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round table sessions. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions. After presentations on “Security is not an IT problem”, the lacking relations between policies and measures in many organizations, we organized a World Café on various topics. Please share your good and worst practices by reacting to this blog.

0 Comments | Read the full post
Bas van Gils & Sven van Dijk

ArchiMate Modeling in Practice: Using a model repository

Posted by Bas van Gils & Sven van Dijk on 28 April 2015

Tags: Enterprise Architecture Management

Throughout this blog series we talked about using ArchiMate, and approaches for setting up ArchiMate models. We first discussed a top-down, and then a bottom-up approach, and presented examples from our consulting practice for both. Now here is an important fact, that for some may just too obvious, but something we still encounter in every ArchiMate training, or consulting project: ArchiMate is not a tool. 

0 Comments | Read the full post

BiZZdesign Tweets