logo jabes

Align Technology design


🎭 Concerns & Indices Elucidation 👁 Summary Vitae 🎭

👐 C-Steer C-Serve C-Shape 👁 I-C6isr I-Jabes I-Know👐
👐 r-steer r-serve r-shape 👁 r-c6isr r-jabes r-know👐

🔰 Contents TechRole M&CInf TechInf FuncInf CMM3-4IT 🔰
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯


T-1 The path in understanding technology


T-1.1 Contents

T-1.1.1 Global content
Applying technology knowledge
Aside the line of thoughts for what to organize, there are are related contexts.
$ kwadrants sdlc bpm devops sdlc design bpm design bianl devops bpm devops bianl When the image link fails, 🔰 click here.
Contexts:
r-serve, details on technology, processes
C-Steer context on organizing, safety
C-Shape context the internal distractor for change
r-steer details on organizing, safety
r-shape details on mediation communication

The "What" applying technology knowledge
The existing experienced situation was assumed to be as it is. The question for that is how to have that described, what is the "business" - the "organisation". Technology is the application of conceptual knowledge to achieve practical goals, especially in a reproducible way. The word technology can also mean the products resulting from such efforts, including both tangible tools such as utensils or machines, and intangible ones such as software. Technology plays a critical role in science, engineering, and everyday life.
This is a description by activities methodologies, missing is the reason of doing those.
The "Why" of applying technology knowledge
In the why there has been made a segregation in: Technology, Organizing, Changing, a philosophical hard one. These questions are reviewed and documented by historical experiences searching and learning for best approaches in the human nature by seeing humans as systems creating systems. Any answer is one with only partially usability.
Describing the historical change for this gives a direction for the future.
T-1.1.2 Local content
Reference Squad Abbrevation
T-1 The path in understanding technology
T-1.1 Contents contents Contents
T-1.1.1 Global content
T-1.1.2 Local content
T-1.1.3 Guide reading this page
T-1.1.4 Progress
T-1.2 How get technology a role doing tasks? sdlchos_02 TechRole
T-1.2.1 Technology from a bureaucratic perspective
T-1.2.2 Basics: technology system life cycle
T-1.2.3 Perspective maturity levels in a technocracy
T-1.2.4 Dynamics in perspectives for a system
T-1.3 How does technology balance tasks? sdlchos_03 M&CInf
T-1.3.1 Regulators, closed-loops indispensable in systems
T-1.3.2 Generic closed-loops for Linear systems, PID
T-1.3.3 The closed-loop in information processing, DWH
T-1.3.4 The good regulator - non linear closed loop
T-1.4 Technology at Information Processing sdlchos_04 TechInf
T-1.4.1 Technology basics for information processing
T-1.4.2 Everlasting information technology challenges
T-1.4.3 Location and ownership of used technology
T-1.4.4 Safety in systems by design in technology
T-1.5 Functionality by Information Processing sdlchos_05 FuncInf
T-1.5.1 Life cycle ambiguities, software development
T-1.5.2 Engineering technology, concurrency in activities
T-1.5.3 The functional debt - technical debt dichotomy
T-1.5.4 Architecting Design Engineer information systems usage
T-1.6 Maturity 3: infrastructure in control sdlchos_06 CMM3-4IT
T-1.6.1 The triality: Bureaucracy vs Technocracy vs Corporatocracy
T-1.6.2 The challenge of an organisational technological model
T-1.6.3 Incentives, Culture, Structure, Resources
T-1.6.4 Maturity fundaments technical infrastructure
T-2 Software Development Life Cycle (SDLC)
T-2.1 ALC types sdlcapp_01 T-ALC
T-2.2.1 ALC-V1 Functional
T-2.2.2 ALC-V2 Functional
T-2.2.3 ALC-V3 Functional
T-2.2 Behavorial differences in ALC types sdlcapp_02 F-ALC
T-2.2.1 ALC-V1 Technical
T-2.2.2 ALC-V2 Technical
T-2.2.3 ALC-V3 Technical
T-2.2.4 ❓ What is the Q&A list for SDLC?
T-2.3 Middleware & platforms sdlcapp_03 Platforms
T-2.3.1 ALC middleware
T-2.3.2 DLC data life cycle
T-2.3.3 Data / Information provisioning
T-2.4 Confidentiality, Integrity, availability sdlcapp_04 T-CIA
T-2.4.1 Data / Information Governanc
T-2.4.2 Steer Shape Serve - within technology pillar
T-2.4.3 A Serve: Operational information process
T-2.5 Logical functional security by technology sdlcapp_05 Security
T-2.5.1 Middleware tools Security
T-2.5.2 Security Monitoring & Analysing
T-2.5.3 Identity Access
T-2.6 Maturity 4: business applications in control sdlcapp_06 CMM4-4IT
T-2.6.1 platforms (tools) & operational, analytical planes
T-2.6.2 Deep dives ALC - SDLC
T-2.6.3 Maturity Planes: Technology, Operational, Analytical
T-2.6.4 External references
T-2.6.5 Intermediate Advice
T-3 SDLC with Business Intelligence & analytics - Jabes
T-3.1 Descriptive Business intelligence sdlcbia_01 C-BI&A
T-3.1.1 Context difference: functional 👁 technical
T-3.1.2 BI&A Data governance
T-3.1.3 The question for descriptive analytics
T-3.2 Question: Eis Descriptive or Predictive? sdlcbia_02 C-Ftr
T-3.2.1 Big data - BI&A
T-3.2.2 Maturity Bi&A
T-3.2.3 BI&A, SIAR panopticon
T-3.3 Compliant Processes sdlcbia_03 C-Gov
T-3.3.1 Compliant data driven data processes
T-3.3.2 Compliant process requirements
T-3.3.3 Holistic relation connections with compliancy
T-3.4 Jabes - Build & Run sdlcbia_04 Jabes-devops
T-3.4.1 Delivering a product in a cycle
T-3.4.2 Data models used in a product cycle
T-3.4.3 Changing the product in a product cycle
T-3.5 Jabes - Use Portfolio management sdlcbia_05 Jabes-using
T-3.5.1 Data model, stage: Information delivery
T-3.5.2 Data model, stage: Information transformation
T-3.5.3 Data model, stage: Information gathering
T-3.6 Maturity 5: BI&A in control sdlcbia_06 CMM5-4IT
T-3.6.1 Mindset prerequisites
T-3.6.2 Combining internal & external services
T-3.6.3 Summary Advice
T-3.6.4 Following steps

T-1.1.3 Guide reading this page
The role of technology in society
Technology , Relation to science and engineering Engineering is the process by which technology is developed. It often requires problem-solving under strict constraints. Technological development is "action-oriented", while scientific knowledge is fundamentally explanatory. Polish philosopher Henryk Skolimowski framed it like so: "science concerns itself with what is, technology with what is to be."
โ€Š The direction of causality between scientific discovery and technological innovation has been debated by scientists, philosophers and policymakers. Because innovation is often undertaken at the edge of scientific knowledge, most technologies are not derived from scientific knowledge, but instead from engineering, tinkering and chance.
Since the 1960s, the assumption that government funding of basic research would lead to the discovery of marketable technologies has lost credibility. Probabilist Nassim Taleb argues that national research programs that implement the notions of serendipity and convexity through frequent trial and error are more likely to lead to useful innovations than research that aims to reach specific outcomes.

Acceptance of technology in society
Anti-technology backlash Technology's central role in our lives has drawn concerns and backlash. The backlash against technology is not a uniform movement and encompasses many heterogeneous ideologies. Om the other side of spectrum is:
Technological utopianism refers to the belief that technological development is a moral good, which can and should bring about a utopia, that is, a society in which laws, governments, and social conditions serve the needs of all its citizens.

Basics in technology serving the organisation
Technology is the enabler in a service providing role for missions of the organisation. The role of enabling by applying known existing technology is far too often seen as only something of doing the operational tasks. There are more issues than just that.
💣 This misalignment and failure in ethical and social justice is a fundamental problem. Understanding of the why of this problem is a sociological question not technological. The question in this is what is driving humans in a logical rational way. Irrational illogical behaviour also exists but must be left out as threats not a fit for viable systems.
An idea for common values:
Now start in the middle and work in either direction.
From that start in the middle assume there is nothing else than that.
Going for wealth is the history of empires and aristocracy.
Going for Knowledge & learing is the history of rationality, science.
It is a dichotomy where it is better doing both paths.

➡ For a holistic approach, organisational mission, organisational improvements, than starting with the technology is sensible. Not able to get any service for a missions will block the option for realisations (operational). Not able to use technology bringing the advantages will block the option for realisations (design / innovation).
The priorities however, are set by the organisational missions and not by technology.
Alignment for technology indespnesible part of an organisation another is bureaucracy:
Defining and setting visions mission is not part of administration not the work of a bureaucrat. There is another position for that: the corporatocrat what for a long time that was the aristocrat or oligarchocrat. In the viable system these are spread over the system without any hierarchy.
➡ With a technological mindset there is a search for solutions in known issues. The situation in a position at an organisation is normally not an issue possible for researching for a solution. The 3d structure projection of multiple dimensions for an organisation is not on this page but it is used as knowledge for a possible technical model.
➡ Working into an approach for optimized business and technology situation, there is gap in managing knowledge and using tools. The proposal to solve those gaps is: "Jabes".
Understanding the: "T-3.6.1 Mindset prerequisites" is assumed.

T-1.1.4 Progress
done and currently working on:
Planning, to do:

man_elephant.jpg

T-1.2 How get technology a role doing tasks?

There is historical reason for hierarchy in a pyramide. Segregation in siloes by responsibilities, roles:
  1. Strategy,
  2. Tactics,
  3. Operational
A working culture set by the leaders threats:
  1. Hierarchy dictate details 👉🏾 micromanagement
  2. Micromanagement 👉🏾 siloed organisations
  3. Shared abstract goals.
    Siloed organisations 👉🏾 replacing into other goals
Are organisational goals visions missions really leading
T-1.2.1 Technology from a bureaucratic perspective
The control challenge in perspectives
The bureaucratic perspective perspective by a a nice viusalisation. The source is a Dell Emc Cloud promotion, published once upon a time.
dell emc it transformation storymap
The promoted idea, common mindset: Promoting an ICT transformation for using SAAS (Software as a Service), cloud.
🤔 Of course is the intention that all the the actvivities should be oursourced to the external supplier, ... but what is missing, what are the caveats?
Building yourself anything, everything is costly. The on-premise solutions have that association.
The requirements in measurement & control and Command & control are not obvious.
💣 Outsourcing the cloud is the promise of less managerial problems and lower financial costs.
🤔 Transforming the IT practices from technology driven into service provider driven.
IT organizations need to be able to deliver an efficient, automated, and repeatable environment that is focused on the applications that are being built and delivered. IT should not focus on how to get the various components of the infrastructure to operate together.

The Information technology controls business perspective
An organisation that has a viable business is accountable and responsible for: These high level concepts, is enterprise architecting enterprise engineering, governance the business. There are three different type of lines for actvities with their peculiar dependencies.
👉🏾 These are:
  1. Business applications, processes are build by:
    • logic - code, business rules, functionality in promises, algorithms
    • data, information, chains in information, chains in communication
  2. Analyses of the Business Applications, measurement & control.
    • Goal: quality assurance
    • Goal: business optimization
  3. Information technology applications are build on infrastructure:
    • Tools (DBMS, messaging, sftp) - middleware (ERP, BI, Analytics)
    • Services: basic security layers & facilities
    • Infra: hardware (virtualized), network, operating system
❗ The miscommunication in perspectives should be clear. Infrastructure for information technology is only a tiny part in enabling business. The promotion of a technology driven mindset is a root cause for costly failures.
waterfall wikipedia
T-1.2.2 Basics: technology system life cycle
Technical stages: logic-code and information
The DTAP Develop, Test (integration), Acceptance (Logic -User, Technical, Persons Education) are parts of a life cycle.
🤔 The waterfall model (wikipedia) better a v-model is well known. The appraoch of doing that in several cycle types , is however missing. There are several words being different and some are not present in the DTAP staging.
  1. purpose goals = (done before)
  2. Requirements = (done before)
  3. Design = (done before)
  4. Implementation = Development
  5. Implementation = Testing
  6. Verification = Acceptance
  7. Maintenance = Production
  8. Out of service = (after care)
❗ Nothing is mentioned on those activities to include documentation knowledge management.
PDCA cycle SDLC refinement
Improvement cycle logic-code and information
There are many possible cycles wiht multiple options in evaluations.
It is simplified when a step is optional bypassed by declaring is note applicable in a situation. Example of dtap steps in a refined cycle: The feedback with the customer and the request from the customer is to be added

T-1.2.3 Perspective maturity levels in a technocracy
Technocrat levels transformed from R.Likert
Start of "technocrat" classification :
Operations technocrat-1 technocrat-4
Analysis 1 Little confidence and trust between administrators and analysts Analysts ideas are solicited and used by administrators
Design 3 One-way, downward communication Communication flows freely in all directions
Development 2 Taps fear status and economic motives exclusively Taps all major motives except fear
Testing 4 Little upward influence;
downward influence overestimated
Substantial influence upward downward and horizontally
Maintenance 6 Established by top-level administrators and communicated downward Established by group participation
Deployment 5 Centralized; decisions made at the top Decentralized; decisions made throughout the organisation
Evaluation 7 close over-the-shoulder supervision Emphasis on self-control
Innovation
& Disposal
8 Low and passively sought by administrators;
little commitment to development humans resources
High and actively sought by administrators;
full commitment to developing human resources

Planning is an organisation task that is needed for the activities.
Information on what is going to support organisational tasks on can be solved, made more easy by options in technology.

Technocrat ideals transformed from P.Senge
The "technocrat" ideal classification:
Operations perspective technocrat-5
Analysis 1 Mental models influence personal & organizational views & behaviors.
Design 3 Shared vision Sharing an image of the future you want to realize together.
Development 2 Personal mastery personal commitment to vision, excellence, and lifelong learning.
Testing 4 3M Muri, Mura, Muda: Continous improvement, closed loops
Maintenance 6 Team learning learning collectively, two brains are smarter than one.
Deployment 5 Systems thinking that sees all parts as interrelated and affecting each other.
Evaluation 7 3M Muri, Mura, Muda: Continous improvement, closed loops
Innovation
& Disposal
8 3M Muri, Mura, Muda: Continous improvement, closed loops

A metaphor to describe this systems theory-based model would be DNA or a hologram. Each is a complex system of patterns, and the whole is greater than the sum of its parts.

Technocrat transformational activities for more mature levels.
Key elements to focus on:
Operations perspective technocrat-3
Analysis 1Structured
Hierarchies
⚖🎭
⚖ Define clear chains of command and responsibilities within an organization.
🎭 Ensure that roles and expectations are documented and understood.
Design 3Documentation & Record-keeping
🚧⟳
🚧 Maintain detailed records of decisions and actions to enable review and accountability.
⟳ Use standardized formats for documentation to simplify processes.
Development 2Qualified
Personnel
⚠📚
⚠ Position individuals in roles based on qualifications and expertise rather than personal connections or charisma.
📚 Provide ongoing training and development for employees to maintain competence.
Testing, validating 4Clear Rules &
Procedures
⚖🔰
⚖ Develop well-defined policies, laws, and protocols that guide decision-making and actions.
🔰 Ensure these rules are accessible and understandable to everyone involved.
Maintenance 6Impartial Application
⚖ 👓
⚖ Apply rules consistently across individuals, without bias or favoritism.
👓 Ensure transparency in decisions to foster trust in the system.
Deployment 5Adaptability
🚧⟲
🚧 Be open to revising rules and procedures when circumstances change or new information emerges.
⟲ Regularly evaluate the effectiveness of policies and update them as needed.
Evaluation 7Accountability Mechanisms
🎭👁
🎭 Set up processes for auditing and monitoring actions to ensure compliance with established rules.
👁 Have systems in place to address grievances or violations effectively.
Innovation
& Disposal
8Strategic Alignment
& Risk Management
⌛💰
⌛ Selecting and prioritizing change activities that align with the organization's strategic goals, portfolio.
💰 Budgets help identify financial constraints and opportunities, enabling proactive adjustments

👉🏾 The postion between his between bureaucrat-1 and bureaucrat-4 is the enablement of that transformation. There are five "bureaucrat-#" usuable understandble definitions. The art of communication bureaucrat-2 using closed-loops good-regulators is a topic on his own.
T-1.2.4 Dynamics in perspectives for a system
Change in perspectives Organisation technology
Strategic alignment - Conflict of interests
The organising of organization and organising technology do not have a shared vision of direction. The orientation of the two interrelated systems is a dynamic wheel without a fixed position.
Dynammically sizing horizontal communication
Strategic alignment - Conflict of strength
The organising of organization and organising technology do not have an automatic balance in powers. The organisation ⚖ The power can be between balanced strong and little.
Reasons for an unbalance can be: The orientation of the two interrelated systems is a dynamic wheel changing its shape. Shapes that can hurt or are difficult to move in the environment.
Knowledge managent - Strategic alignment
Choices by decisions are part of how the system is expected to work and are defining limitations for what the system is capable of. How the process went into a choice is another aspect for knowledge. Both are information for doing administrations.
There can be conflicts in interests in openness, transparency for that kind of information.
💡❗✅ For information use Jabes to have all involved metadata information.
💡❗✅ For transformations use Jabes to collect all instructions (algorithms).

advice request Penelope

T-1.3 How does technology balance tasks?

Any system needs measurements for controls. Information processing known as IT or ICT has as confusing dualities. It can be:
  1. Administrative work completing operational tasks.
  2. The operational flow processes by itself.
  3. Measurement, data for information to control 1,2.
💣 there are many issues. Root causes by misunderstandings, wrong perceptions on:
Are measurements and information for control really useful
T-1.3.1 Regulators, closed-loops indispensable in systems
Closed-loops engineering
Instrumentation and control engineering (ICE) is a branch of engineering that studies the measurement and control of process variables, and the design and implementation of systems that incorporate them. Process variables include pressure, temperature, humidity, flow, pH, force and speed.
ICE combines two branches of engineering.
The closed-loop for organisational control are logical not different. The difference is in the justification and objectivity in measurements.
Closed-loops engineering
Additionally, technological knowledge, particularly in computer systems, is essential to the job of an instrumentation and control engineer; important technology-related topics include humanโ€“computer interaction, programmable logic controllers, and SCADA. The tasks center around designing, developing, maintaining and managing control systems.
The goals of the work of an instrumentation and control engineer are to maximize ....
The simple list is not sufficient for a model of a system, a more holistic value for the whole and components is needed.
T-1.3.2 Generic closed-loops for Linear systems, PID
PID control
The closed loop pid controller
When there is a measurement control adjustment becomes a known theory. However this theory is not simple at all, a linear simple system is solvable by PID control
In theory, a controller can be used to control any process ...
Note limitations:
It becomes quick unpredictable when the limitations are not met.
Fire order 4-3-1-2 1-2 1-2-4-3
Firing oreder four stroke four cylinder
There is that strange oredering in; IV, III, I, II. This strange reordering is not unique.
From engine theory:
In a 4 cylinder (in line) 4 stroke engine the fire order also is changing from the visible linear by a projected cycle. In this the oredering is I,II, IV, III, just a different start in the cycle.
➡ A lot in engines, machines, has become an automated system by itself. The first steam engines did require a manual operation for opening and closing of the valves.
Safety valves, speed controls brakers and more were added by discrete steps evolutionary.
T-1.3.3 The closed-loop in information processing, DWH
Different types of Knowledge information: Datawarehouse
William H. Inmon (born 1945) is an American computer scientist, recognized by many as the father of the data warehouse. Inmon created the accepted definition of what a data warehouse is - a subject oriented, nonvolatile, integrated, time variant collection of data in support of management's decisions. Compared with the approach of the other pioneering architect of data warehousing, Ralph Kimball, Inmon's approach is often characterized as a top-down approach.
Data Warehousing facts and Myths (Bill Inmon, Joe Reis Show)
What's a data warehouse? And in order to do this, they need to gather data from many different applications and integrate the data. For tangible products that is more easy to manage than with intangible products. With intangible products there are three types of artifacts using the same technology.
Acceptance and traction of the Datawarehouse
I started thinking about the data warehouse in its early vestiges in in effectively 1983. I wrote an article in a magazine, Database Programming Design, that talked about the difference between operational data and analytical data. The first article: the notion that there should be a difference between transaction data and analytical data led to the thought process of, well, Gee, what is the difference between transaction data and operational and, and analytical data?
What do we need to do to turn it into useful information for the organizations in our corporations that need to look at enterprise data? How did it start gaining traction? And I think it's kind of interesting because the way data warehouse was sold into the cellular companies was not from the vendor, was not from the IT organization, but was from top management going down to the IT community and saying we need a data warehouse because we need more market share now from the cellular companies.
Other organizations began to adopt data warehouse. One of the most notable ones was at Walmart. In Sam Walton's book on the success of Walmart, he mentions data warehouse and and he talks about how Walmart was able to track the skews that they have in in Walmart. And so it went from cellular companies and then you can imagine once Walmart begin to espouse data warehouse, then all of the other retail companies did.
The purpose and why well covered in the organisation but not in the ICT silo.
The hi-jacking of the Datawarehouse acceptance
Is is a data warehouse a technology? However, after Data Warehouse began to be popular and and began to take hold in the world, Ralph wrote his books. Now Ralph has a different concept and, and I don't really call it a data warehouse at all. It's really something called a data Mart. A data Mart is something that is specialized for a department's analytical needs, such as the accounting department.
Why do you think people get confused with the word Datawarehouse to see?

The future of the Datawarehouse in measure & control
It kept bugging me that there's still confusion about Data Warehouse today, because it's not a new concept by any means. It it's old, it's interesting, it's old, but it's still as viable and important today as it was the day that it came out. When you stop needing the Datawarehouse is when you stop needing an enterprise wide view of data and when a corporation stops needing enterprise wide data. It means they have no accountants, no finance, no sales, and no marketing and if that's your organization.
💣 Guess what? You don't need a data warehouse. But that present representation of an organization doesn't fit any company, viable company that I know of.
At that point you just see the bankruptcy attorney.

T-1.3.4 The good regulator - non linear closed loops
ViSM: Viable system-2 channels & values
For the interactions between components there are channels. The reaction time and direction are attributes for responsiveness.
VSMB_SYST_02: A classification in channel types: 1-6.
Operations details perspective
Intervention Regulation C1 Balancing Autonomy and Control, prevent variety overload
Allocation of Resources C2 Resource strategies in: market shifts or technology changes
Operational Interrelationships C3 Mediate disputes between internal system components
Environment Interrelationships C4 External trends, identifying opportunities & threats (Sys4)
Coordination (Sympathicus) Sys2 C5 Structured communication paths between system components
Monitoring (Parasympathicus) C6 Ensures alignment with core mission and values

The interactions are influencing the state of values between the components.
➡ A model for interactions on values is a markov-chain or a network numerical prediction evaluation (NPE) relation. A system can have different kinds of values depending on purpose, structure.
A possible value matrix:
Operations perspective details perspective
Financial VF1Cost Efficiency Optimizing resource allocation to reduce waste.
without compromising quality.
VF2Revenue Generation Sustainable business models that maximize earnings.
Expanding market reach to enhance income streams.
VF3Financial Stability Continuous operations: Maintaining liquidity, cash flow.
Minimizing risks: strategic investments,diversification.
VF4Value Creation Investing in innovation and long-term growth strategies.
Strengthening brand equity and customer trust.
Ethical V1ETransparency Providing visibility to algorithms.(uncertaintities).
V2EFairness & justice How well the system protects data and users from harm.
V3EHonesty in processes Preventing manipulation or biased outcomes in decisions.
V4EAccountability Holding individuals and systems accountable for actions.
Social VS1Inclusivity & diversity Addressing systemic inequalities (⇄full participation).
Not skin tones but personalities (enneagram).
VS2Community engagement How well the system performs its intended tasks.
VS3Well-being & safety Provide accessible facilities, open communication,
Fostering a Sense of Belonging, Ensure physical safety
VS4Human-centered design Making the system intuitive and pleasant to interact with.
Nature V1NSustainability Ensuring efficient use of materials and energy.
V2NResource efficiency Encouraging recycling and waste reduction.
V3NResponsibility Preserving ecosystems and natural habitats.
V4NLong-term impact Seeking ecological balance not required preservation
Operations VO1Reliability System ability: function consistently over time.
VO2Efficiency Optimally usages resources within the system.
VO3Scalability How easily the system can grow or adapt to changes.
VO4Adaptability to change The systemโ€™s ability to integrate with other systems.
Knowledge
& Learning
V1KInnovation & creativity The ability to gather, interpret, and apply knowledge.
V2KKnowledge sharing Knowledge repositories (cloud) & AI learning systems
V3KContinuous improvement Balancing structured knowledge with intuitive leaps
V4KResearch & development Spaces: encourage experimentation, collaboration, learning.


The four components in an Escher basic structure
The four basic components interactions
For a usable model of an organisation a model with four basic structures is proposed. These four structures are based on what is seen as common activities although details are different the abstractions are similar.
🤔 In a moment there are activities for the results in the now and other for what are options for the future or coming from the paste. That structure is hard in any 2D visual and in 3D missing the dimension time for changes.
See figure right side:
😉 The four elements in a different approach than projected on a stretched cube solves the question of the edges at the DevOps and PortfolioPlan surfaces. The are belonging to counterparts, for example:
The four basic components in a fourier transform for time
Projecting each of the areas into time series, Fourier . A very important dimension is time. Filling a 2d surface with multiple projections of the same structure in a time frequency is simplifying the calculations by interactions.
Dynammically sizing horizontal communication
See figure right side.
The figure resembles Escher plane filling.

There is split in the backend / frontend representations by crossing the actions in time windows. With a natural cooperation in the front-end, bacck-end and the crossings there is a disbalance in powers.
Time windows would be logical in:
⌛ days (fast-alert) and
⏳ quarterly (slow-normal).


on prem datacenter

T-1.4 Technology at Information Processing

In the beginning using computers for information processing was very expensive. The situation was: The only option was use on premise datacentres located at the shopfloor.
Are the basics for information processing since the beginning really changed
T-1.4.1 Technology basics for information processing
The constraints in throughput in information processes
Understanding the bottlenecks is about "Performance & Tuning" in understanding relationships in Software (all types) en the Hardware (all types). Solving and more advanced the preventing of performance problems can be complex and chaotic when the systems are complex or chaotic.
The basic classic architecture was set by von Neumann.
Optimizing is balancing between choosing the best algorithm and the effort to achieve that algorithm. The time differences between those resources are in magnitudes factor 100-1000.
vonNeumann_perftun01.jpg The changed state of art:
➡ A single CPU, the change:
there are many of those to share and GPU's for parallel floating arithmetics.
➡ limited internal memory, the change:
The change is that are several laysers amd capable of holding massive data.
➡ The external storage, the change:
these days several types for speed and purpose and even more massive data is possible to be holded.


The shift from serial to parallel processes
Neglecting performance questions could be justified by advance in hardware the knowledge of tuning processes is ignored. Those days are gone, a Fundamental Turn Toward Concurrency in Software,
By Herb Sutter. (2009) The Free Lunch Is Over .
If you haven´t done so already, now is the time to take a hard look at the design of your application, determine what operations are CPU-sensitive now or are likely to become so soon, and identify how those places could benefit from concurrency. Now is also the time for you and your team to grok concurrent programming´s requirements, pitfalls, styles, and idioms.
The maximum speed of a single processor is for many years rather stable. The increased heat production sets a limit on the internal frequency.
Increasing capacity is by:
vonNeumann_perftun02.jpg
constraints Latency in throughput for processes
CPU There was a belief that more internal cores would not happen forcing designs into many machines. Intel This belief is proven to be wrong.
Memory The volatile Working storage capacity still growing. A classic DBMS optionally becoming a fit.
🤔 Old state of art (2021): The Xeon Platinum 8378A offers 32 cores, 64 with hyperthreading active. Support for two on a single machine board ➡128 cores on a machine.
Cables, Channels Were the connection for a short distance. The fast improvement in network speed and distance made it possible to have them implemented by networks.
👐 A new way to see external storage. Storage in a network can be: Theses are different in behaviour and performance.
👁 Combining those is going into high performant fault tolerant storage systems. Those kind of systems are software defined storage systems.
external storage using the internal memory types, solid state, avoiding mechanical delays.
T-1.4.2 Everlasting information technology challenges
Informattion at rest vs in transition
Choices to make in the performance by machines, CPU, internal memory, are the most understandable ones. The real challenge is the understanding of how the information is processed.
🤔 No matter what the physical technology is, the information has to be copied from an "at rest" location to the "in transit" location. Any kind of bottleneck will be the limiting factor for throughput.
Perftun_EtL03.jpg in a figure:
See right side.

❗ A balancing act between sequential and parallel activity is part of the algorithm for functionality.
💣 offices, hybrid work & segmentation zones.


Increasing throughput, decreasing turn around time is achieved by:
Platform (middelware) compliancy, internal accountablity
It all starts with the question of what the goal of an organisation as the whole is.
The activities for purposes are serviced by using platforms.
How those activities are service is the how of realisations. Any realisation can be a success and a failure, for that the question is: how to improve realisations.
feel_unsafe chain Platform & Information considerations is about: 🕳👁❗ Platforms, tools in CIA compliacny is not state of art.
Planning & Scheduling, technical planning of the operationals task the Service: IT Service Desk, coordinating all kind of simple requests, the Service: SOC - Security Operations Center, monitoring integrity availablity operationals tasks, the Service: Infomation archiving with access considerations, the Service: 🤔 The situations are complicated because of all the dependencies, they are not easily to control.

T-1.4.3 Location and ownership of used technology
On Prem Platform
The functional service provisioning is independent from the technical realisation.
With ✅ a differentiator in technology, platform provisioning: internal.
Criterium: not ❌ handing over the platform (middleware) technology.
The idea of On-Premises (On-Prem): There are differentiations for example using a shared (not owned) datacentre of selecting machine similar to it would be hardware offered by a provider.
🤔 The situations are complicated because of all the dependencies, they are not easily to control.

feel_brains_05
*AAS Platform
The functional service provisioning is independent from the technical realisation.
With no ❌ differentiator in technology, platform provisioning: externally.
Criterium: handing over ✅ the platform (middleware) technology externally.
The idea of As-a-Service (AAS) Models*: There are differentiations for example using a shared (not owned) datacentre of selecting machine similar to it would be hardware offered by a provider.
🤔 The situations are complicated because of all the dependencies, they are not easily to control.
💣 There is: "law of conservation of misery" in line of: "law of conservation of energy"
choosing the where of doing processing
What are the issues with those *AAS promises vs on-prem?
Subject *AAS models On-Prem
Cost initial Opex low upfront Capex high upfront investments
Cost on going Subscriptions, prices are not certain in the future Ongoing maintenance and support
Customization Limited customizable Higley customizable
Scalablity Highly scalable on demand
within provider limits
limited scalability
time-shifting and/ or hardware upgrades.
Safety Security managed by provider (??) Full control over security

⚠ The argument of cost is a possible fallacy, the profits of the provider shouls be a clear signal.
💣 The promise of a shift in accountablity for safety is terrible wrong. The supply chain is the rapidly seen as the weakest link for the whole. Better understanding of the situation will decrease complexity complications, to do:.

T-1.4.4 Safety in systems by design in technology
A structured approach: knowledge and documenting
5 Steps to effortless and engineering-informed cybersecurity risk assessments security engineering tool (SET: S.Fluchs) is what Safety in a Jabsa context could be.
Cybersecurity without engineering expertise? A risk you cannot afford❗ What happens if you do not address this?
5 steps Ot securitye Failing to act means your team risks getting bogged down in ineffective practices, wasting time and resources while leaving your plant and processes vulnerable to the real-world risks that matter.
The promoted approach is following a strcuture:
  1. real world impact The goal of avoiding high-consequence events
  2. risk assessment and security requirements definition of risk-scenarios for relevant requirements
  3. Critical functions Understanding of the system with all of its systems functions
  4. system model use of cyber decision diagrams to map the system functions
  5. Compliance evidence ad reports clear audit-ready reports that show the risk assessments.
The goal is at the top, the desired result at the bottom.
😉 To start the work getting done for this is in the middle to both sides. This start in the middle in similar to Sabsa and Zachman. The 6w1h could be added.
The understanding of the system, the what, is needed for the details of how. Working towards the two why's.
The only thing I would add:
🕳👁❗ Have the audit-ready reports and audit reports well structured stored
💡❗✅ For safety design & build use Jabes to collect all information
💡❗✅ For validation safety use Jabes to collect all information

A structured approach: Defining and documenting
There is that issue: but it is too often locked away in engineers' minds, but why?
Attention points in the design architecture: The structural change:
🕳👁❗ Have the safety design indispensable of the system.
💡❗✅ For safety design & build use Jabes to collect all information
💡❗✅ For validations of designed safety use Jabes to collect all information

Search for provisions

T-1.5 Functionality by Information Processing

Any system development life cycle does have assumptions. For information processing known as IT or ICT there are many of them. A well known standard is staging by:
1/ Develop, 2/ Test, 3/ >Acceptance, 4/ Production
But this is far from complete and it not coveing the real change flow.
💣 Root causes by misunderstandings, wrong perceptions on:
Abstractions and perspetves are needed to be communicated.
What are the basics for designing architecting in information processing
T-1.5.1 Life cycle ambiguities, software development
There was a misconception for change
Agile was for years a dogma but has many issues. That dogma only changed recently and now everyone is jumping on the product band-wagon. Agile did justify itself mainly by blaming anything that was bad as "waterfall" culture without understanding the real culture, real reasons, the logical arguments. To solve: SDLC, ALC, DTAP, BI&Amp;A issues by their real root-causes.
This is the managed not by technocrats but by the bureaucrats and corporatocrats.
🕳👁❗ Get the suggestions, demand planning solved.
💡❗✅ For suggestions backlog & requirements use Jabes to collect all information
💡❗✅ For validation work in progress use Jabes to administer & collect all information
The metadata storage structure setup in Jabes uses a hierarchy in three levels for each of the information types. Applicable for: "Suggestions, issues, and backlog for innovation & maintenance.
ontological PDCA cycle
PDCA cycle redefined
There are three major power pillars in the organisation, each of them divided in three levels, the: "nine plane". The processes cycle uses four quadrants. Combining all this in a single figure to support the chnage process is complicated.
T-1.5.2 Engineering technology, concurrency in activities
Achieving agility the V-model
Agile was for years a dogma but the real agility is understanding the v-model.
vmap sdlc Reducing Lead Time 4 - Development" Development also has options to reduce the lead time that production does not have, namely concurrent engineering (also known as simultaneous engineering). In manufacturing, the part can be only in one process at a time. In development, multiple people can work on the same project.
Concurrent engineering is the same, there are many sources for this.

hierarchy structure
pyramid top down The hierarchical structure is a conflict of interests caused by the hierarchy. Before able to instruct staff for work a line of control, authority, must exist. An organisation chart is used in communications. The classic structure is a pyramid, the orders and instructions going top down. The result is cooperation on th shopfloor is not natural wihtin the local group.
NDMA: The key to overcoming this obstacle is internal customer-supplier relationships. When staff treat peers throughout IT as customers, just as they treat business-unit clients as customers, cross-boundary teamwork gets a lot easier.

pyramid bottom up The goal is servicing many customers, this is a reversed order from the shop floor experience. The pyramid is reversed with the sharp point at the shop floor.
Designing, engineering, building, operating a big distance on the mission goals. The Internal customer possible in a quite different line of control
NDMA: The key to overcoming this obstacle is internal customer-supplier relationships. When staff treat peers throughout IT as customers, just as they treat business-unit clients as customers, cross-boundary teamwork gets a lot easier.

T-1.5.3 The functional debt - technical debt dichotomy
Z lifecycle
Multiple DTAP dimensions
There will be always either a technical debt or functional debt or both. It is not possible to have all artifacts up to date to latest moment.
Building a new ICT system is the most easy approach, building up:
❶ infrastructure, machines, (green)
❷ logic & information by two DTAP lines (blue)
❸ measurements, analytics, tools for control.
⚠ Note: ❗production information (orange) for all of it in the business application life cycle.
⚠ Infrastructure and analytics are out of date when going live.

revZ lifecycle
Maintaining and changing what is in operational use is more challenging, building and changing:
❶ Learn from analytics what to change.
⚠ Note: ❗production information (orange) for all of it in the business application life cycle.
❷ Change business logic & information in two DTAP segregated lines (blue)
❸ Change Set up machines (green) according to external requirement and / or internal ones
⚠ The business logic is out of date when going live.
For details: 👓 click .


V-Model -VMAP - DTAP dependicies
The V-model is a graphical representation of a systems development lifecycle. It is used to produce rigorous development lifecycle models and project management models. The V-model falls into three broad categories, the German V-Modell, a general testing model, and the US government standard. In the visualisation the sequential order of the SIAR-model is included. There are many loopbacks to enable to react and apply change as soon as possible.
vmap sdlc
Realizing a DTAP implementation using the V-model is recommended. Considerations:
❶ Allows agile lean project planning
❷ Acknowledges dependicies between logical actions
❸ Every stage can start when minimum of the previous one is present
❹ When split into: Strategy, tactcial, operational, micromanagement is avoidable
vmap sdlc
Golden oldies: ❶ V-Model: (wikipedia)
❷ combined with TMAP: (sogeti)
❸ more coverage: ISTQB
Agile lean:
❶ Small units more quick deliveries
❷ Small units easier quick requirement changes
❸ Goal of specifciations: "system test"

For details: 👓 click .
🤔🕳 There is no centralized portfolio product to collect all information on information processing.
🕳👁❗ Get the SDLC challenge solved
💡❗✅ For process design & build use Jabes to collect all information
💡❗✅ For validation design & build & run use Jabes to collect all information
The metadata storage structure setup in Jabes uses a hierarchy in three levels for each of the information types. Applicable for: "process design & build" and "validation design & build & run".
T-1.5.4 Architecting Design Engineer information systems usage
Prisms in multiple dimensions
Limiting the scope to only information processing and ignoring that "the organisation" is composed by three different components is a perspective for EA Enterprise Architecture. There is no way to "understand Information Architecture and Knowledge Engineering" using a flat 2D data modeling paradigm, it's as simple as that.
The immersion of enterprises in digital environments and the spreading of AI technologies call for a change of paradigm that could take into account the difference between data (facts), managed information (categories), and knowledge (concepts).
 camino ea-symbolic-twins
Source: ea-symbolic-twins
 camino ea-symbolic-twins
Ontological Prisms &amo Abstractions
Translating the symbolic/business into a formal language is disconnecting many of involved persons. The thesaurus refers to a master data glossary. A formal language should serve the business goals with simplicity.
Homogeneous abstractions are set within the same symbolic realms and thus pertain to the same kind of representations:


 camino ea-symbolic-twins
Ontological Prisms & Enterprise Architecture
The formal language has to goal of visualisations that should be understandable in simplicity although a master data glossary will be needed. A master data glossary is a formal word usage agreement to align intentions.
Ontological prisms ensure the interoperability of EA representations.

 camino ea-symbolic-twins The activities we are seeing and doing but missing the consistency for changes for the hole.
Integration of symbolic (blueprints) and actual (architecture) artefacts would pave the way to actionable architectures befitting Otto Neurathโ€™s appraisal quoted above. To that effect symbolic prisms must enable a functional integration of basic EA use cases:

 camino ea-symbolic-twins
From Symbolic Twins to "โ€œBrain of the Firm"
Immersed in digital environments, EA symbolic prisms can be turned into digital twins: For requiremetns this can be extended into: requirements revisited Requirements at enterprise level entail references to business models, existing architecture components, and current or planned projects. Given the variety of the contexts involved, such references may point to terms or models, the former with meanings set by domains, the latter set in actual (managed) or virtual (planned) modes.
Once requirements are aligned with business concepts, managed categories, and legacy components, work units and milestones can be defined and requirements distributed thereof, taking into account organisational, functional, and operational constraints. Taking a leaf from lean manufacturing, work units can be handled across four engineering workshops.

Confused-2

T-1.6 Maturity 3: infrastructure in control

From the three ICT, ITC interrelated scopes: Only having the focus on IT4IT, getting a mature Life Cycle Management (LCM) requires understanding an acknowledgment of the layered structure.
Each layer has his own dedicated characteristics.

T-1.6.1 The triality: Bureaucracy vs Technocracy vs Corporatocracy
A different perspective for the four systems
This is the vertical line in adaption goal integration and latency over the components.
The four sides of the stretched cube is seen for: Seeing this in this context is a change in the controverse technology vs the organisation.
Overview of the five technocrat orderings
Combining VSM system attributes opens bureaucracy for fractals in shifting log frames. This is the horizontal line in adaption goal integration and latency within the components (autonomy).
The only difference for Bureaucracy, Technocracy and Corporatocracy are the topics, contents for what it is about seen at the system-1.
Operations System-1
technocrat-1
-2 System-3 System-4
technocrat-4
System-5
technocrat-5
1 Analysis Structured Hierarchies Leadership Mental models
3 Design Documentation &
Record-keeping
Communication Shared vision
2 Development Qualified Personnel Motivation Personal mastery
4 Testing Clear Rules &
Procedures
Interaction Influence 3M
6 Maintenance Impartial Application Goal setting Team learning
5 Deployment Adaptability Decision making Systems thinking
7 Evaluation Accountability Mechanisms Control 3M
8 Innovation
& Disposal
Strategic Alignment
& Risk Management
Performance goals 3M


Regulations: technicals & functionals
Although there are no direct regulations on the technology at this moment, there are many regulations to comply by organisations. The topics for those regulations are mostly similar Confidentiality Integrity Availability (CIA). The result of a BIA analyses for CIA levels should be verifiable.
💡❗✅ For process requirements & design use Jabes to collect all information:

T-1.6.2 The challenge of an organisational technological model
The Fourier transformed organisational model to model

numerical weather model
The mechanistic & Sentienstic interactions to model
There are two perspectives for the whole: 🤔 In a two dimension view the result is a stretched cube for both. Combining those thinking in a sphere would be more appropriate.
The are four staged types of interest toe evaluate in many perspectives as dimensions:
  1. building an organisation / community.
  2. enabling to fulfil product (goods / services) deliveries.
  3. processes & processing categories.
  4. Management control, hierarchy authority accountability.
  5. Changing time horizons, time spans, from paste to future.
  6. Social interactions by the components as humans and their tools.
The number of dimensions and their interaction are far too many for easy understanding.
Perspectives pathway or danger
mathematical technical cybernetics
The processing by models and numbers evoluated by the increasing options in technology. Acta Cybernetica Vol_26_4
Cyber-physical systems (CPS) are systems in which software and physical parts interoperate deeply. The physical part of these systems is often modeled by differential equations. When properties have to be verifed on these systems, for instance the feasibility or the safety of a mission assigned to a robot, the solution of such differential equations is generally required. Even if Ordinary Differential Equations (ODE) are mostly considered to model cyber-physical systems, obtaining an analytical solution to this class of equations is a complex issue and approximations obtained with numerical methods are sometimes suffcient to check a given property. However, for some applications an approximation is not enough and an enclosure of the exact solution is required.
AI and the digital ecosystem
Analyzing chaotic systems requires statistical methods that embrace complexity and unpredictability. Some of the most effective approaches include: 👁 The content is a scientific approach for prescriptions in a VUCA world.
Cerberos dog three heads
T-1.6.3 Incentives, Culture, Structure, Resources
Work to do: solving SDLC, DTAP, issues by their root-causes.
(N.Dean Meyer) The right way to build high-performance, cross-boundary teamwork is to get to fundamentals. Find out why the nice people in your organization don't team, and then address the root causes of incentives, culture, structure, and the internal economy. See also: "E-1.3.1 Recognizing the 3M evils"
Maturity id SubId Source Context
CMM-4IT
-0-Muda
Waste
SDLC-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-3 T-2.3.2 DLC data life cycle Conceptual
STRC-1 T-2.4.2 Steer Shape Serve - within technology pillar Structural
STRC-2 T-2.5.3 Identity Access Structural
STRC-3 T-1.3.2 Running, Maintaining - Developing Building Structural
CMM-4IT
-0-Mura
Uneveness
SDLC-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-2 T-2.3.1 ALC middleware Conceptual
DTAP-3 T-2.3.2 DLC data life cycle Conceptual
STRC-1 T-2.4.2 Steer Shape Serve - within technology pillar Structural
STRC-2 T-2.5.3 Identity Access Structural
STRC-3 T-1.3.2 Running, Maintaining - Developing Building Structural
CMM-4IT
-0_Muri
irrationality
SDLC-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
SDLC-2 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-1 T-1.3 Lean Agile: Vmap dimensions & perspectives Conceptual
DTAP-2 T-2.3.1 ALC middleware Conceptual
DTAP-3 T-2.3.2 DLC data life cycle Conceptual
STRC-1 T-2.4.2 Steer Shape Serve - within technology pillar Structural
STRC-2 T-2.5.3 Identity Access Structural
STRC-3 T-1.3.2 Running, Maintaining - Developing Building Structural


T-1.6.4 Maturity fundaments technical infrastructure
Maturity Basic SDLC
DTAP approaches maturity for LCM additional distinct layers for:
dtap layers application

The bottom area is enabling the upper part. It must be robust enough for the requirements of the serviced organization.

👓 click on the figure for Jabes maturity technology.

Maturity Attention Points
Attention points for maturity level considerations & evaluations:
Maturity id SubId Source Context
CMM-4IT-1 Network
C1 T-1.4 On Premise services Segmentation, zones, isolation
A1 T-1.4 On Premise services maximum single speed
A2 T-1.4 On Premise services Total throughput
C2 T-1.4 On Premise services Encryption
I1 T-1.4 On Premise services Robustness
I2 T-1.4 On Premise services Virtualisation impact
C5 T-1.5 Software as a Service - Cloud Segmentation, zones, isolation
A5 T-1.5 Software as a Service - Cloud maximum single speed
A6 T-1.5 Software as a Service - Cloud Total throughput
C6 T-1.5 Software as a Service - Cloud Encryption
I5 T-1.5 Software as a Service - Cloud Robustness
I6 T-1.5 Software as a Service - Cloud Virtualisation impact
CMM-4IT-2 Machines
A1 T-1.4 On Premise services CPU
A2 T-1.4 On Premise services Volatile Memory
A3 T-1.4 On Premise services Persistent Storage sizing
A4 T-1.4 On Premise services Persistent Storage throughput
C1 T-1.4 On Premise services Robustness
C2 T-1.4 On Premise services Recoverability
I1 T-1.4 On Premise services Virtualisation impact
A5 T-1.5 Software as a Service - Cloud CPU
A6 T-1.5 Software as a Service - Cloud Volatile Memory
A7 T-1.5 Software as a Service - Cloud Persistent Storage sizing
A8 T-1.5 Software as a Service - Cloud Persistent Storage throughput
C5 T-1.5 Software as a Service - Cloud Robustness
C6 T-1.5 Software as a Service - Cloud Recoverability
I1 T-1.5 Software as a Service - Cloud Virtualisation impact
CMM-4IT-3 operating system
C1 T-1.4 On Premise services Segmentation, zones, isolation
A1 T-1.4 On Premise services DNS central repository
A2 T-1.4 On Premise services Identities central repository
C2 T-1.4 On Premise services DNS central repository
C3 T-1.4 On Premise services Identities central repository
I1 T-1.4 On Premise services Robustness
I2 T-1.4 On Premise services Middleware Connections
C5 T-1.5 Software as a Service - Cloud Segmentation, zones, isolation
A5 T-1.5 Software as a Service - Cloud DNS central repository
A6 T-1.5 Software as a Service - Cloud Identities central repository
C6 T-1.5 Software as a Service - Cloud DNS central repository
C7 T-1.5 Software as a Service - Cloud Identities central repository
I5 T-1.5 Software as a Service - Cloud Robustness
I6 T-1.5 Software as a Service - Cloud Middleware Connections


The meaning of what is made by intentions
There is a change over and over aging in this.
Otto_Neurath about philosophy of science and language.
He views truth as internal coherence of linguistic assertions, rather than anything to do with facts or other entities in the world. The criterion of verification is to be applied to the system as a whole (see semantic holism) and not to single sentences.
The metaphor: We are like sailors who on the open sea must reconstruct their ship but are never able to start afresh from the bottom. Where a beam is taken away a new one must at once be put there, and for this the rest of the ship is used as support. In this way, by using the old beams and driftwood the ship can be shaped entirely anew, but only by gradual reconstruction.
Noether theorem

🔰 Contents TechRole M&CInf TechInf FuncInf CMM3-4IT 🔰
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯


T-2 Software Development Life Cycle (SDLC)


feel_brains_05

T-2.1 ALC types

Applications are business organisational artifacts served by technology. The business rules, business logic, are set by the organisation. The methodologies for defining business rules has several options: Intention: improving quality, quantity at lower cost.

T-2.1.1 ALC-V1 Functional
generic
The classic application project delivery: "ALC-V1 model".

bp_lifedev01.jpg In a figure:

The operational plane is at the lower half.

The analytical plane is at the upper half.


Operational - analytical plane
Bia catweazle way Operational:
For system where change during the total lifecycle is not making sense, this methodology is a good choice. In the physical world this is a common approach. Datacentres have many physical components.

Analytical:
At best there are some spreadsheets used (ad hoc analyses).
Ideas from a guru, external advisor, are accepted practices.

T-2.1.2 ALC-V2 Functional
generic
The classic application life cycle mangement: "ALC-V2 model".

bp_lifedev02.jpg In a figure:

The operational plane is at the lower half.

The analytical plane is at the upper half.

Operational - analytical plane
Bia classic car way Operational:
Needed simple operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .

Analytical:
Needed simple options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.

🕳👁❗ Explain requirements for operational data / information analytical plane clearly.
🕳👁❗ Explain versions requirements clearly. 💣Versioning is about process logic.

T-2.1.3 ALC-V3 Functional
generic
Modern application life cycle mangement: "ALC-V3 model".

bp_lifedev03.jpg In a figure:

The operational plane is at the lower half.

The analytical plane is at the upper half.

Operational - analytical plane
Bia airbus a380 way Bia airbus a380 way Operational:
Needed advanced operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .

Analytical:
Needed advanced options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.

Legal:
Getting aligned on impact on probabilities.

🕳👁❗ Explain requirements for operational data / information all planes clearly.
🕳👁❗ Explain the role of the training dataset being the source code.

Elaboration ALC-V3
ITC is transforming into using ML (Machine Learning), a subarea of AI.
Processes how to create, implement and monitor are not settled.
❗ Important:

Model ML building cycle. Developping logic, new terminology "model"
The modelling part got a new life cycle:
Instead of human defined decisons it is humand guided, computer assisted, best decision (champion) too choose.

feel dual confused

T-2.2 Behavorial differences in ALC types

Applications are business organisational artifacts served by technology. Business rules, business logic, are set by the organisation. Methodlogies used by the business to follow by technology are: Intention: improving quality, quantity at lower cost.

T-2.2.1 ALC-V1 Technical
generic
The classic application project delivery: "ALC-V1 model".

Develop one off Develop one off A figure,
See right side:

There are two components involved:
  1. "business logic" code (transformation process)
  2. "business data" (information)

⚠ The focus is only on partial code artifacts.
Issues Component properties:
⚠ CIA ratings, results from BIA-s should not ignored.

Operational - analytical plane
Bia Emmett Brown way Operational:
Fake data / information is used for development.
Operational data information is only used for operations.

Analytical:
At best there are some spreadsheets used (ad hoc analyses). Required is operational production information.
Ideas from a guru, external advisor, are accepted practices.

🕳👁❗ Get the DTAP ALC challenge solved

T-2.2.2 ALC-V2 Technical
generic
The classic application life cycle mangement: "ALC-V2 model".

Business applications layers, building on inta including tools. A figure,
See right side:

👓 Click on figure: details classic deployment

Operational - analytical plane
Bia classic car way Operational:
To build simple operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .
Dedicated operational, build - test environments.
Analytical:
To build simple options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.
Required is operational production information.
🕳👁❗ Get the DTAP ALC challenge solved. 💣Note: requirement operational data usage.
🕳👁❗ Get versions requirements clear. 💣Versioning is not about coding.

T-2.2.3 ALC-V3 Technical
generic
Modern application life cycle mangement: "ALC-V3 model".

three layers building on the previous production version. A figure,
See right side:

👓 Click on figure: machine learning deployment

Operational - analytical plane
Bia airbus a380 way Bia airbus a380 way Operational:
To build advanced operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .
Dedicated operational, build - test environments.
Analytical:
To build advanced options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.
Required is operational production information.
Legal:
Getting aligned on impact on probabilities.

🕳👁❗ Get the DTAP ALC challenge solved. 💣Note:requirement operational data usage
🕳👁❗ 💣 Get the role of the training dataset being the source code solved.

Elaboration ALC-V3
ITC is transforming into using ML (Machine Learning), a subarea of AI.
Processes how to create, implement and monitor are not settled.
❗ Important:

❓ T-2.2.4 What is the Q&A list for ALC - SDLC?
😉 For considerations using Jabes metadata portfolio technology is not relevant.
When wanting to use the Jabes maturity level measurement it is unavoidable.
For considerations using Jabes metadata portfolio detailed Q&A are on the backog (to do) list.

Enterprise platsform

T-2.3 Middleware & platforms

Components (tools) purchased, middelware: Intention: enabling building processes.
T-2.3.1 ALC middleware
generic
The classic application life cycle mangement: "ALC middleware".


Develop one off Develop one off A figure, See right side:

Attention, understanding needed for:
  1. External suppliers assumptions & guidelines
  2. Internal infrastructure & guidelines
⚠ Only focus:platform by wishes from the organisation
⚠ NO: "business logic" code NOR "business data"

Issues platform properties:
Not to ignore:
⚠ CIA, ratings results from BIA-s
⚠ infrastructure embedding (eg: LDAP AD)
⚠ security monitoring embedding (eg: SIEM)

Operational - analytical plane
Bia Emmett Brown way Operational:
Tooling Control & w Monitoring for resource usage (infrastructure) and their limitations. Align with security compliancy eg SIEM, LDAP

Analytical:
At best there are some reprots (ad hoc analyses). Required are operational production information describing the platfrom.
Ideas from a guru, external advisor, are accepted practices.

🕳👁❗ Get Middleware ALC and versioning challenge solved

T-2.3.2 DLC data life cycle
generic
The classic application life cycle mangement: "ETL ELT" (Extract Load Transform).

Jabes process Assurance A figure,
See right side:


Operational - analytical plane
Bia airbus a380 way Bia airbus a380 way Operational:
Fake data / information is used for development.
Operational data information is only used for operations.

Analytical:
At best there are some spreadsheets used (ad hoc analyses). Required is operational production information.
Ideas from a guru, external advisor, are accepted practices.
Legal:
Getting aligned on impact on probabilities.

🕳👁❗ Get the DTAP DLC challenge solved. 💣Note:requirement operational data usage

T-2.3.3 Data / Information provisioning
generic
The classic application life cycle mangement: "ALC middleware.

mdldata_wh01.jpg A figure,
See right side:

👓 click figure for data modelling
Operational - analytical plane
data_admin01.jpg gentelmen agreement way Operational:
To build advanced operating options: ❶ faster, ❷ slower, ❸ change direction, ❹ environment knowledge .
Dedicated operational, build - test environments.
Analytical:
To build advanced options what is happening: ❶ Speed, ❷ direction, ❸ resources left, ❹ clear view on the way.
Required is operational production information.
Legal:
Getting aligned on impact by compliancy obligations.

🕳👁❗ Get the DLC compliancy challenge solved. 💣Alerting disruptive insight.

Elaboration information provisioning
Describing data, information, is understanding the logic in information.
❗ Important:

Data as a product: data monolith to mesh (deghani)
Data as a product principle is designed to address the data quality and age-old data silos problem; or as Gartner calls it dark data - โ€œthe information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposesโ€. Analytical data provided by the domains must be treated as a product, and the consumers of that data should be treated as customers - happy and delighted customers.
feel unave cia

T-2.4 Confidentiality, Integrity, availability

Compliancy questions are applicable everywhere internal and external for an organisation. Although this is the technical pillar representative roles to the ones in the organisational pillar are needed.
Support for the organisational:
Similarity using the SIAR model holistic and at the technical pillar is intended.
T-2.4.1 Data / Information Governance
generic
Engineering than a list of "best practices", what always has been done.
DMBOK segmentation
A figure,
See right side:

Technical Section - Holistic
gentlemen agreement way Technical Section:
To build advanced operating options, use DMBOK, PMBOK.

Holistic:
To build advanced options what is happening, use DMBOK, PMBOK.

Legal:
Getting aligned on what always has been done that way.
Anyway a problem with not understood and changing compliancy.
T-2.4.2 Steer Shape Serve - within technology pillar
generic
Organizing the task and roles, reuse of the nine-plane.
dtap layers application A figure,
See right side:

Technical Section - Holistic
data_admin01.jpg Technical Section:
To build advanced operating options, state of art technology now and in the future.

Holistic:
To build advanced insight in: ❷ what is happening, ❸ what could happen and ❸ what is likely to happen. (risk appetite)


🕳👁❗ Align audit roles in rechnical section aligned with holistics. 💣 👉🏾 frictions
🕳👁❗ Aling the request delivery processes at holistic into the technical section.
🕳👁❗ Aling alert options from the technical section into the holistic. 💣 👉🏾 frictions

T-2.4.3 Serve: Operational information process
generic
Servicing holistic data driven processes From the technology pillar:
A figure,
See right side:

Technical Section - Holistic
data_admin01.jpg gentelmen agreement way Technical Section:
Run Processing: ❷ reliable predictable, ❸ robust integrity, ❹ react at alerts.

Holistic:
Consume Processing: ❷ expectations on quality & time, ❸ expectations on quality & cost, ❸ react at alerts.

Legal:
Control Processing: ❷ expectations on compliancy requirements.

🕳👁❗ Set Service - Delivery challenges, 💣 👉🏾 frictions.
🕳👁❗ Set reaction on alerts challenges, 💣 👉🏾 frictions.
🕳👁❗ Set compliancy requirements challenges, 💣 👉🏾 frictions.


Elaboration addtional information
❷ Required is controlling who uses what kind of software / tools. SAM, Software asset managment: SAM (wikipedia)
Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization.
According to the Information Technology Infrastructure Library (ITIL), SAM is defined as " all of the infrastructure and processes necessary for the effective management, control and protection of the software assets throughout all stages of their lifecycle."
Fundamentally intended to be part of an organizations information technology business strategy, the goals of SAM are to reduce information technology (IT) costs and limit business and legal risk related to the ownership and use of software, while maximizing IT responsiveness and end-user productivity.


❸ Required is: clear responsibilities accountabilities: EU (commission law)
The data controller determines the purposes for which and the means by which personal data is processed. So, if your company/organisation decides โ€˜whyโ€™ and โ€˜howโ€™ the personal data should be processed it is the data controller. Employees processing personal data within your organisation do so to fulfil your tasks as data controller.
....
The data processor processes personal data only on behalfof the controller. The data processor is usually a third party external to the company. However, in the case of groups of ventures, one venture may act as processor for another undertaking.

order in logic

T-2.5 Logical functional security by technology

The simple question: "Whose Job Is It, Anyway?"
There was an important job to be done and Everybody was sure that Somebody would do it. Anybody could have done it, but Nobody did it. Somebody got angry about that, because it was Everybody´s job. Everybody thought Anybody could do it, but Nobody realized that Everybody wouldn´t do it.

It ended up that Everybody blamed Somebody when Nobody did what Anybody could have.
T-2.5.1 Middleware tools Security
generic
Applications using information are use by everybody. But:

Develop one off Develop one off Missing tools, middleware: The middleware usage is slightly different to middleware in the operational line. This kind on middleware is involved in operational processes but not having any commitment with them.

A figure:
See right side

Attention, understanding needed for:
  1. External suppliers assumptions & guidelines
  2. Internal infrastructure & guidelines


Technical Section - Holistic
Bia catweazle way Holistic:
Goal: a reliable robust environment for the organisation (I).

Technical Section:
❶ Build enabling doing SIEM.
❷ Build enabling doing SOAR.
❸ Build enabling doing pentesting.
❸ Build enabling doing IAM security for the organisation.
Getting the knowledge and tools is only the first design step.

🕳👁❗ Clear requirements for technical security and IAM .
🕳👁❗ Orchestration activities with responsibilities 💣 👉🏾 frictions.

T-2.5.2 Security Monitoring & Analysing
generic
Monitoring auditing for knowing what is going on, what possible risks are:

dtap layers application A figure:
See right side

Technical Section - Holistic
Bia classic car way Holistic:
Goal: a reliable robust environment (II).

Technical Section:
❶ Run operational SIEM.
❷ Run operational SOAR.
❸ Run operational pentesting.


🕳👁❗ Operational (technical) data usage, beware of hidden compliancy conflicts.
🕳👁❗ The organisational (holistic) compliancy requirements must be clear, 💣 👉🏾 frictions.

T-2.5.3 Identity Access
generic
There is a "Devil´s Triangle" on its own with IAM. Conflicting types of interest:

secure_relate01.jpg A figure:
See right side

👓 click on figure for modelling the relationships and building realizations.


Operational - analytical plane
gentlemen agreement way Holistic:
Goal: a reliable robust secure environment (II).

Technical Section:
❹ Run operational IAM security holistic for the organisation.
❺ Have all three interests orchestrated managed.

Legal:
The three types of IAM interests should get serviced evenly.


🕳👁❗ The three types IAM interests are a complicated challenge, 💣 👉🏾 conflicts.

Elaboration Logical functional security by technology
❶ A Security Information and Event Management system is an application for the SOC Security Operations Center. SIEM (Gartner)
SIEM aggregates the event data that is produced by monitoring, assessment, detection and response solutions deployed across application, network, endpoint and cloud environments. Capabilities include threat detection, through correlation and user and entity behavior analytics (UEBA), and response integrations commonly managed through security orchestration, automation and response (SOAR). Security reporting and continuously updated threat content through threat intelligence platform (TIP) functionality are also common integrations. Although SIEM is primarily deployed as a cloud-based service, it may support on-premises deployment.

SOAR (TechTarget)
While SIEM tools have been around for years, security orchestration, automation and response (SOAR) is the newer kid on the block. This security technology was designed to help businesses better organize internal and external threats and to help speed up the process of triage and incident resolution. SOAR uses AI to better prioritize incident alerts so that SecOps teams know which threats to work on first. SOAR also uses a concept known as playbooks -- prebuilt and automated remediation steps that initiate when certain thresholds are met.

❸ A "Complete guide to penetration testing best practices": Pentest (TechTarget)
Software penetration testing, also called pen testing, discovers flaws, and examines the possible consequences of those defects. The organization can then handle those exploits in a safe, controlled and well-documented manner. Although penetration tests also cover the operation of networks, servers and other hardware, developers and testers bear responsibility for weaknesses at the software level.
Ideally, the software"s design and codebase allow only authorized users access to features and data stores. In practice, however, software comes with a wide range of risks that might leave the application vulnerable. Unauthorized individuals seek out these weaknesses to gain control of the application and access, alter or steal data.
...
Applications rely heavily on the OS for resources, including the UI, storage access and a network interface. OS weaknesses can potentially give a malicious actor control of application behavior or inappropriate access to storage. Consider how an OS manages ports for communication to and from the network. A hacker can use port scanning to detect open ports to attack the system and software. Install all OS security patches to protect applications and data.


❹ What is missing 💣 👉🏾: A good simple approach building a role and attribute based security model for business applications. IAM, PAM (TechTarget)
Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations.
...
Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.

The forgotten or ignored security design:

Confused-2

T-2.6 Maturity 4: business applications in control

From the three ICT, ITC interrelated scopes: Only having the focus on IT4IT, getting a mature Life Cycle Management (LCM) requires understanding an acknowledgment of the layered structure.
Each layer has his own dedicated characteristics.

T-2.6.1 platforms (tools) & operational, analytical planes
technology structure
This is what the serviced organization will use:
Governance structure

T-2.6.2 Deep dives ALC - SDLC
Intra References in twins
SDLC, ALC, is touching almost anything in an ICT environment.
The following is about relationships between processes and information:
Reference Topic <|> Topic Reference
layers deep dive layers, VMAP 👓 deep dive proces data layers data-proces
Dimensions Multiple dimensions layers *stages 👓 Describe Data, Data Administration Data-Admin
ALC type2 Business Apllications - 3GL ALC 👓 Data modelling model-data
ALC type3 Low code Analytics, Business ALC 👓 Deep dive modelling security access-security

Intra References by topics
SDLC, ALC, is touching almost anything in an ICT environment.
The following relationships are here in the mindmap approach:
More links associated - entry/exit
Is used at:
👓 threats for data & tools Proces Life Cycle.
👓 Machine supported develop Change ML AI.
👓 threats for data & tools Proces Life Cycle.
👓 resulting Life Cycle ALM, business Life Cycle.
Details to be found at:
👓 Business Intelligence,Analytics .
👓 Data Information Flow.
👓 Meta data Naming - versions.
👓 Math Software engineering.

T-2.6.3 Maturity Planes: Technology, Operational, Analytical
Maturity technology structure
A process can be build from scratch, starting with acquiring hardware or from change requests driven by optimization analyses.
There will be always either a technical debt or functional debt or both. It is not possible to have all artifacts up to date to latest moment.

Start building by acquiring hardware:
Z lifecycle ❶ Have machines Ordered (green)
❷ Start with development on a verified delivered production machine (hardware).
❸ Build up the operating system, middleware - tools.
❹ Verify the goal for business (blue and/or analytics (orange) infrastructure (green) is ready for production.

⚠ Enabling Maintenance is not mandatory part of the activity.

👓 click on the figure for Jabes maturity technology.
Note: ❗⚠ Business production information (blue) is always used for analytics (orange).
These three layers are a source for 💣 conflicts by misunderstandings and ignorance.

Maintaining and changing what is operational, is more challenging:
revZ lifecycle ❶ Learn from analytics (orange) what to change in the production environment.
  The change can be business processes (blue) and/or technology (green).
❷ Change business logic & information in the two DTAP segregated lines code/data (blue)
❸ Change Set up machines (green) according to external requirement and / or internal ones

⚠ Maintenance, DTAP deployments, must be enabled its a mandatory with the activity

👓 click on the figure for Jabes maturity technology.
Note: ❗⚠ Business production information (blue) is always used for analytics (orange).
These three layers are a source for 💣 conflicts by misunderstandings and ignorance.

Maturity Attention Points
Attention points for maturity level considerations & evaluations:
Maturity id SubId Source Context
CMM-4IT-4 Tools, Middelware
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C4 T-2.3.3 Data / Information provisioning Data governance
C5 T-2.3.1 ALC middleware Technology
I5 T-2.3.1 ALC middleware Technology
A5 T-2.3.1 ALC middleware Technology
C6 T-2.5.3 Identity Access Security
S1 T-1.6.2 Incentives, Culture, Structure, Resources Structure
CMM-4IT-5 Operational plane
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C5 T-2.3.1 ALC middleware Technology
I5 T-2.3.1 ALC middleware Technology
A5 T-2.3.1 ALC middleware Technology
C6 T-2.5.3 Identity Access Security
S1 T-1.6.2 Incentives, Culture, Structure, Resources Structure
CMM-4IT-6 Analytical plane
C1 T-2.2.1 ALC-V1 Technical Data governance
C2 T-2.2.2 ALC-V2 Technical Data governance
C3 T-2.2.3 ALC-V3 Technical Data governance
C5 T-2.3.1 ALC middleware Technology
I5 T-2.3.1 ALC middleware Technology
A5 T-2.3.1 ALC middleware Technology
C6 T-2.5.3 Identity Access Security
S1 T-1.6.2 Incentives, Culture, Structure, Resources Structure


📚 T.2.6.4 External references
Global compliancy
These references are at the index, they are a shared interest.

Local SDLC
The focus is on the technical engineering life cycle.
A limited list:
link , newstopic interest who, source date
BIDM - The Business Intelligence Development Model Marco Spruit, Catalina Sacu 201001, 202106
Waterfall Process M.Fowler process theory - bad things
Managing the development of large software systems Winston W.Royce (wikipedia) process theory - 1987
Reducing Lead Time 4 - Development Winston W.Royce Concurrent Engineering - 2021
A Solid Foundation for Business Agility with Disciplined Agile PMI The PMBOK® Guide-our flagship publication

T.2.6.5 Intermediate Advice
Disciplined Agile
Solving the issues at "T-1.6.2 Incentives, Culture, Structure, Resources".
  1. requires: understanding and translations of requests "T-2.1 ALC types "
  2. requires: understanding the SDLC engineering misperception.
  3. goal for adding value, understanding value stream with assembly lines.
  4. goal for adding value, an organisational culture supporting the mission values.

Agile, no design
There is blame game going on. Simplistic agile is failing at large systems. Get basics understanding of the theory and root causes of the problem. When there are logic fundamental dependencies it is nonsense to ignore those dependencies.

Unless you have a lot of money and the goal is a decorative one, usefullness requires welel designed strcutures.
Winchester House (wikipedia)
She was known to rebuild and abandon construction if the progress did not meet her expectations, which resulted in a maze-like design. In the San Jose News of 1897, it was reported that a seven-story tower was torn down and rebuilt sixteen times. As a result of her expansions, there are walled-off exterior windows and doors that were not removed as the house grew in size. Multiple levels, up to five, were added to different parts of the home. The design was essentially Victorian, with elements of Gothic and Romanesque features.
🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🔰 Contents TechRole M&CInf TechInf FuncInf CMM3-4IT 🔰


T-3 SDLC - Business Intelligence & analytics - Jabes


advice request Pythia

T-3.1 Descriptive Business intelligence

Understanding what is going on what with all uncertainties and possible future scenarios is an everlasting quest. A pitty when answers are 💣 multi interpretable with not understood effects.

EIS, DSS systems is what BI&A (business Intelligence & analytics) is about.
Building up in mind set complexity:

T-3.1.1 Context difference: functional 👁 technical
Business demo J.Dietz
Component: Enterprise Ontology 101
There is a claim of a "single version of the truth" for describing something what is going on for achieving a goal. The problem is several people are having a different perspective on the goal an the context of actions.

Multiple interpretations of an element.
This is a different understanding in metadata, ontology. In a document dated 2006 enterprise engineering J.Dietz an example is given.
  1. Strategy goal: transport of person(s).
    • From location A to location B.
    • Applicable transport option: a car.
  2. Car driver goal: using a car enabling going from A to B.
    • Needing information for useable roads.
    • Expected behaviour of the car.
    • How to avoid unwanted situations during transport.

ymap sdlc Wanting to use functions:
❷ lights,
❸ wheels (includes steering),
❹ brakes,
❺ motor.
  1. Car technician goal: having the car workable for the driver.
    • Adjusting technical implementations as far as possible on requests by the driver.
    • Only the way it should behave explaining to the driver.
ymap sdlc Creating and maintaining:
❷ lights,
❸ wheels (including steering),
❸ brakes,
❹ motor.
Closing the gap: functional 👁 technical
😱 The common complaint is a mis alignment between ICT and business people. Not using the same language not using understandable words for the both worlds is not understanding by design. Most surpising: nobody is acting on this.
💡 Have a glossary and data dictionary in place.

T-3.1.2 BI&A Data governance
Using the rear-view mirror
DMBOK segmentation
DMBOK - segmentation perspectives

Mission: DAMA International´s primary purpose is to promote the understanding, development and practice of managing data and information as key enterprise assets to support the organization.
⚠ Not every segment needs to get filled. DWH & BI, data quality and data science are not standard operational processes. The analytical plane is conceptual different from the operational plane. Data mesh is a new old concept.
💣 Data security with the idea getting "solved by the DBMS" is far too limited. A DWH, data lake, data lake house none of them have security by design. Worse securing information is not a topic in the world of analytics.

Looking ahead
Engineering an enterprise is more than an defining a list of "best practices" of what is usual being done.
Switching from what everyone else is doing and what everyone else did into a next step, innovation.
💣 Be aware: You should not innovate when there is no business case for it.
⚠ Just doing what everyone is doing requires knowledge sharing: "how to do".

T-3.1.3 The question for descriptive analytics
Needing descriptive reports
In the holistic nine-plane with all the processes there are many interactions. Every interaction is a key role in process cycles for:
dtap layers application A figure:
See right side

Available standard descriptive reports
⚠ What is out of the box present: nothing.
Ad hoc, local developped solutions not controlled by ICT is usual.
💡 Idea: room for improvement, innovative options to standards with reports.

Elaboration Disciplined Agile
There is no natural conflict between Agile and serial approaches. PMI - DA (Predictability)
Disciplined teams strive to improve their predictability to enable them to collaborate and self-organize more effectively, and thereby to increase the chance that they will fulfill any commitments that they make to their stakeholders. ...
To see how to improve predictability, it is often useful to see what causes unpredictability, such as technical debt and overloaded team members, and to then attack those challenges.

When the project is small enough to handle in a foreseeably timeframe. PMI - DA (V-Model)
Serial life cycle initiatives expect to take advantage of high certainty around firm requirements, a stable team, and low risk. As a result, project activities execute in a linear manner
...
To achieve this approach, the team requires detailed plans to know what to deliver and how. These projects succeed when other potential changes are restricted (e.g., requirements changes; project team members change what the team delivers).

advice request Penelope

T-3.2 Question: Eis Descriptive or Predictive?

Executive Information systems (EIS), decisions support systems (DSS) is what BI&A (business Intelligence & analytics) is about.
Building up complexity by mind set:
To help in decision makers, report: Let the decision maker make up his mind.

T-3.2.1 Big data - BI&A
Descrpitive or predictive?

Big Data
A nice view on this, "The big data journey rivisited" Bill Schmarzo 2016.
emc big data storymap

T-3.2.2 Maturity Bi&A
The closed loop
The closed loop cycle, from knowing what is going on into strategic decisions vice versa, is the ultimate goal.
BIDM (C.Sacu M.Spruit 2010)
BI analytics is integrated or not in the business process can strongly affect the decision making process. Hence, we consider this category to be a very important one when delimiting a maturity stage
  1. initiation (user driven - activity initiated by the user, process driven - activity initiated by a process)
  2. process integration (data centric - BI analytics is usually supported by a data warehouse, process centric - BI analytics is integrated in the business processes)
  3. processing model (store and analyze; analyze and store)
  4. event stream processing
  5. "closed-loop" environment
Business Intelligence Development Model
data driven BI&A
The BIDM paper was written in the era of placing the DWH as the technical solution. That should change with the fast evolvement of analytics. Machine learning (ML) is a first step.
💡 Idea: use data mesh with the ALC-V3 for information processing data products.

T-3.2.3 BI&A, SIAR panopticon
data driven BI&A
The SIAR model is the highest abstraction of processes in many dimensions. With four stages in four quadrants the holistic overview is placed in the middle. In the highest abstraction the middle (center) is symbolised an eye.
An intermediate of the SIAR abstraction:
9 plane BI&A panopticon
A figure:
See right side

S South: Situation, Steer
I West: Input, Ideas
A North: Actions, Analyse
R East: Result, Request

elaboration enterprise engineering
The pyramid of demo is reversed to fit into the circle.
Human actors possess three abilities (generic competences) in coordination and production:


change and threats about save place

T-3.3 Compliant Processes

In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Governance, risk management, and compliance are three related facets that aim to assure an organization reliably achieves objectives, addresses uncertainty and acts with integrity.

International standards such as ISO/IEC 27002 to help organizations meet regulatory compliance with their security management and assurance best practices.
T-3.3.1 Compliant data driven data processes
The functional compliancy gap 👁
Compliancy should be part of the SDLC, controlled by the business process accountable ones.
There are many unsolved challenges. See: All involved artifacts in a chain are important. Leaving something out by not knowing or ignoring can break all other efforts.
💡 Idea: make compliancy an indispensable part of the complete SDLC cycle.

The functional location of compliancy
There are several locations for compliancy. During the SDLC of a process:
The data driven process in a figure:


A horizontal line West-East touches the points in the circular process for compliancy reviews.

👓 Click figure for context.
T-3.3.2 Compliant process requirements
Information Source
Compliancy requirements are only informational documents. That information should become indenpensible parts of the operational processes in the protfolio. The following el that enables the flow into the portfolio:
A model that enables the flow into the portfolio as a figure:
Jabes process Assurance
Source into realisations
💡 Use the information holistic in realisations. Verification of requirements are included.

T-3.3.3 Holistic relation connections with compliancy
The holistic nine-pane and Technical nine-plane
The principles of approaches are similar but differ in details.

"Planning & Scheduling" ( T-1.4.3 On Prem Software / T-1.5.3 SAAS, Software as a Service). Differences:
  1. Holistic:
    • Steer - Tactical: Functional accountability for processes
    • Steer - Operational: Functional accountability for schedules
    • Serve - Operational: Technical responsibility for schedules
    • Serve - Tactical: Technical responsibility for processes
  2. Technical:
    • Steer - Operational: Technical responsibility for schedules
    • Steer - Tactical: Functional accountability for schedule tool
    • Serve - Tactical: Technical accountability for schedule tool
    • Serve - Operational: Functional responsibility for schedule tool

dtap layers application A figure:
See right side

Elaboration data driven process
The evolution from solving "data LCM layers" is not immediate obvious.
👓 Click for jumping into context.

The visualisation was made without "value stream", without "pull push" in mind. Started with crisp-dm a full circle with all three activities from business request, model building, model deployment was made. Requirements for LCM shown:
Topics included:

jabes save point

T-3.4 Jabes - Build & Run

💡 A tool helping in managing the change, operations doing knowledge assurance is recommended. The most logical step is installing a product available on the market.
There is an issue:

T-3.4.1 Delivering a product in a cycle
generic
See a customer entering with a request.
The usual flow:
Jabes generic process
A figure:
See right side

Hierarchical control
Use the SIAR model in a hierarchical approach, business within the business.
T-3.4.2 Data models used in a product cycle
generic
The metamodel covers all elemements in three layers: Servicing the life cycle stages. Innovation or solving known issues needs a defined "backlog". This is assigned to " plan - enable" The "backlog" items should be made clear enough and well understood to define requirements in the same three layers.
Jabes product
A figure:
See right side

Hierarchical control
Use the SIAR model in a hierarchical approach, business within the business.
T-3.4.3 Changing the product in a product cycle
generic
BEcome a customer with the request to change the product.
The flow:
This is not possible in a single cycle, many cycles are needed.
Jabes product
A figure:
See right side

Hierarchical control
Use the SIAR model in a hierarchical approach, business within the business.
elaboration
❶ Part of the proposal is a framework.
Using this framework a clear structured definition of generic steps with a portfolio becomes possible.
Goal: open shared knowledge.

❷ Licensing a product or running it as a services (SAAS) is a business model.

❸ Evaluating maturity external is a product, a business model.
jabes save point

T-3.5 Jabes - Use Portfolio management

💡 A tool helping in managing the change, operations doing knowledge assurance is recommended. The most logical step is installing a product available on the market.
There is an issue:

T-3.5.1 Data model, stage: Information delivery
generic
There are three levels to orchestrate for the realisation:
There are three area´s of interest to orchestrate for the realisation:
The goal with the delivery: to correct agreed locations, agreed quality of information.
Jabes process Assurance
A figure:
See right side

Mind set change
Don´t micro manage everything. Have the requirements for adequate tooling in place an let the workforce do their work.
T-3.5.2 Data model, stage: Information transformation
generic
There are three levels to orchestrate for the transformation:
There are three area´s of interest to orchestrate for the transformation:
The goal with the transformation: transform the retrieved source materials of information into a new product of information. Use the conforming assembly instructions and validate the expectations of levels of quality are met.
Jabes process Assurance A figure:
See right side

Mind set change
Don´t micro manage everything. Have the requirements for adequate tooling in place an let the workforce do their work.
T-3.5.3 Data model, stage: Information gathering
generic
There are three levels to orchestrate for the realisation:
There are three area´s of interest to orchestrate for the realisation:
The goal with the material retrieval: get from correct agreed locations agreed quality of information.
Jabes process Assurance A figure:
See right side

Mind set change
Don´t micro manage everything. Have the requirements for adequate tooling in place an let the workforce do their work.
elaboration
❶ Part of the proposal is a tool.
Using this tool a usage of a clear structured definition of generic steps with a portfolio becomes possible.
Goal: sharing detailed product knowledge for the workforce.

❷ Licensing a product or running it as a services (SAAS) is a business model.

❸ Evaluating maturity external is a product, a business model.
Confused-2

T-3.6 Maturity 5: BI&A in control

BI&A, business intelligence & analytics is understanding what is going on so understandable improvement proposals are getting options.
From the three ICT, ITC interrelated scopes: Only having the focus on IT4IT, getting a mature Life Cycle Management (LCM) requires understanding an acknowledgment of the layered structure.
Each layer has his own dedicated characteristics.

T-3.6.1 Mindset prerequisites
Situation Input Actions Results, SIAR lean structured processing
The Siar model
covers all of:
The model mindset is used over and over again.
6W 1H
The SIAR model is the highest abstraction for an retrospective for the questions:
six W one H, center: Why
T-3.6.2 Combining internal & external services
Getting tools, middleware is usually done by purchasing.
Building in house what is generally available for lower cost more functionality better quality, doesn´s makes sense.
Triangle BPM SDLC BIANL - unequal power lines
Configuring it correctly is still the hardest part of the job. ❗ This is an internal accountablity not an external one.

All three lines in the organization:
❶ business support & facilities,
❷ operational processing technology,
❸ analyzing optimizing,
have to be serviced.

Middleware, tools lives in a VUCA world. Brittle Anxious Non-linear Incomprihensible (Bani) are possible effects to manage.

👓 click on the figure for Jabes maturity technology.

Explanation headings:

Maturity id SubId Source Context
CMM-4IT-7 Up to date
S1 T-3.1.1 Context difference: functional ๐Ÿ‘ technical Structure
C5 T-3.2.3 BI&A, SIAR panopticon Technology
I5 T-3.2.3 BI&A, SIAR panopticon Technology
A5 T-3.2.3 BI&A, SIAR panopticon Technology
CMM-4IT-8 Cots vs "build"
S1 T-3.1.1 Context difference: functional ๐Ÿ‘ technical Structure
C1 T-2.2.1 ALC-V1 Technical Data governance
C5 T-3.2.3 BI&A, SIAR panopticon Data governance
I5 T-3.2.3 BI&A, SIAR panopticon Data governance
A5 T-3.2.3 BI&A, SIAR panopticon Data governance
S2 T-3.5 Jabes - Use Portfolio management Structure
CMM-4IT-9 Regulations
S1 T-3.1.1 Context difference: functional ๐Ÿ‘ technical Structure
I1 T-3.1.1 Context difference: functional 🕳 technical human understanding
I2 T-3.1.2 BI&A Data governance Look ahead
I3 T-3.1.3 The question for descriptive analytics measure
I4 T-3.2.2 Maturity Bi&A closed loop
C5 T-3.2.3 BI&A, SIAR panopticon Compliancy
I5 T-3.2.3 BI&A, SIAR panopticon Compliancy
A5 T-3.2.3 BI&A, SIAR panopticon Compliancy
S2 T-3.5 Jabes - Use Portfolio management Structure


T-3.6.3 Summary Advice
Disciplined Agile
Understand the need for solving the issues by "T.2.6.5 Intermediate Advice".
To manage strategical are:
  1. decrease misunderstanding by a shared glossary - dictionary: "T-3.1.1 Context difference: functional ๐Ÿ‘ technical"
  2. Get the management executive information to a closed loop "T-3.2.2 Maturity Bi&A"
  3. support for compliant processes: "T-3.3.2 Compliant process requirements" into "T-3.3.3 Holistic relation connections with compliancy"
  4. support for knowledge assurance during the life cycle of compliant processes: "T-3.4 Jabes - Build & Run".

T-3.6.4 Following steps
Missing link design bianl design bpm devops bpm devops sdlc devops bianl The organisation powered by ICT in a ship like constellation. The engines (data centre) out of sight below visibility. Serving multiple customers (multi tenancy) for the best performance and the best profits on all layers.

There are six pillars in a functional and technical layer. Within the the three internal pillars linked access is possible by an imagemap over the given figure.

When wanting going logical forward:
🔰 BiAnl forward

🎯 C-BI&A C-Ftr C-Gov Run Jabes Use Jabes CMM5-4IT 🎯
  
🚧  T-ALC F-ALC Platforms T-CIA Security CMM4-4IT 🚧
  
🔰 Contents TechRole M&CInf TechInf FuncInf CMM3-4IT 🔰

© 2012,2020,2024 J.A.Karman
🎭 Concerns & Indices Elucidation 👁 Summary Vitae 🎭