| |
simplicable technology guide
»
enterprise architecture
»
ea adjective list
Adjectives that Describe Enterprise Architecture
posted by John Spacey, December 14, 2012
Enterprise Architects must choose their words very carefully. I like to maintain lists of useful vocabularies to describe an architecture. Here are some adjectives I've used recently (in no particular order):
scalable | robust | agile | open | secure | usable | accessible | vulnerable | stable | interoperable | compliant | functional | pragmatic | simple | accurate | credible | relevant | ubiquitous | operational | deployed | resilient | graceful | maintainable | extensible | reusable | traceable | auditable | ad hoc | sustainable | tactical | strategic | ambiguous | legacy | broken | capable | dysfunctional | durable | expensive | general | generic | eloquent | lean | massive | big | mixed | modern | hardened | premium | typical | pricey | tricky | real | stale | successful | tenuous | important | minor | evolved | pointless | smart | rigid | rough | unique | volatile | necessary | wacky | over-engineered | well-made | succinct | workable | wasteful | ugly | political | normal | real time | economical | valuable | efficient | effective | monolithic | deprecated | exquisite | practical | popular |
|
Continuous Controls Monitoring for Transactions (CCM-T) is a governance, risk and compliance technology. There are 4 typical functions of a CCM system.
|
|
Take a few minutes to learn about the Zachman Framework — a framework for Enterprise Architecture.
|
|
Current state blueprints capture business, data and implementation architecture at the conceptual, logical and physical levels.
|
|
Scoring the EA team on influence.
|
Recently on Simplicable
| |
posted by John Spacey
Understanding your vulnerabilities is the first step to managing risk.
|
| |
posted by John Spacey
Understand the threats to your organization.
|
| |
posted by Anna Mar
Enterprise Architecture (EA) is supposed to help manage IT risks
— but is it possible that EA itself introduces new risks?
|
| |
posted by Anna Mar
Security through obscurity is generally considered a bad idea ...
|
|