Business Guide
simplicable technology guide   »  enterprise architecture   »  enterprise architecture anti patterns

Enterprise Architecture Anti Patterns

3 Shares Google Twitter Facebook

The internet boom of the late 1990s drove the need to aggregate web content from multiple sources. Two solutions emerged: Mashups and Portals.

EA hijacking — when someone who doesn't know what enterprise architecture is (and doesn't care) uses the EA mandate to tackle a personal agenda.

When EA is way too high level.

When Enterprise Architects are glorified change managers.

Is your CIO comfortable with Enterprise Architecture success?

As a enterprise architect it's your job to contribute to the CIO's success (to keep the CIO happy). No matter how committed and professional you are — things can go wrong.

Architecture shaped by politics.

Projects that are great for your architect's resume but bad for business.

Perfectly elegant architectures that are perfectly out of touch.

EAs who get sucked down into solution architecture, infrastructure details or even development.

Enterprise Architecture is a truly dangerous profession.

Be trendy, impress your friends, build your resume and waste your organization's money.

How to make pancakes with a hairdryer.

Wouldn't it be nice to painlessly switch vendors?

The sales-oriented Enterprise Architect.

ITIL 2011 (v3) identifies 25 core processes. Here they are.

Learn about common root causes of security risks.

Enterprise Architecture (EA) is supposed to help manage IT risks — but is it possible that EA itself introduces new risks?

Our guide to the ITIL framework.

Recently on Simplicable

Business Capability Map

posted by Anna Mar
The most important diagram in all of business architecture — without it your EA efforts are in vain.

101 Principles of Enterprise Architecture

posted by Anna Mar
This is the way to prove to your stakeholders that your recommendations are not just whims.

20 Easy to Use ITIL Metrics

posted by John Spacey
The exciting world of ITIL metrics.

The Big List of Information Security Vulnerabilities

posted by John Spacey
Understanding your vulnerabilities is the first step to managing risk.


about     contact     sitemap     privacy     terms of service     copyright