Home
Business Guide
 
simplicable technology guide   »  enterprise architecture   »  enterprise architecture anti patterns   »  ea sell out

When Enterprise Architecture Sells Out

        posted by , July 13, 2011

Enterprise Architecture is a tough sell — EAs need to have sales and marketing skills.

There is a new breed of enterprise architect who has risen through the ranks by leveraging strong sales skills. These EAs walk-the-walk and talk-the-talk but have limited architectural experience.

The Sales-Oriented Enterprise Architect

Being good at marketing and sales does not necessarily mean you are bad at enterprise architecture. In fact, marketing prowess is a key skill for EAs. However, the sales-oriented EA has limited architectural experience.

In other words, they have the ability to sell architecture but don't fully understand it.

How to Spot a Sales-Oriented Enterprise Architect

There are 6 characteristics that define a sales-oriented EA:

1. Excellent communication and interpersonal skills.

2. A dogmatic approach to architecture — common solutions are good, silo solutions are bad etc...

3. Promoter of popular concepts — dashboards, metrics etc ...

4. A hands-off type.

5. Has not paid their architectural dues — a non-traditional or expedited career path to EA. Traditional paths to EA include solution architecture, IT architecture, data architecture, IT line manager, business operations etc...

6. Focused on office politics.




Related Articles



Enterprise Architecture
How to architect an organization.




A large collection of enterprise architecture tools.

Don't worry about people stealing your ideas. If your ideas are any good, you'll have to ram them down people's throats. ~ Howard Aiken

Imagine your hardcore IT geek talking to a company executive. What would they talk about?

Enterprise Architecture (EA) is supposed to help manage IT risks — but is it possible that EA itself introduces new risks?


Recently on Simplicable


Canary Trap Explained

posted by Anna Mar
A digital signature embedded in information that can be tied to a source such as an individual or an IP address.

Honeypot Explained (Security)

posted by Anna Mar
A honeypot is decoy designed to distract attackers from your information infrastructure.

Security Techniques

posted by Anna Mar
A list of information security strategies and techniques.

The Difference Between Public, Private and Hybrid Cloud

posted by Anna Mar
Popular ideas such as cloud computing get twisted, turned and flipped upside down before anyone can agree on common definitions.

about     contact     sitemap     privacy     terms of service     copyright