Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.

Enterprise Architecture

Enterprise Architecture

Discussion and news from the Enterprise Architecture (EA) service

Core Systems Strategies

What with responding to the pandemic, moving to working from home, and in my case covering for a colleague, we’ve been even more lax than usual in blogging here.  So here’s a post with an update on the strategy documents that I posted about in the autumn.

https://blogs.ed.ac.uk/enterprisearchitecture/2019/09/09/why-strategy/

These strategies cover our central business systems, which fall under our “core systems” programme.  For the most part, they have a technical focus that applies across and beyond individual systems. For example, the application rationalisation strategy sets a goal for reducing the number of different systems that we have to maintain, and suggests an approach for preventing further proliferation of systems in the future.   Similarly, the data retention and archiving strategy applies to data held in any system.

As I mentioned in my previous post, a key part of creating strategies is the discussion and consultation that goes into them.  In a couple of weeks, we will be presenting several strategies to a special combined meeting of the college computing professionals’ advisory groups, which should give us some valuable feedback on how the strategies will impact the academic areas of the University.  We’ve already done this for a couple of them and the experience suggests that the consultation was both appreciated and valuable.  The main difficulty is finding enough time for everyone involved to be able to contribute!

There is far more to write about than I can fit in a single article.  Each strategy is worth a blog post (or even several) on its own.  So, for now, I’ll just list the topics of all the strategies that we’re currently working on.  If you have any queries about individual strategies, please let me know.

  • Infrastructure strategies
    • Cloud Computing
    • Identity, Authentication, Authorisation
  • Data strategies
    • Data Architecture
    • Data Retention and Archiving
    • Reporting & Analytics
  • Application strategies
    • Application Integration
    • Application Rationalisation
    • Document Management
    • Relationship Management
  • Vendor management strategies
    • IT Vendor Management
    • Software Testing & Acceptance

 

Leave a reply

css.php

Report this page

To report inappropriate content on this page, please use the form below. Upon receiving your report, we will be in touch as per the Take Down Policy of the service.

Please note that personal data collected through this form is used and stored for the purposes of processing this report and communication with you.

If you are unable to report a concern about content via this form please contact the Service Owner.

Please enter an email address you wish to be contacted on. Please describe the unacceptable content in sufficient detail to allow us to locate it, and why you consider it to be unacceptable.
By submitting this report, you accept that it is accurate and that fraudulent or nuisance complaints may result in action by the University.

  Cancel