logo jabes

Design SDLC


🎭 Summary & Indices Elucidation Foreword 🎭

👐 C-Steer C-Serve C-Shape 👁 I-Data I-Jabes I-Know👐
👐 r-steer r-serve r-shape 👁 r-data r-jabes r-know👐

🔰 Contents Cascade VMAP OnPrem T-*AAS CMM3-4IT 🔰
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯


T-1 Basics & Infrastructure Life Cycle


T-1.1.1 Contents

T-1.1.1 Global content
$ kwadrants sdlc bpm devops sdlc design bpm design bianl devops bpm devops bianl The organisation powered by ICT in a ship like constellation. The engines (data centre) out of sight below visibility. Serving multiple customers (multi tenancy) for the best performance and the best profits on all layers.

There are six pillars in a functional and technical layer. Within the the three internal pillars linked access is possible by an imagemap over the given figure.

When wanting going logical backward:
🔰 Too fast .. previous


T-1.1.2 Guide reading this page
This page is about Technology. Technology is the enabler in a service providing role for missions of the organisation. When a holistic approach for organisational missions and organisational improvements is wanted, starting with this technology pillar is sensible. Not able to get any service for a missions will block the option for realisations.

The priorities however are set by the organisational missions not by technology.
Alignment:
Working into an approach for optimized business and technology situation, there is gap in knowledge and tools. The proposal to solve those gaps is "Jabes".

Understanding the: "T-3.6.1 Mindset prerequisites" is assumed.
T-1.1.3 Local content
Reference Squad Abbrevation
T-1 Basics & Infrastructure Life Cycle
T-1.1 Contents contents Contents
T-1.1.1 Global content
T-1.1.2 Guide reading this page
T-1.1.3 Local content
T-1.1.4 Progress
T-1.2 Question: Waterfall or Lean, Agile? sdlchos_02 Cascade
T-1.2.1 Layers in the technology stack
T-1.2.2 DTAP Layers Multiple dimensions
T-1.2.3 Agile PDCA and / or Waterfall
T-1.3 Lean Agile: Vmap dimensions & perspectives sdlchos_03 VMAP
T-1.3.1 Looking for root causes in the SDLC challenge
T-1.3.2 Running, Maintaining - Developing Building in a structure
T-1.3.3 V-Model - DTAP dependicies
T-1.4 On Premise services sdlchos_04 OnPrem
T-1.4.1 On Prem Infrastrcuture
T-1.4.2 On Prem Platform
T-1.4.3 On Prem Software
T-1.5 Software as a Servive - Cloud sdlchos_05 T-*AAS
T-1.5.1 IAAS, Infrastrcuture as a Service
T-1.5.2 PAAS, Platform as a Service
T-1.5.3 SAAS, Software as a Service
T-1.6 Maturity 3: infrastructure in control sdlchos_06 CMM3-4IT
T-1.6.1 Regulations: technicals & functionals
T-1.6.2 Incentives, Culture, Structure, Resources
T-1.6.3 Maturity fundaments technical infrastructure
T-2 Software Development Life Cycle (SDLC)
T-2.1 ALC types sdlcapp_01 T-ALC
T-2.2.1 ALC-V1 Functional
T-2.2.2 ALC-V2 Functional
T-2.2.3 ALC-V3 Functional
T-2.2 Behavorial differences in ALC types sdlcapp_02 F-ALC
T-2.2.1 ALC-V1 Technical
T-2.2.2 ALC-V2 Technical
T-2.2.3 ALC-V3 Technical
T-2.2.4 ❓ What is the Q&A list for SDLC?
T-2.3 Middleware & platforms sdlcapp_03 Platforms
T-2.3.1 ALC middleware
T-2.3.2 DLC data life cycle
T-2.3.3 Data / Information provisioning
T-2.4 Confidentiality, Integrity, availability sdlcapp_04 T-CIA
T-2.4.1 Data / Information Governanc
T-2.4.2 Steer Shape Serve - within technology pillar
T-2.4.3 A Serve: Operational information process
T-2.5 Logical functional security by technology sdlcapp_05 Security
T-2.5.1 Middleware tools Security
T-2.5.2 Security Monitoring & Analysing
T-2.5.3 Identity Access
T-2.6 Maturity 4: business applications in control sdlcapp_06 CMM4-4IT
T-2.6.1 platforms (tools) & operational, analytical planes
T-2.6.2 Deep dives ALC - SDLC
T-2.6.3 Maturity Planes: Technology, Operational, Analytical
T-2.6.4 External references
T-2.6.5 Intermediate Advice
T-3 SDLC with Business Intelligence & analytics - Jabes
T-3.1 Descriptive Business intelligence sdlcbia_01 C-BI&A
T-3.1.1 Context difference: functional 👁 technical
T-3.1.2 BI&A Data governance
T-3.1.3 The question for descriptive analytics
T-3.2 Question: Eis Descriptive or Predictive? sdlcbia_02 C-Ftr
T-3.2.1 Big data - BI&A
T-3.2.2 Maturity Bi&A
T-3.2.3 BI&A, SIAR panopticon
T-3.3 Compliant Processes sdlcbia_03 C-Gov
T-3.3.1 Compliant data driven data processes
T-3.3.2 Compliant process requirements
T-3.3.3 Holistic relation connections with compliancy
T-3.4 Jabes - Build & Run sdlcbia_04 Jabes-devops
T-3.4.1 Delivering a product in a cycle
T-3.4.2 Data models used in a product cycle
T-3.4.3 Changing the product in a product cycle
T-3.5 Jabes - Use Portfolio management sdlcbia_05 Jabes-using
T-3.5.1 Data model, stage: Information delivery
T-3.5.2 Data model, stage: Information transformation
T-3.5.3 Data model, stage: Information gathering
T-3.6 Maturity 5: BI&A in control sdlcbia_06 CMM5-4IT
T-3.6.1 Mindset prerequisites
T-3.6.2 Combining internal & external services
T-3.6.3 Summary Advice
T-3.6.4 Following steps

T-1.1.4 Progress
done and currently working on:

man_elephant.jpg

T-1.2 Question: Waterfall or Lean Agile?

Any development life cycle does have assumptions. For information processing known as IT or ICT there are many of them. A well known standard is thhe staging in:
  1. Develop
  2. Test
  3. Acceptance
  4. Production
💣 However there are still many issues. One of the root causes is a misunderstandings, wrong perceptions on:

T-1.2.1 Layers in the technology stack
Dell Emc Cloud promotion, once upon a time, published a nice viusalisation. Transforming the IT practices from technology driven into service provider driven. Building yourself anything, everything is costly. The on-premise solutions have that association.
Promoting an ICT transformation for using SAAS (Software as a Service), Cloud. IT organizations need to be able to deliver an efficient, automated, and repeatable environment that is focused on the applications that are being built and delivered. IT should not focus on how to get the various components of the infrastructure to operate together.
dell emc it transformation storymap
In this: what is placed as "operations" is the front end delivery of the business mission.
The high level concepts, enterprise architect, global guidelines, the governance are leading. There are three different type of lines for release-management with their peculiar dependencies.
These are:
  1. Infrastructue:
    • Infra: hardware (virtualized), network, operating system
    • Services: basic security layers & facilities
    • Tools (DBMS, messaging, sftp) - middleware (ERP, BI, Analytics)
  2. Business applications, processes having:
    • logic - code, business rules, algorithms
    • data, information, chain communication
  3. Analyses of Business Applications.
    • Goal: quality assurance
    • Goal: business optimization

waterfall wikipedia
T-1.2.2 DTAP Layers Multiple dimensions
The DTAP Develop, Test (integration), Acceptance (Logic -User, Technical, Persons Education) are parts of a life cycle.
🤔 The waterfall model (wikipedia) is well known.
The appraoch of being a cycle however, is missing There are several words being different and some are not present in the DTAP staging. ❗ Nothing is mentioned to repeat in a cycle.
❗ Nothing is mentioned on all activities including documentation should be approved and deliverd before continueing to the next stage. The ordering is by logical dependencies avoiding waste.
PDCA cycle SDLC refinement Example of dtap steps in a refined cycle:
  1. Analysis
  2. Planning
  3. Design
  4. Development
  5. Testing
  6. Deployment
  7. Maintenance
  8. Evaluation
  9. Disposal
I would like to add "Ideate in this cycle ". Multiple options to evaluate is better than going for only the first option recognized.
Not every step needs to be executed. The disposal is only done when it is the result of the evaluation.
T-1.2.3 Agile PDCA and / or Waterfall
There is a SDLC misconception
To solve:
In the 60´s the Apollo project "race to the moon" was run. Launched were many rockets as sprints towards the target, the moon. It was the most agile approach for big projects ever run. Every launch was a delivery of a waterfall delivery but done in several cycles avoiding unnecessary waiting. The contradiction of successes when that approach was tried to copy is striking. Strict but wrong interpretation of models, frameworks, micromanagement, interest conflicts are common issues.
The conclusion, following any model and any case: is a disaster 💣 waiting to happen.
PDCA cycle redefined
ontological PDCA cycle There are three major power pillars in the organisation, each of them divided in three levels, the: "nine plane".
The processes cycle uses four quadrants. Combining all this in a single figure is complicated. This visuals has the saem orientation as the "data driven process"in T2.4.1. ⚠ The SIAR model visual uses another orientation.
advice request Penelope

T-1.3 Lean Agile: Vmap dimensions & perspectives

To solve: SDLC, ALC, DTAP, BI&AmpA issues by their real root-causes. (N.Dean Meyer) The right way to build high-performance, cross-boundary teamwork is to get to fundamentals. Find out why the nice people in your organization don't team, and then address the root causes of incentives, culture, structure, and the internal economy.
T-1.3.1 Looking for root causes in the SDLC challenge
Going agile lean is hyping in the cyber workspace. ❓ Question: is there a conflict in root causes mentioned above in by a management coach and those at "Agile Manifesto, principles" ?
Form the main page reordered:
😲 Remarkable:
Getting rid of a waterfall dogma
The statement: "all actions have to be finished before proceeding to the next stage", is not ❌ valid. A personal experience, a very long time ago, the project manager did claim this. The root cause was: incentives, culture, structure, resources. Indeed: all of those.
vmap sdlc Reducing Lead Time 4 - Development" Development also has options to reduce the lead time that production does not have, namely concurrent engineering (also known as simultaneous engineering). In manufacturing, the part can be only in one process at a time. In development, multiple people can work on the same project.
The same is at: Concurrent_engineering (wikipedia) .

Better is VMAP, V-Model
vmap sdlc (wikipedia)" The V-model is a graphical representation of a systems development lifecycle. It is used to produce rigorous development lifecycle models and project management models. The V-model falls into three broad categories, the German V-Modell, a general testing model, and the US government standard.
In the visualisation the sequential order of the SIAR-model is included. There are many loopbacks to enable to react and apply change as soon as possible.
T-1.3.2 Running, Maintaining - Developing Building in a structure
hierarchy structure
pyramid top down The hierarchical structure is a conflict of interests caused by the hierarchy. Before able to instruct staff for work a line of control, authority, must exist. An organisation chart is used in communications. The classic structure is a pyramid, the orders and instructions going top down. The result is cooperation on th shopfloor is not natural wihtin the local group.
NDMA: The key to overcoming this obstacle is internal customer-supplier relationships. When staff treat peers throughout IT as customers, just as they treat business-unit clients as customers, cross-boundary teamwork gets a lot easier.

pyramid bottom up The goal is servicing many customers, this is a reversed order from the shop floor experience. The pyramid is reversed with the sharp point at the shop floor.
Designing, engineering, building, operating a big distance on the mission goals. The Internal customer possible in a quite different line of control
NDMA: The key to overcoming this obstacle is internal customer-supplier relationships. When staff treat peers throughout IT as customers, just as they treat business-unit clients as customers, cross-boundary teamwork gets a lot easier.

technology structure
There will be always either a technical debt or functional debt or both. It is not possible to have all artifacts up to date to latest moment.
For details: 👓 click on a figure.
Z lifecycle
Building a ICT system is more easy when it is an new one. It is:
❶ Set up machines (green)
❷ Build up business logic & information in two DTAP lines (blue)
❸ Build up business analytics, tools and logic. Note: ❗⚠ Always use production information (orange)

⚠ Enabling Maintenance is not mandatory part of the activity.

revZ lifecycle
Maintaining and changing what is operational is more challenging. It is:
❶ Learn from analytics what to change in the production environment. Note: ❗⚠ Use of production information is inevitable (orange)
❷ Change business logic & information in two DTAP segregated lines (blue)
❸ Change Set up machines (green) according to external requirement and / or internal ones

⚠ Maintenance, DTAP deployments, must be enabled its a mandatory with the activity

T-1.3.3 V-Model - DTAP dependicies
For details: 👓 click on a figure.
vmap sdlc
Realizing a DTAP implementation using the V-model is recommended. Considerations:
❶ Allows agile lean project planning
❷ Acknowledges dependicies between logical actions
❸ Every stage can start when minimum of the previous one is present
❹ When split into: Strategy, tactcial, operational, micromanagement is avoidable
vmap sdlc
Golden oldies: ❶ V-Model: (wikipedia)
❷ combined with TMAP: (sogeti)
❸ more coverage: ISTQB

Agile lean:
❶ Small units more quick deliveries
❷ Small units easier quick requirement changes
❸ Goal of specifciations: "system test"

🤔🕳 There is no centralized portfolio product to collect all information on information processing.
🕳👁❗ Get the SDLC challenge solved
💡❗✅ For process design & build use Jabes to collect all information
💡❗✅ For validation design & build & run use Jabes to collect all information
The metadata storage structure setup in Jabes uses a hierarchy in three levels for each of the information types. Apllicable for: "process desing & build" and "validation design & build & run".
on prem datacenter

T-1.4 On Premise services

From the beginning using computers for information processing was very expensive. The situation was: The only option was use on premise datacentres located at the shopfloor.

T-1.4.1 On Prem Infrastructure
🚧 With ✅ a differentiator in technology, infrastructure: internal.
🔏 Criterium: not ❌ handing over the infrastructure technology.
The functional service provisioning is independent from the technical realisation.

CPU - Processing capacity
The maximum speed of a single processor is for many years rather stable. The increased heat production sets a limit on the internal frequency.
Increasing capacity is by: There was a belief that more internal cores would not happen forcing designs into many machines. This belief is proven wrong. The Xeon Platinum 8378A offers 32 cores, 64 with hyperthreading active. Support for two on a single machine board ➡128 cores on a machine. Intel (wikipedia)

Memory - volatile Working storage capacity
Internal memory capacity is still growing. A classic DBMS optionally becoming a fit.

IO - technical communication connections
This should cover:

Storage - permanent changeable memory capacity
External memory capacity is still growing. A multi tier approach:
  1. Solid State. Fastest access no physical spinning delay.
  2. Hard disk. A cheaper option for more capacity but spinning delay.
  3. Tape Cartridge. Still the best fast option for offline backups.
Increasing throuput is by:
Perftun_EtL03.jpg in a figure:

🕳👁❗ Internal infrastructure is a choice. 💣 offices, hybrid work & segmentation zones.

T-1.4.2 On Prem Platform
feel_brains_05 🚧 With ✅ a differentiator in technology, platform provisioning: internal.
🔏 Criterium: not ❌ handing over the platform (middleware) technology.
The functional service provisioning is independent from the technical realisation.

Platform (middelware) compliancy
Platform & Information considerations about:
The situations around platforms are very complicated because of the dependencies, not easily to get under control. No matter whether it is in the cloud or on prem. Noether theorem
There is: "law of conservation of misery" in line of: "law of conservation of energy"

🕳👁❗ Embedding platforms into tools covering CIA compliacny is not standard state of the technology. 💣 CIA compliancy is not only about technology.

T-1.4.3 On Prem Software
feel_unsafe chain 🚧 With a ✅ differentiator in functionality, service providing: internal.
🔏 Criterium: not ❌ handing over the information. Take care of results internal.
The functional service provisioning is independent from the technical realisation.

IT Service Desk
The Service: Considerations:
The IT service Desk is coordinating all kind of simple requests.
Classification first line support: integrity, confidentiality availability 👉🏾 low.
There is usually no ❌ differentatior in functionality.

Planning & Scheduling
The Service: Considerations:
Technical planning of the operationals tasks.
Classification scheduling: integrity, confidentiality availability 👉🏾 high.
There is ✅ usually a differentatior at functionality.

SOC - Security Operations Center
The Service: Considerations:
Monitoring integrity availablity operationals tasks.
Classification scheduling: integrity, confidentiality availability 👉🏾 high.
There is usually no ❌ differentatior at functionality.

Infomation archiving with access considerations
The Service: Considerations:
Monitoring integrity availablity operationals tasks.
Classification scheduling: integrity, confidentiality availability 👉🏾 low.
There is ✅ usually a differentatior at functionality.


Search for provisions

T-1.5 Software as a Service - Cloud

Information processing is still expensive. The cost factor shifted to functional people and services. The situation now is: New options: getting components delivered from external service providers.

T-1.5.1 IAAS, Infrastructure as a Service
🚧 With no ❌ a differentiator in technology, infrastructure: internal.
🔏 Criterium: ✅ handing over the infrastructure technology.
The functional service provisioning is independent from the technical realisation.

CPU - Processing capacity
The maximum speed of a single processor is for many years rather stable. The increased heat production sets a limit on the internal frequency.
Increasing capacity is by: There was a belief that more internal cores would not happen forcing designs into many machines. This belief is proven wrong. The Xeon Platinum 8378A offers 32 cores, 64 with hyperthreading active. Support for two on a single machine board ➡128 cores on a machine. Intel (wikipedia)

Memory - volatile Working storage capacity
Internal memory capacity is still growing. A classic DBMS optionally becoming a fit.

IO - technical communication connections
This should cover:

Storage - permanent changeable memory capacity
External memory capacity is still growing. A multi tier approach:
  1. Solid State. Fastest access no physical spinning delay.
  2. Hard disk. A cheaper option for more capacity but spinning delay.
  3. Tape Cartridge. Still the best fast option for offline backups.
Increasing throuput is by:
Perftun_EtL03.jpg in a figure:

🕳👁❗ Internal infrastructure is always needed. 💣 offices & segmentation zones.

T-1.5.2 PAAS, Platform as a Service
feel_brains_05 🚧 With no ❌ differentiator in technology, platform provisioning: external.
🔏 Criterium: handing over ✅ the platform (middleware) technology external.

Platform (middelware) compliancy
Platform & Information considerations is about:
The situations around platforms are very complicated because of the dependencies, not easily to get under control. No matter whether it is in the cloud or on prem. Noether theorem
There is: "law of conservation of misery" in line of: "law of conservation of energy"

🕳👁❗ Embedding platforms into tools covering CIA compliacny is not standard state of the technology. 💣 CIA compliancy is not only about technology.

T-1.5.3 SAAS, Software as a Service
feel_unsafe chain 🚧 With no ❌ differentiator in functionality, service provisioning: external.
🔏 Criterium: Handing over ✅ the information. Someone else taking care of results.
The functional service provisioning is independent from the technical realisation.

IT Service Desk
The Service: Considerations:
The IT service Desk is coordinating all kind of simple requests.
Classification first line support: integrity, confidentiality availability 👉🏾 low.
There is usually no ❌ differentatior in functionality.

Planning & Scheduling
The Service: Considerations:
Technical planning of the operationals tasks.
Classification scheduling: integrity, confidentiality availability 👉🏾 high.
There is ✅ usually a differentatior at functionality.

SOC - Security Operations Center
The Service: Considerations:
Monitoring integrity availablity operationals tasks.
Classification scheduling: integrity, confidentiality availability 👉🏾 high.
There is usually no ❌ differentatior at functionality.

Infomation archiving with access considerations
The Service: Considerations:
Monitoring integrity availablity operationals tasks.
Classification scheduling: integrity, confidentiality availability 👉🏾 low.
There is ✅ usually a differentatior at functionality.


Confused-2

T-1.6 Maturity 3: infrastructure in control

From the three ICT, ITC interrelated scopes: Only having the focus on IT4IT, getting a mature Life Cycle Management (LCM) requires understanding an acknowledgment of the layered structure.
Each layer has his own dedicated characteristics.

T-1.6.1 Regulations: technicals & functionals
Although there are no direct regulations on the technology at this moment, there are many regulations to comply by organisations. The topics for those regulations are mostly similar Confidentiality Integrity Availability (CIA). The result of a BIA analyses for CIA levels should be verifiable.
💡❗✅ For process requirements & design use Jabes to collect all information:

Cerberos dog three heads
T-1.6.2 Incentives, Culture, Structure, Resources
Work to do: solving SDLC, DTAP, issues by their root-causes.
(N.Dean Meyer) The right way to build high-performance, cross-boundary teamwork is to get to fundamentals. Find out why the nice people in your organization don't team, and then address the root causes of incentives, culture, structure, and the internal economy. See also: "E-1.3.1 Recognizing the 3M evils"
Maturity id SubId Source Context
CMM-4IT
-0-Muda
Waste
SDLC-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-3 T-2.3.2 DLC data life cycle Conceptual
STRC-1 T-2.4.2 Steer Shape Serve - within technology pillar Structural
STRC-2 T-2.5.3 Identity Access Structural
STRC-3 T-1.3.2 Running, Maintaining - Developing Building Structural
CMM-4IT
-0-Mura
Uneveness
SDLC-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-2 T-2.3.1 ALC middleware Conceptual
DTAP-3 T-2.3.2 DLC data life cycle Conceptual
STRC-1 T-2.4.2 Steer Shape Serve - within technology pillar Structural
STRC-2 T-2.5.3 Identity Access Structural
STRC-3 T-1.3.2 Running, Maintaining - Developing Building Structural
CMM-4IT
-0_Muri
irrationality
SDLC-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
SDLC-2 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-2 T-2.3.1 ALC middleware Conceptual
DTAP-3 T-2.3.2 DLC data life cycle Conceptual
STRC-1 T-2.4.2 Steer Shape Serve - within technology pillar Structural
STRC-2 T-2.5.3 Identity Access Structural
STRC-3 T-1.3.2 Running, Maintaining - Developing Building Structural


T-1.6.3 Maturity fundaments technical infrastructure
Maturity Basic SDLC
DTAP approaches maturity for LCM additional distinct layers for:
dtap layers application

The bottom area is enabling the upper part. It must be robust enough for the requirements of the serviced organization.

👓 click on the figure for Jabes maturity technology.

Maturity Attention Points
Attention points for maturity level considerations & evaluations:
Maturity id SubId Source Context
CMM-4IT-1 Network
C1 T-1.4 On Premise services Segmentation, zones, isolation
A1 T-1.4 On Premise services maximum single speed
A2 T-1.4 On Premise services Total throughput
C2 T-1.4 On Premise services Encryption
I1 T-1.4 On Premise services Robustness
I2 T-1.4 On Premise services Virtualisation impact
C5 T-1.5 Software as a Service - Cloud Segmentation, zones, isolation
A5 T-1.5 Software as a Service - Cloud maximum single speed
A6 T-1.5 Software as a Service - Cloud Total throughput
C6 T-1.5 Software as a Service - Cloud Encryption
I5 T-1.5 Software as a Service - Cloud Robustness
I6 T-1.5 Software as a Service - Cloud Virtualisation impact
CMM-4IT-2 Machines
A1 T-1.4 On Premise services CPU
A2 T-1.4 On Premise services Volatile Memory
A3 T-1.4 On Premise services Persistent Storage sizing
A4 T-1.4 On Premise services Persistent Storage throughput
C1 T-1.4 On Premise services Robustness
C2 T-1.4 On Premise services Recoverability
I1 T-1.4 On Premise services Virtualisation impact
A5 T-1.5 Software as a Service - Cloud CPU
A6 T-1.5 Software as a Service - Cloud Volatile Memory
A7 T-1.5 Software as a Service - Cloud Persistent Storage sizing
A8 T-1.5 Software as a Service - Cloud Persistent Storage throughput
C5 T-1.5 Software as a Service - Cloud Robustness
C6 T-1.5 Software as a Service - Cloud Recoverability
I1 T-1.5 Software as a Service - Cloud Virtualisation impact
CMM-4IT-3 operating system
C1 T-1.4 On Premise services Segmentation, zones, isolation
A1 T-1.4 On Premise services DNS central repository
A2 T-1.4 On Premise services Identities central repository
C2 T-1.4 On Premise services DNS central repository
C3 T-1.4 On Premise services Identities central repository
I1 T-1.4 On Premise services Robustness
I2 T-1.4 On Premise services Middleware Connections
C5 T-1.5 Software as a Service - Cloud Segmentation, zones, isolation
A5 T-1.5 Software as a Service - Cloud DNS central repository
A6 T-1.5 Software as a Service - Cloud Identities central repository
C6 T-1.5 Software as a Service - Cloud DNS central repository
C7 T-1.5 Software as a Service - Cloud Identities central repository
I5 T-1.5 Software as a Service - Cloud Robustness
I6 T-1.5 Software as a Service - Cloud Middleware Connections


🔰 Contents Cascade VMAP OnPrem T-*AAS CMM3-4IT 🔰
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯


T-2 Software Development Life Cycle (SDLC)


feel_brains_05

T-2.1 ALC types

Applications are business organisational artifacts served by technology. The business rules, business logic, are set by the organisation. The methodologies for defining business rules has several options: Intention: improving quality, quantity at lower cost.

T-2.1.1 ALC-V1 Functional
generic
The classic application project delivery: "ALC-V1 model".

bp_lifedev01.jpg In a figure:

The operational plane is at the lower half.

The analytical plane is at the upper half.


Operational - analytical plane
Bia catweazle way Operational:
For system where change during the total lifecycle is not making sense, this methodology is a good choice. In the physical world this is a common approach. Datacentres have many physical components.

Analytical:
At best there are some spreadsheets used (ad hoc analyses).
Ideas from a guru, external advisor, are accepted practices.

T-2.1.2 ALC-V2 Functional
generic
The classic application life cycle mangement: "ALC-V2 model".

bp_lifedev02.jpg In a figure:

The operational plane is at the lower half.

The analytical plane is at the upper half.

Operational - analytical plane
Bia classic car way Operational:
Needed simple operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .

Analytical:
Needed simple options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.

🕳👁❗ Explain requirements for operational data / information analytical plane clearly.
🕳👁❗ Explain versions requirements clearly. 💣Versioning is about process logic.

T-2.1.3 ALC-V3 Functional
generic
Modern application life cycle mangement: "ALC-V3 model".

bp_lifedev03.jpg In a figure:

The operational plane is at the lower half.

The analytical plane is at the upper half.

Operational - analytical plane
Bia airbus a380 way Bia airbus a380 way Operational:
Needed advanced operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .

Analytical:
Needed advanced options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.

Legal:
Getting aligned on impact on probabilities.

🕳👁❗ Explain requirements for operational data / information all planes clearly.
🕳👁❗ Explain the role of the training dataset being the source code.

Elaboration ALC-V3
ITC is transforming into using ML (Machine Learning), a subarea of AI.
Processes how to create, implement and monitor are not settled.
❗ Important:

Model ML building cycle. Developping logic, new terminology "model"
The modelling part got a new life cycle:
Instead of human defined decisons it is humand guided, computer assisted, best decision (champion) too choose.

feel dual confused

T-2.2 Behavorial differences in ALC types

Applications are business organisational artifacts served by technology. Business rules, business logic, are set by the organisation. Methodlogies used by the business to follow by technology are: Intention: improving quality, quantity at lower cost.

T-2.2.1 ALC-V1 Technical
generic
The classic application project delivery: "ALC-V1 model".

Develop one off Develop one off A figure,
See right side:

There are two components involved:
  1. "business logic" code (transformation process)
  2. "business data" (information)

⚠ The focus is only on partial code artifacts.
Issues Component properties:
⚠ CIA ratings, results from BIA-s should not ignored.

Operational - analytical plane
Bia Emmett Brown way Operational:
Fake data / information is used for development.
Operational data information is only used for operations.

Analytical:
At best there are some spreadsheets used (ad hoc analyses). Required is operational production information.
Ideas from a guru, external advisor, are accepted practices.

🕳👁❗ Get the DTAP ALC challenge solved

T-2.2.2 ALC-V2 Technical
generic
The classic application life cycle mangement: "ALC-V2 model".

Business applications layers, building on inta including tools. A figure,
See right side:

👓 Click on figure: details classic deployment

Operational - analytical plane
Bia classic car way Operational:
To build simple operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .
Dedicated operational, build - test environments.
Analytical:
To build simple options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.
Required is operational production information.
🕳👁❗ Get the DTAP ALC challenge solved. 💣Note: requirement operational data usage.
🕳👁❗ Get versions requirements clear. 💣Versioning is not about coding.

T-2.2.3 ALC-V3 Technical
generic
Modern application life cycle mangement: "ALC-V3 model".

three layers building on the previous production version. A figure,
See right side:

👓 Click on figure: machine learning deployment

Operational - analytical plane
Bia airbus a380 way Bia airbus a380 way Operational:
To build advanced operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .
Dedicated operational, build - test environments.
Analytical:
To build advanced options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.
Required is operational production information.
Legal:
Getting aligned on impact on probabilities.

🕳👁❗ Get the DTAP ALC challenge solved. 💣Note:requirement operational data usage
🕳👁❗ 💣 Get the role of the training dataset being the source code solved.

Elaboration ALC-V3
ITC is transforming into using ML (Machine Learning), a subarea of AI.
Processes how to create, implement and monitor are not settled.
❗ Important:

❓ T-2.2.4 What is the Q&A list for ALC - SDLC?
😉 For considerations using Jabes metadata portfolio technology is not relevant.
When wanting to use the Jabes maturity level measurement it is unavoidable.
For considerations using Jabes metadata portfolio detailed Q&A are on the backog (to do) list.

Enterprise platsform

T-2.3 Middleware & platforms

Components (tools) purchased, middelware: Intention: enabling building processes.
T-2.3.1 ALC middleware
generic
The classic application life cycle mangement: "ALC middleware".


Develop one off Develop one off A figure, See right side:

Attention, understanding needed for:
  1. External suppliers assumptions & guidelines
  2. Internal infrastructure & guidelines
⚠ Only focus:platform by wishes from the organisation
⚠ NO: "business logic" code NOR "business data"

Issues platform properties:
Not to ignore:
⚠ CIA, ratings results from BIA-s
⚠ infrastructure embedding (eg: LDAP AD)
⚠ security monitoring embedding (eg: SIEM)

Operational - analytical plane
Bia Emmett Brown way Operational:
Tooling Control & w Monitoring for resource usage (infrastructure) and their limitations. Align with security compliancy eg SIEM, LDAP

Analytical:
At best there are some reprots (ad hoc analyses). Required are operational production information describing the platfrom.
Ideas from a guru, external advisor, are accepted practices.

🕳👁❗ Get Middleware ALC and versioning challenge solved

T-2.3.2 DLC data life cycle
generic
The classic application life cycle mangement: "ETL ELT" (Extract Load Transform).

Jabes process Assurance A figure,
See right side:


Operational - analytical plane
Bia airbus a380 way Bia airbus a380 way Operational:
Fake data / information is used for development.
Operational data information is only used for operations.

Analytical:
At best there are some spreadsheets used (ad hoc analyses). Required is operational production information.
Ideas from a guru, external advisor, are accepted practices.
Legal:
Getting aligned on impact on probabilities.

🕳👁❗ Get the DTAP DLC challenge solved. 💣Note:requirement operational data usage

T-2.3.3 Data / Information provisioning
generic
The classic application life cycle mangement: "ALC middleware.

mdldata_wh01.jpg A figure,
See right side:

👓 click figure for data modelling
Operational - analytical plane
data_admin01.jpg gentelmen agreement way Operational:
To build advanced operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .
Dedicated operational, build - test environments.
Analytical:
To build advanced options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.
Required is operational production information.
Legal:
Getting aligned on impact by compliancy obligations.

🕳👁❗ Get the DLC compliancy challenge solved. 💣Alerting disruptive insight.

Elaboration information provisioning
Describing data, information, is understanding the logic in information.
❗ Important:

Data as a product: data monolith to mesh (deghani)
Data as a product principle is designed to address the data quality and age-old data silos problem; or as Gartner calls it dark data - “the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes”. Analytical data provided by the domains must be treated as a product, and the consumers of that data should be treated as customers - happy and delighted customers.
feel unave cia

T-2.4 Confidentiality, Integrity, availability

Compliancy questions are applicable everywhere internal and external for an organisation. Although this is the technical pillar representative roles to the ones in the organisational pillar are needed.
Support for the organisational:
Similarity using the SIAR model holistic and at the technical pillar is intended.
T-2.4.1 Data / Information Governance
generic
Engineering than a list of "best practices", what always has been done.
DMBOK segmentation
A figure,
See right side:

Technical Section - Holistic
gentlemen agreement way Technical Section:
To build advanced operating options, use DMBOK, PMBOK.

Holistic:
To build advanced options what is happening, use DMBOK, PMBOK.

Legal:
Getting aligned on what always has been done that way.
Anyway a problem with not understood and changing compliancy.
T-2.4.2 Steer Shape Serve - within technology pillar
generic
Organizing the task and roles, reuse of the nine-plane.
dtap layers application A figure,
See right side:

Technical Section - Holistic
data_admin01.jpg Technical Section:
To build advanced operating options, state of art technology now and in the future.

Holistic:
To build advanced insight in: ❷ what is happening, ❸ what could happen and ❸ what is likely to happen. (risk appetite)


🕳👁❗ Align audit roles in rechnical section aligned with holistics. 💣 👉🏾 frictions
🕳👁❗ Aling the request delivery processes at holistic into the technical section.
🕳👁❗ Aling alert options from the technical section into the holistic. 💣 👉🏾 frictions

T-2.4.3 Serve: Operational information process
generic
Servicing holistic data driven processes From the technology pillar:
A figure,
See right side:

Technical Section - Holistic
data_admin01.jpg gentelmen agreement way Technical Section:
Run Processing: ❷ reliable predictable, ❸ robust integrity, ❹ react at alerts.

Holistic:
Consume Processing: ❷ expectations on quality & time, ❸ expectations on quality & cost, ❸ react at alerts.

Legal:
Control Processing: ❷ expectations on compliancy requirements.

🕳👁❗ Set Service - Delivery challenges, 💣 👉🏾 frictions.
🕳👁❗ Set reaction on alerts challenges, 💣 👉🏾 frictions.
🕳👁❗ Set compliancy requirements challenges, 💣 👉🏾 frictions.


Elaboration addtional information
❷ Required is controlling who uses what kind of software / tools. SAM, Software asset managment: SAM (wikipedia)
Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization.
According to the Information Technology Infrastructure Library (ITIL), SAM is defined as " all of the infrastructure and processes necessary for the effective management, control and protection of the software assets throughout all stages of their lifecycle."
Fundamentally intended to be part of an organizations information technology business strategy, the goals of SAM are to reduce information technology (IT) costs and limit business and legal risk related to the ownership and use of software, while maximizing IT responsiveness and end-user productivity.


❸ Required is: clear responsibilities accountabilities: EU (commission law)
The data controller determines the purposes for which and the means by which personal data is processed. So, if your company/organisation decides ‘why’ and ‘how’ the personal data should be processed it is the data controller. Employees processing personal data within your organisation do so to fulfil your tasks as data controller.
....
The data processor processes personal data only on behalfof the controller. The data processor is usually a third party external to the company. However, in the case of groups of ventures, one venture may act as processor for another undertaking.

order in logic

T-2.5 Logical functional security by technology

The simple question: "Whose Job Is It, Anyway?"
There was an important job to be done and Everybody was sure that Somebody would do it. Anybody could have done it, but Nobody did it. Somebody got angry about that, because it was Everybody´s job. Everybody thought Anybody could do it, but Nobody realized that Everybody wouldn´t do it.

It ended up that Everybody blamed Somebody when Nobody did what Anybody could have.
T-2.5.1 Middleware tools Security
generic
Applications using information are use by everybody. But:

Develop one off Develop one off Missing tools, middleware: The middleware usage is slightly different to middleware in the operational line. This kind on middleware is involved in operational processes but not having any commitment with them.

A figure:
See right side

Attention, understanding needed for:
  1. External suppliers assumptions & guidelines
  2. Internal infrastructure & guidelines


Technical Section - Holistic
Bia catweazle way Holistic:
Goal: a reliable robust environment for the organisation (I).

Technical Section:
❶ Build enabling doing SIEM.
❷ Build enabling doing SOAR.
❸ Build enabling doing pentesting.
❸ Build enabling doing IAM security for the organisation.
Getting the knowledge and tools is only the first design step.

🕳👁❗ Clear requirements for technical security and IAM .
🕳👁❗ Orchestration activities with responsibilities 💣 👉🏾 frictions.

T-2.5.2 Security Monitoring & Analysing
generic
Monitoring auditing for knowing what is going on, what possible risks are:

dtap layers application A figure:
See right side

Technical Section - Holistic
Bia classic car way Holistic:
Goal: a reliable robust environment (II).

Technical Section:
❶ Run operational SIEM.
❷ Run operational SOAR.
❸ Run operational pentesting.


🕳👁❗ Operational (technical) data usage, beware of hidden compliancy conflicts.
🕳👁❗ The organisational (holistic) compliancy requirements must be clear, 💣 👉🏾 frictions.

T-2.5.3 Identity Access
generic
There is a "Devil´s Triangle" on its own wiht IAM. Conflicting types of interest:

secure_relate01.jpg A figure:
See right side

👓 click on figure for modelling the relationships and building realizations.


Operational - analytical plane
gentlemen agreement way Holistic:
Goal: a reliable robust secure environment (II).

Technical Section:
❹ Run operational IAM security holistic for the organisation.
❺ Have all three interests orchestrated managed.

Legal:
The three types of IAM interests should get serviced evenly.


🕳👁❗ The three types IAM interests are a complicated challenge, 💣 👉🏾 conflicts.

Elaboration Logical functional security by technology
❶ A Security Information and Event Management system is an application for the SOC Security Operations Center. SIEM (Gartner)
SIEM aggregates the event data that is produced by monitoring, assessment, detection and response solutions deployed across application, network, endpoint and cloud environments. Capabilities include threat detection, through correlation and user and entity behavior analytics (UEBA), and response integrations commonly managed through security orchestration, automation and response (SOAR). Security reporting and continuously updated threat content through threat intelligence platform (TIP) functionality are also common integrations. Although SIEM is primarily deployed as a cloud-based service, it may support on-premises deployment.

SOAR (TechTarget)
While SIEM tools have been around for years, security orchestration, automation and response (SOAR) is the newer kid on the block. This security technology was designed to help businesses better organize internal and external threats and to help speed up the process of triage and incident resolution. SOAR uses AI to better prioritize incident alerts so that SecOps teams know which threats to work on first. SOAR also uses a concept known as playbooks -- prebuilt and automated remediation steps that initiate when certain thresholds are met.

❸ A "Complete guide to penetration testing best practices": Pentest (TechTarget)
Software penetration testing, also called pen testing, discovers flaws, and examines the possible consequences of those defects. The organization can then handle those exploits in a safe, controlled and well-documented manner. Although penetration tests also cover the operation of networks, servers and other hardware, developers and testers bear responsibility for weaknesses at the software level.
Ideally, the software"s design and codebase allow only authorized users access to features and data stores. In practice, however, software comes with a wide range of risks that might leave the application vulnerable. Unauthorized individuals seek out these weaknesses to gain control of the application and access, alter or steal data.
...
Applications rely heavily on the OS for resources, including the UI, storage access and a network interface. OS weaknesses can potentially give a malicious actor control of application behavior or inappropriate access to storage. Consider how an OS manages ports for communication to and from the network. A hacker can use port scanning to detect open ports to attack the system and software. Install all OS security patches to protect applications and data.


❹ What is missing 💣 👉🏾: A good simple approach building a role and attribute based security model for business applications. IAM, PAM (TechTarget)
Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations.
...
Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.

The forgotten or ignored security design:

Confused-2

T-2.6 Maturity 4: business applications in control

From the three ICT, ITC interrelated scopes: Only having the focus on IT4IT, getting a mature Life Cycle Management (LCM) requires understanding an acknowledgment of the layered structure.
Each layer has his own dedicated characteristics.

T-2.6.1 platforms (tools) & operational, analytical planes
technology structure
This is what the serviced organization will use:
Governance structure

T-2.6.2 Deep dives ALC - SDLC
Intra References in twins
SDLC, ALC, is touching almost anything in an ICT environment.
The following is about relationships between processes and information:
Reference Topic <|> Topic Reference
layers deep dive layers, VMAP 👓 deep dive proces data layers data-proces
Dimensions Multiple dimensions layers *stages 👓 Describe Data, Data Administration Data-Admin
ALC type2 Business Apllications - 3GL ALC 👓 Data modelling model-data
ALC type3 Low code Analytics, Business ALC 👓 Deep dive modelling security access-security

Intra References by topics
SDLC, ALC, is touching almost anything in an ICT environment.
The following relationships are here in the mindmap approach:
More links associated - entry/exit
Is used at:
👓 threats for data & tools Proces Life Cycle.
👓 Machine supported develop Change ML AI.
👓 threats for data & tools Proces Life Cycle.
👓 resulting Life Cycle ALM, business Life Cycle.
Details to be found at:
👓 Business Intelligence,Analytics .
👓 Data Information Flow.
👓 Meta data Naming - versions.
👓 Math Software engineering.

T-2.6.3 Maturity Planes: Technology, Operational, Analytical
Maturity technology structure
A process can be build from scratch, starting with acquiring hardware or from change requests driven by optimization analyses.
There will be always either a technical debt or functional debt or both. It is not possible to have all artifacts up to date to latest moment.

Start building by acquiring hardware:
Z lifecycle ❶ Have machines Ordered (green)
❷ Start with development on a verified delivered production machine (hardware).
❸ Build up the operating system, middleware - tools.
❹ Verify the goal for business (blue and/or analytics (orange) infrastructure (green) is ready for production.

⚠ Enabling Maintenance is not mandatory part of the activity.

👓 click on the figure for Jabes maturity technology.
Note: ❗⚠ Business production information (blue) is always used for analytics (orange).
These three layers are a source for 💣 conflicts by misunderstandings and ignorance.

Maintaining and changing what is operational, is more challenging:
revZ lifecycle ❶ Learn from analytics (orange) what to change in the production environment.
  The change can be business processes (blue) and/or technology (green).
❷ Change business logic & information in the two DTAP segregated lines code/data (blue)
❸ Change Set up machines (green) according to external requirement and / or internal ones

⚠ Maintenance, DTAP deployments, must be enabled its a mandatory with the activity

👓 click on the figure for Jabes maturity technology.
Note: ❗⚠ Business production information (blue) is always used for analytics (orange).
These three layers are a source for 💣 conflicts by misunderstandings and ignorance.

Maturity Attention Points
Attention points for maturity level considerations & evaluations:
Maturity id SubId Source Context
CMM-4IT-4 Tools, Middelware
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C4 T-2.3.3 Data / Information provisioning Data governance
C5 T-2.3.1 ALC middleware Technology
I5 T-2.3.1 ALC middleware Technology
A5 T-2.3.1 ALC middleware Technology
C6 T-2.5.3 Identity Access Security
S1 T-1.6.2 Incentives, Culture, Structure, Resources Structure
CMM-4IT-5 Operational plane
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C5 T-2.3.1 ALC middleware Technology
I5 T-2.3.1 ALC middleware Technology
A5 T-2.3.1 ALC middleware Technology
C6 T-2.5.3 Identity Access Security
S1 T-1.6.2 Incentives, Culture, Structure, Resources Structure
CMM-4IT-6 Analytical plane
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C5 T-2.3.1 ALC middleware Technology
I5 T-2.3.1 ALC middleware Technology
A5 T-2.3.1 ALC middleware Technology
C6 T-2.5.3 Identity Access Security
S1 T-1.6.2 Incentives, Culture, Structure, Resources Structure


📚 T.2.6.4 External references
Global compliancy
These references are at the index, they are a shared interest.

Local SDLC
The focus is on the technical engineering life cycle.
A limited list:
link , newstopic interest who, source date
BIDM - The Business Intelligence Development Model Marco Spruit, Catalina Sacu 201001, 202106
Waterfall Process M.Fowler process theory - bad things
Managing the development of large software systems Winston W.Royce (wikipedia) process theory - 1987
Reducing Lead Time 4 - Development Winston W.Royce Concurrent Engineering - 2021
A Solid Foundation for Business Agility with Disciplined Agile PMI The PMBOK® Guide-our flagship publication

T.2.6.5 Intermediate Advice
Disciplined Agile
Solving the issues at "T-1.6.2 Incentives, Culture, Structure, Resources".
  1. requires: understanding and translations of requests "T-2.1 ALC types "
  2. requires: understanding the SDLC engineering misperception.
  3. goal for adding value, understanding value stream with assembly lines.
  4. goal for adding value, an organisational culture supporting the mission values.

Agile, no design
There is blame game going on. Simplistic agile is failing at large systems. Get basics understanding of the theory and root causes of the problem. When there are logic fundamental dependencies it is nonsense to ignore those dependencies.

Unless you have a lot of money and the goal is a decorative one, usefullness requires welel designed strcutures.
Winchester House (wikipedia)
She was known to rebuild and abandon construction if the progress did not meet her expectations, which resulted in a maze-like design. In the San Jose News of 1897, it was reported that a seven-story tower was torn down and rebuilt sixteen times. As a result of her expansions, there are walled-off exterior windows and doors that were not removed as the house grew in size. Multiple levels, up to five, were added to different parts of the home. The design was essentially Victorian, with elements of Gothic and Romanesque features.
🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🔰 Contents Cascade VMAP OnPrem T-*AAS CMM3-4IT 🔰


T-3 SDLC - Business Intelligence & analytics - Jabes


advice request Pythia

T-3.1 Descriptive Business intelligence

Understanding what is going on what with all uncertainties and possible future scenarios is an everlasting quest. A pitty when answers are 💣 multi interpretable with not understood effects.

EIS, DSS systems is what BI&A (business Intelligence & analytics) is about.
Building up in mind set complexity:

T-3.1.1 Context difference: functional 👁 technical
Business demo J.Dietz
Component: Enterprise Ontology 101
There is a claim of a "single version of the truth" for describing something what is going on for achieving a goal. The problem is several people are having a different perspective on the goal an the context of actions.

Multiple interpretations of an element.
This is a different understanding in metadata, ontology. In a document dated 2006 enterprise engineering J.Dietz an example is given.
  1. Strategy goal: transport of person(s).
    • From location A to location B.
    • Applicable transport option: a car.
  2. Car driver goal: using a car enabling going from A to B.
    • Needing information for useable roads.
    • Expected behaviour of the car.
    • How to avoid unwanted situations during transport.

ymap sdlc Wanting to use functions:
❷ lights,
❸ wheels (includes steering),
❹ brakes,
❺ motor.
  1. Car technician goal: having the car workable for the driver.
    • Adjusting technical implementations as far as possible on requests by the driver.
    • Only the way it should behave explaining to the driver.
ymap sdlc Creating and maintaining:
❷ lights,
❸ wheels (including steering),
❸ brakes,
❹ motor.
Closing the gap: functional 👁 technical
😱 The common complaint is a mis alignment between ICT and business people. Not using the same language not using understandable words for the both worlds is not understanding by design. Most surpising: nobody is acting on this.
💡 Have a glossary and data dictionary in place.

T-3.1.2 BI&A Data governance
Using the rear-view mirror
DMBOK segmentation
DMBOK - segmentation perspectives

Mission: DAMA International´s primary purpose is to promote the understanding, development and practice of managing data and information as key enterprise assets to support the organization.
⚠ Not every segment needs to get filled. DWH & BI, data quality and data science are not standard operational processes. The analytical plane is conceptual different from the operational plane. Data mesh is a new old concept.
💣 Data security with the idea getting "solved by the DBMS" is far too limited. A DWH, data lake, data lake house none of them have security by design. Worse securing information is not a topic in the world of analytics.

Looking ahead
Engineering an enterprise is more than an defining a list of "best practices" of what is usual being done.
Switching from what everyone else is doing and what everyone else did into a next step, innovation.
💣 Be aware: You should not innovate when there is no business case for it.
⚠ Just doing what everyone is doing requires knowledge sharing: "how to do".

T-3.1.3 The question for descriptive analytics
Needing descriptive reports
In the holistic nine-plane with all the processes there are many interactions. Every interaction is a key role in process cycles for:
dtap layers application A figure:
See right side

Available standard descriptive reports
⚠ What is out of the box present: nothing.
Ad hoc, local developped solutions not controlled by ICT is usual.
💡 Idea: room for improvement, innovative options to standards with reports.

Elaboration Disciplined Agile
There is no natural conflict between Agile and serial approaches. PMI - DA (Predictability)
Disciplined teams strive to improve their predictability to enable them to collaborate and self-organize more effectively, and thereby to increase the chance that they will fulfill any commitments that they make to their stakeholders. ...
To see how to improve predictability, it is often useful to see what causes unpredictability, such as technical debt and overloaded team members, and to then attack those challenges.

When the project is small enough to handle in a foreseeably timeframe. PMI - DA (V-Model)
Serial life cycle initiatives expect to take advantage of high certainty around firm requirements, a stable team, and low risk. As a result, project activities execute in a linear manner
...
To achieve this approach, the team requires detailed plans to know what to deliver and how. These projects succeed when other potential changes are restricted (e.g., requirements changes; project team members change what the team delivers).

advice request Penelope

T-3.2 Question: Eis Descriptive or Predictive?

Executive Information systems (EIS), decisions support systems (DSS) is what BI&A (business Intelligence & analytics) is about.
Building up complexity by mind set:
To help in decision makers, report: Let the decision maker make up his mind.

T-3.2.1 Big data - BI&A
Descrpitive or predictive?

Big Data
A nice view on this, "The big data journey rivisited" Bill Schmarzo 2016.
emc big data storymap

T-3.2.2 Maturity Bi&A
The closed loop
The closed loop cycle, from knowing what is going on into strategic decisions vice versa, is the ultimate goal.
BIDM (C.Sacu M.Spruit 2010)
BI analytics is integrated or not in the business process can strongly affect the decision making process. Hence, we consider this category to be a very important one when delimiting a maturity stage
  1. initiation (user driven - activity initiated by the user, process driven - activity initiated by a process)
  2. process integration (data centric - BI analytics is usually supported by a data warehouse, process centric - BI analytics is integrated in the business processes)
  3. processing model (store and analyze; analyze and store)
  4. event stream processing
  5. "closed-loop" environment
Business Intelligence Development Model
data driven BI&A
The BIDM paper was written in the era of placing the DWH as the technical solution. That should change with the fast evolvement of analytics. Machine learning (ML) is a first step.
💡 Idea: use data mesh with the ALC-V3 for information processing data products.

T-3.2.3 BI&A, SIAR panopticon
data driven BI&A
The SIAR model is the highest abstraction of processes in many dimensions. With four stages in four quadrants the holistic overview is placed in the middle. In the highest abstraction the middle (center) is symbolised an eye.
An intermediate of the SIAR abstraction:
9 plane BI&A panopticon
A figure:
See right side

👓 click on figure for information enterprise engineering (demo).

elaboration enterprise engineering
The pyramid of demo is reversed to fit into the circle.
Human actors possess three abilities (generic competences) in coordination and production:


change and threats about save place

T-3.3 Compliant Processes

In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Governance, risk management, and compliance are three related facets that aim to assure an organization reliably achieves objectives, addresses uncertainty and acts with integrity.

International standards such as ISO/IEC 27002 to help organizations meet regulatory compliance with their security management and assurance best practices.
T-3.3.1 Compliant data driven data processes
The functional compliancy gap 👁
Compliancy should be part of the SDLC, controlled by the business process accountable ones.
There are many unsolved challenges. See: All involved artifacts in a chain are important. Leaving something out by not knowing or ignoring can break all other efforts.
💡 Idea: make compliancy an indispensable part of the complete SDLC cycle.

The functional location of compliancy
There are several locations for compliancy. During the SDLC of a process:
The data driven process in a figure:


A horizontal line West-East touches the points in the circular process for compliancy reviews.

👓 Click figure for context.
T-3.3.2 Compliant process requirements
Information Source
Compliancy requirements are only informational documents. That information should become indenpensible parts of the operational processes in the protfolio. The following el that enables the flow into the portfolio:
A model that enables the flow into the portfolio as a figure:
Jabes process Assurance
Source into realisations
💡 Use the information holistic in realisations. Verification of requirements are included.

T-3.3.3 Holistic relation connections with compliancy
The holistic nine-pane and Technical nine-plane
The principles of approaches are similar but differ in details.

"Planning & Scheduling" ( T-1.4.3 On Prem Software / T-1.5.3 SAAS, Software as a Service). Differences:
  1. Holistic:
    • Steer - Tactical: Functional accountability for processes
    • Steer - Operational: Functional accountability for schedules
    • Serve - Operational: Technical responsibility for schedules
    • Serve - Tactical: Technical responsibility for processes
  2. Technical:
    • Steer - Operational: Technical responsibility for schedules
    • Steer - Tactical: Functional accountability for schedule tool
    • Serve - Tactical: Technical accountability for schedule tool
    • Serve - Operational: Functional responsibility for schedule tool

dtap layers application A figure:
See right side

Elaboration data driven process
The evolution from solving "data LCM layers" is not immediate obvious.
👓 Click for jumping into context.

The visualisation was made without "value stream", without "pull push" in mind. Started with crisp-dm a full circle with all three activities from business request, model building, model deployment was made. Requirements for LCM shown:
Topics included:

jabes save point

T-3.4 Jabes - Build & Run

💡 A tool helping in managing the change, operations doing knowledge assurance is recommended. The most logical step is installing a product available on the market.
There is an issue:

T-3.4.1 Delivering a product in a cycle
generic
See a customer entering with a request.
The usual flow:
Jabes generic process
A figure:
See right side

Hierarchical control
Use the SIAR model in a hierarchical approach, business within the business.
T-3.4.2 Data models used in a product cycle
generic
The metamodel covers all elemements in three layers: Servicing the life cycle stages. Innovation or solving known issues needs a defined "backlog". This is assigned to " plan - enable" The "backlog" items should be made clear enough and well understood to define requirements in the same three layers.
Jabes product
A figure:
See right side

Hierarchical control
Use the SIAR model in a hierarchical approach, business within the business.
T-3.4.3 Changing the product in a product cycle
generic
BEcome a customer with the request to change the product.
The flow:
This is not possible in a single cycle, many cycles are needed.
Jabes product
A figure:
See right side

Hierarchical control
Use the SIAR model in a hierarchical approach, business within the business.
elaboration
❶ Part of the proposal is a framework.
Using this framework a clear structured definition of generic steps with a portfolio becomes possible.
Goal: open shared knowledge.

❷ Licensing a product or running it as a services (SAAS) is a business model.

❸ Evaluating maturity external is a product, a business model.
jabes save point

T-3.5 Jabes - Use Portfolio management

💡 A tool helping in managing the change, operations doing knowledge assurance is recommended. The most logical step is installing a product available on the market.
There is an issue:

T-3.5.1 Data model, stage: Information delivery
generic
There are three levels to orchestrate for the realisation:
There are three area´s of interest to orchestrate for the realisation:
The goal with the delivery: to correct agreed locations, agreed quality of information.
Jabes process Assurance
A figure:
See right side

Mind set change
Don´t micro manage everything. Have the requirements for adequate tooling in place an let the workforce do their work.
T-3.5.2 Data model, stage: Information transformation
generic
There are three levels to orchestrate for the transformation:
There are three area´s of interest to orchestrate for the transformation:
The goal with the transformation: transform the retrieved source materials of information into a new product of information. Use the conforming assembly instructions and validate the expectations of levels of quality are met.
Jabes process Assurance A figure:
See right side

Mind set change
Don´t micro manage everything. Have the requirements for adequate tooling in place an let the workforce do their work.
T-3.5.3 Data model, stage: Information gathering
generic
There are three levels to orchestrate for the realisation:
There are three area´s of interest to orchestrate for the realisation:
The goal with the material retrieval: get from correct agreed locations agreed quality of information.
Jabes process Assurance A figure:
See right side

Mind set change
Don´t micro manage everything. Have the requirements for adequate tooling in place an let the workforce do their work.
elaboration
❶ Part of the proposal is a tool.
Using this tool a usage of a clear structured definition of generic steps with a portfolio becomes possible.
Goal: sharing detailed product knowledge for the workforce.

❷ Licensing a product or running it as a services (SAAS) is a business model.

❸ Evaluating maturity external is a product, a business model.
Confused-2

T-3.6 Maturity 5: BI&A in control

BI&A, business intelligence & analytics is understanding what is going on so understandable improvement proposals are getting options.
From the three ICT, ITC interrelated scopes: Only having the focus on IT4IT, getting a mature Life Cycle Management (LCM) requires understanding an acknowledgment of the layered structure.
Each layer has his own dedicated characteristics.

T-3.6.1 Mindset prerequisites
Situation Input Actions Results, SIAR lean structured processing
The Siar model
covers all of:
The model mindset is used over and over again.
6W 1H
The SIAR model is the highest abstraction for an retrospective for the questions:
six W one H, center: Why
T-3.6.2 Combining internal & external services
Getting tools, middleware is usually done by purchasing.
Building in house what is generally available for lower cost more functionality better quality, doesn´s makes sense.
Triangle BPM SDLC BIANL - unequal power lines
Configuring it correctly is still the hardest part of the job. ❗ This is an internal accountablity not an external one.

All three lines in the organization:
❶ business support & facilities,
❷ operational processing technology,
❸ analyzing optimizing,
have to be serviced.

Middleware, tools lives in a VUCA world. Brittle Anxious Non-linear Incomprihensible (Bani) are possible effects to manage.

👓 click on the figure for Jabes maturity technology.

Explanation headings:

Maturity id SubId Source Context
CMM-4IT-7 Up to date
S1 T-3.1.1 Context difference: functional 👁 technical Structure
C5 T-3.2.3 BI&A, SIAR panopticon Technology
I5 T-3.2.3 BI&A, SIAR panopticon Technology
A5 T-3.2.3 BI&A, SIAR panopticon Technology
CMM-4IT-8 Cots vs "build"
S1 T-3.1.1 Context difference: functional 👁 technical Structure
C1 T-2.2.1 ALC-V1 Technical Data governance
C5 T-3.2.3 BI&A, SIAR panopticon Data governance
I5 T-3.2.3 BI&A, SIAR panopticon Data governance
A5 T-3.2.3 BI&A, SIAR panopticon Data governance
S2 T-3.5 Jabes - Use Portfolio management Structure
CMM-4IT-9 Regulations
S1 T-3.1.1 Context difference: functional 👁 technical Structure
I1 T-3.1.1 Context difference: functional 🕳 technical human understanding
I2 T-3.1.2 BI&A Data governance Look ahead
I3 T-3.1.3 The question for descriptive analytics measure
I4 T-3.2.2 Maturity Bi&A closed loop
C5 T-3.2.3 BI&A, SIAR panopticon Compliancy
I5 T-3.2.3 BI&A, SIAR panopticon Compliancy
A5 T-3.2.3 BI&A, SIAR panopticon Compliancy
S2 T-3.5 Jabes - Use Portfolio management Structure


T-3.6.3 Summary Advice
Disciplined Agile
Understand the need for solving the issues by "T.2.6.5 Intermediate Advice".
To manage strategical are:
  1. decrease misunderstanding by a shared glossary - dictionary: "T-3.1.1 Context difference: functional 👁 technical"
  2. Get the management executive information to a closed loop "T-3.2.2 Maturity Bi&A"
  3. support for compliant processes: "T-3.3.2 Compliant process requirements" into "T-3.3.3 Holistic relation connections with compliancy"
  4. support for knowledge assurance during the life cycle of compliant processes: "T-3.4 Jabes - Build & Run".

T-3.6.4 Following steps
Missing link design bianl design bpm devops bpm devops sdlc devops bianl The organisation powered by ICT in a ship like constellation. The engines (data centre) out of sight below visibility. Serving multiple customers (multi tenancy) for the best performance and the best profits on all layers.

There are six pillars in a functional and technical layer. Within the the three internal pillars linked access is possible by an imagemap over the given figure.

When wanting going logical forward:
🔰 BiAnl forward

🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🔰 Contents Cascade VMAP OnPrem T-*AAS CMM3-4IT 🔰

© 2012,2020,2024 J.A.Karman
🎭 Summary & Indices Elucidation Foreword 🎭