Skip to main content

An overview of IT Architecture

Drivers for IT Architecture:
  • The cost of information technology, particularly in lean economic times.
  • The increasing complexity of information technology.
  • The rapid pace of change and hence rapid obsolescence of information technology.
  • The increasing expectations of end-users for information technology reliability, performance and functionality.
  • Increased societal dependence upon information technology.
  • The widespread ‘quality chasm’ between information technology best practices and actual day-to-day practice, particularly in the area of software development.
  • Security concerns and requirements.
Common features of IT Architectures:
  • High-level statement of IT Architecture goals and governing principles (Vision).
  • Conceptual model of the ‘architecture’ of the organization, including models of agency business functions and processes, agency information assets, and agency information technology (Architecture).
  • Standards that define how applications are developed, which technologies are supported, and what products are selected. (Standards).
  • Governance structure that includes business leaders and technologists to ensure ongoing alignment between the organization’s business priorities and information technology efforts (Governance).
  • Continual re-examination of the IT Architecture to identify opportunities for enhanced organizational cost-effectiveness and performance (Lifecycle).

The enterprise is becoming more complex with reduced time levels to level products and services to market. Customers and regulators also demand a better accountability. As a result there is a greater dependence on IT.

The IT environment thus needs to be better understood and aligned to business processes.

Architecture maturity
Gartner proposes the following architecture maturity model.
  1. Chaotic - Ad-hoc, Uncoordinated, Undocumented, Unrelated to business strategies.
  2. Reactive - Isolated, Opportunistic, Business involvement only in times of crisis.
  3. Proactive -Some coordination across business units, Spasmodic documentation, Occasional business involvement.
  4. Service - Consistent architecture processes applied inconsistently, Coordination across most business units, Responsive to business strategy.
  5. Value - Consistent, effective architecture management process, Coordination across the enterprise, Enable business strategies.
Reasons for IT Architecture are:
  • Alignment - ensuring the reality of the implemented enterprise is aligned with management’s intent
  • Integration - realizing that the business rules are consistent across the organization, that the data and its use are immutable, interfaces and information flow are standardized, and the connectivity and interoperability are managed across the enterprise
  • Change - facilitating and managing change to any aspect of the enterprise
  • Time-to-market - reducing systems development, applications generation, modernization timeframes, and resource requirements
  • Convergence - striving toward a standard IT product portfolio.
Benefits of IT Architecture:
  • Capture facts about the mission, functions, and business foundation in an understandable manner to promote better planning and decision-making
  • Improve communication among the business organizations and IT organizations within the enterprise through a standardized vocabulary
  • Provide architectural views that help communicate the complexity of large systems and facilitate management of extensive, complex environments
  • Focus on the strategic use of emerging technologies to better manage the enterprise«s information and consistently insert those technologies into the enterprise
  • Improve consistency, accuracy, timeliness, integrity, quality, availability, access, and sharing of IT-managed information across the enterprise
  • Support the CPIC processes by providing a tool for assessment of benefits, impacts, and capital investment measurements and supporting analyses of alternatives, risks, and tradeoffs
  • Highlight opportunities for building greater quality and flexibility into applications without increasing cost
  • Achieve economies of scale by providing mechanisms for sharing services across the enterprise
  • Expedite integration of legacy, migration, and new systems
  • Ensure legal and regulatory compliance.


Popular posts from this blog

LDWin: Link Discovery for Windows

LDWin supports the following methods of link discovery: CDP - Cisco Discovery Protocol LLDP - Link Layer Discovery Protocol Download LDWin from here.

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall


#!/bin/bash # # usage <configuration file> # eg: /etc/ipset-threatblock/ipset-threatblock.conf # function exists() { command -v "$1" >/dev/null 2>&1 ; } if [[ -z "$1" ]]; then   echo "Error: please specify a configuration file, e.g. $0 /etc/ipset-threatblock/ipset-threatblock.conf"   exit 1 fi # shellcheck source=ipset-threatblock.conf if ! source "$1"; then   echo "Error: can't load configuration file $1"   exit 1 fi if ! exists curl && exists egrep && exists grep && exists ipset && exists iptables && exists sed && exists sort && exists wc ; then   echo >&2 "Error: searching PATH fails to find executables among: curl egrep grep ipset iptables sed sort wc"   exit 1 fi DO_OPTIMIZE_CIDR=no if exists iprange && [[ ${OPTIMIZE_CIDR:-yes} != no ]]; then   DO_OPTIMIZE_CIDR=yes fi if [[ ! -d $(dirname &q