Architecting in a Complex System Environment John Hodgson & Phil Piper ICT Architects.

Slides:



Advertisements
Similar presentations
European e-Competence Framework Company Network Seminar EMCC - Cedefop, 9th November 2006 Jutta Breyer, Germany, Kibnet / AITTS European e-Competence Framework.
Advertisements

AASHTO Internal Audit Conference 2012 – Phoenix Daniel Fodera, CMQ/OE Program Management Improvement Team Federal Highway Administration.
Architecting in a Complex System Environment John Hodgson & Phil Piper ICT Architects April 2013.
ARCHITECTURE FRAMEWORKS IN COMPLEX ENVIRONMENTS SIMPLIFYING THE MYSTERY OF I.T. SYSTEMS IN SMALL AND LARGE ENTERPRISES JOHN HODGSON, I.T. ARCHITECT.
Appendix H: Risk training slides (sample). What is Risk? “ Risk is the effect of uncertainty on objectives ” AS/NZS ISO31000:2009.
Applying the Human Views for MODAF to the conception of energy-saving work solutions Dr Anne Bruseberg Systems Engineering & Assessment Ltd, UK on behalf.
Human Views for MODAF Dr Anne Bruseberg Systems Engineering & Assessment Ltd, UK on behalf of the Human Factors Integration Defence Technology Centre.
PROJECT RISK MANAGEMENT
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Resources Management January 23, 2001.
Systems Engineering in a System of Systems Context
Aligning Business Processes to SOA B. Ramamurthy 6/16/2015Page 1.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 27 Slide 1 Quality Management 1.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Software Engineering Muhammad Fahad Khan
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
SEC835 Database and Web application security Information Security Architecture.
PRM 702 Project Risk Management Lecture #28
Software Project Management Lecture # 8. Outline Chapter 25 – Risk Management  What is Risk Management  Risk Management Strategies  Software Risks.
From Conformance to Performance: Using Integrated Risk Management to achieve Organisational Health Ms Stacie Hall Comcover National Manager.
Ihr Logo Data Explorer - A data profiling tool. Your Logo Agenda  Introduction  Existing System  Limitations of Existing System  Proposed Solution.
Margaret J. Cox King’s College London
Intelligence is being able to add value to information by subjecting it to the elements of the intelligence process. Intelligence has become the driving.
1 Systems Analysis and Design in a Changing World, Fourth Edition.
TDT4252/DT8802 Exam 2013 Guidelines to answers
Risk Analysis vs Security Controls. Security Controls Risk assessment is a flawed safeguard selection method. There is a tendency to confuse security.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
Software Project Management Lecture # 8. Outline Earned Value Analysis (Chapter 24) Topics from Chapter 25.
An Introduction to Software Architecture
Information Assurance The Coordinated Approach To Improving Enterprise Data Quality.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Systems Development Life Cycle Phases and Activities in the SDLC Variations of the SDLC models.
©Ian Sommerville 2000 Software Engineering, 6th edition. Slide 1 Component-based development l Building software from reusable components l Objectives.
Role-Based Guide to the RUP Architect. 2 Mission of an Architect A software architect leads and coordinates technical activities and artifacts throughout.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Chapter 12 Project Risk Management
Improving engineering productivity APEGGA. Improving Productivity Mega Projects  History  What is needed  How will it be done  Division of Labour.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 05. Review Software design methods Design Paradigms Typical Design Trade-offs.
UML Use Case Diagramming Guidelines. What is UML? The Unified Modeling Language (UML) is a standard language for specifying, visualizing, constructing,
Overview What do we mean by a Learning Organisation? Why did we develop a People Development Framework? What was the process involved in building the.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Project Risk Management Planning Stage
Stages of design  High level design  High level data structure  Architecture  Low level design-code design  Algorithms  Low level data structures.
Software Project Management Lecture # 9. Outline Chapter 25 – Risk Management  What is Risk Management  Risk Management Strategies  Software Risks.
SoftwareServant Pty Ltd 2009 SoftwareServant ® Using the Specification-Only Method.
OOD OO Design. OOD-2 OO Development Requirements Use case analysis OO Analysis –Models from the domain and application OO Design –Mapping of model.
IB Business & Management
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
Software Architecture Architecture represents different things from use cases –Use cases deal primarily with functional properties –Architecture deals.
Chapter 7 Lecture 1 Design and Implementation. Design and implementation Software design and implementation is the stage in the software engineering process.
6/13/2015 Visit the Sponsor tables to enter their end of day raffles. Turn in your completed Event Evaluation form at the end of the day in the Registration.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Stoimen Stoimenov QA Engineer SitefinityLeads,SitefinityTeam6 Telerik QA Academy Telerik QA Academy.
The heart of health and safety. Meaning business: The key elements for a compelling business case and annual report Liz Skelton Principal Consultant System.
Logical Architecture and UML Package Diagrams. The logical architecture is the large-scale organization of the software classes into packages, subsystems,
Configuration Management
What is Enterprise Architecture?
Zachman Framework Lecture 2.
An Overview on Risk Management
EI Architecture Overview/Current Assessment/Technical Architecture
Business Case Analysis
COMP3357 Managing Cyber Risk
Yr 10 Candle Holder.
CMGT 554 Education for Service-- tutorialrank.com
Team Skill 6 - Building The Right System Part 1: Applying Use Cases
Presentation transcript:

Architecting in a Complex System Environment John Hodgson & Phil Piper ICT Architects

The fundamentals of Complex IT System/s (Using Government systems examples)  Complex IT systems What is a complex IT system? Common Factors and Influences (within a Government environment).  A Systems of Systems view  Common Factors Value and issues in identifying, analysing, designing and specifying IT systems in a complex environment.  Architecture Frameworks Models and Zachman, DODAF, MODAF, AUSDAF and TOGAF Gordian knot. Business, Systems, Services and Technology  Complex System Architect’s basic tool sets Whiteboards, A3 sheets, Office, Visio, JPGs, System Architect, etc.  Useful approaches to understanding Complex Systems.  Useful approaches to Architecting Systems in a complex environment.

Complex I.T. systems  What is a complex IT system? More than three subsystems.. Multiple business process engagement Significant data exchanges Significant human interactions within the systems  How do you recognise this? Different governance regimes evident High frequency of change Multiple data exchange methods Complexity behaviours

An Alternate View of Complexity  What is a complex IT system? A complex system is one that exhibits emergent behaviour. Emergent Behaviour is behaviour that was not predicted from the sum of the functions of the parts. For example, the World Wide Web is a “small-world network”. Ie, the number of hops between two nodes increases in proportion to the log of the number of nodes. That was not “designed-in” or predicted by the designers. Emergent behaviour is often negative. We call this “bugs”. So, system collections are complex when they start exhibiting bugs that are the result of interactions between the systems. These can be very difficult to diagnose.

Dept of Defence

Dept of Defence (same information)

Defence – ERP Interfaces

Interfaces – How Many Are There? 2N > N(N-1) How can that be? For N systems, the worst case is N(N-1) What we would like is at most, 2N We can evolve a complex set of systems towards 2N by applying enterprise architecture patterns like SOA.

Systems of Systems  Complex systems are typically system of systems  Multiple layers of systems  Architects are often tasked with only a subset of this – Focus

Common Factors  Teaming is a necessity  No single source of truth  Fragmentation of design, projects and support  Documentation is always poor  Abstraction is essential  Architects become valued as complexity increases

Complex Systems are influenced by many factors e.g. Defence Warehouse Mobile Environment

Architecture Frameworks  Framework v’s Architectural process TOGAF ZACHMAN DODAF, MODAF and AUSTDAF  “Common language” for architects  Rarely exactly accurate  Most can be correlate to each other

Zachman (Circa 1990)

TOGAF (Open Systems Group)

DODAF V2

MODAF

AUSDAF

Basic tool sets for complex system architect’s  Whiteboarding Print copies, photos, coloured pens  Integrated project teams, working groups, team reviews  A3 sketch pads  MS Office, Adobe Acrobat  Visio and JPGs  System Architect & Enterprise Architect  Above all, an inquisitive mind and some affront to ask questions

External Imposed Policies & controls

Technical and Threat Risk Assessment Assessment ProcessesRisk Sources

Detailed Identified Risk Calculations (Add/Remove Information where required along with Risk Forms. Comments can be made in any field to enhance or better explain the rating.) Risk Calculation FormRisk ID: R01 Threat Loss of services due to loss of communications (Example Only) Threat sourcesTS16, TS17, TS19, TS20, TS21 Asset(s) AffectedA1, A2, A6 A9, A30 Overview(insert comments here) The loss of the (System/Project Name) services due the infrastructure and networking outside the control of Defence being damaged or wrongly configured. Likelihood of Occurrence(insert historical supporting information here) Possible Consequence of Realisation(insert any supporting consequential comments here) Severe Current Resultant Risk Exposure(insert further specific comments here) High Treatment Option (Accept, Reduce, Avoid, Share) Reduce Treatment Recommendation(s) / Plan(s)TP01, TP02 New Likelihood of Occurrence(insert supporting future outlook comments here) Very Rare New Consequence of Realisation(insert comments that may support the lowering of consequence, if justified) Severe New Resultant Risk Exposure(insert any comments here such as countermeasure accompanied by treatment plan allowing the previous rating to be lowered) Medium Table R01 – Loss of services due to loss of communications Threat / Technical Risk Assessments (Aust / ISO Standards)

Useful approaches to understanding Complex Systems  Start at the top - the Enterprise’s Business Objectives Document visually and ask for comments Identify the Executive’s direction of change Document (or find) the objectives Identify the Enterprise “modus operandi”  Develop (or find) an outline Concept of Operations (or Concept of Business) How should the business be working?  How is it actually working? Strategic, Tactical and Immediate objectives  Lean from those who have gone before Look for historic and previous efforts Ask for the war stories, but don’t accept as gospel Where have the greatest changes occurred so far in the Enterprise? Why?  Look for “change levers” Small investments - large impacts  Be patient Enterprises take time to change  Both human and external factors rarely allow for “Engineering Discipline” But it doesn’t hurt to bring some skills to bear.  Draw and Write for your audience Who reads the Plumbing Specs for a new Building?  Prof Julius Somner-Miller (circa 1970s) Always ask - WHY is it so?”

Time for Questions And thanks for listening…