Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Realize Enterprise Architecture with AWS and SAFe

You're reading from   Realize Enterprise Architecture with AWS and SAFe A comprehensive, hands-on guide to AWS with Agile and TOGAF

Arrow left icon
Product type Paperback
Published in Sep 2022
Publisher Packt
ISBN-13 9781801812078
Length 304 pages
Edition 1st Edition
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
Rajnish Harjika Rajnish Harjika
Author Profile Icon Rajnish Harjika
Rajnish Harjika
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1 – Enterprise Architecture Foundation and Implementation
2. Chapter 1: Core Foundation for Building an Enterprise IT Architecture FREE CHAPTER 3. Chapter 2: Defining Core Foundation and How to Get It Right 4. Chapter 3: Applying Enterprise Architecture to the AWS Cloud 5. Part 2 – Enterprise Architecture Frameworks
6. Chapter 4: Available Frameworks for an Enterprise Architecture 7. Chapter 5: AWS Prescriptive Guidance Frameworks 8. Chapter 6: TOGAF Framework in Action with AWS 9. Part 3 – SAFe in EA and the Cloud
10. Chapter 7: Align and Scale Agile Framework with Enterprise Architecture 11. Chapter 8: SAFe Implementation for AWS Cloud Migrations 12. Part 4 – Setting Up an EA
13. Chapter 9: Setting Up an Enterprise Architecture Practice 14. Chapter 10: Conclusion 15. Index 16. Other Books You May Enjoy

The enterprise architecture approach

IT portfolios can be standardized so that enterprise architects can avoid obsolescence by using technology architecture management. Technologies are inventoried with vendor and life cycle information (release date, end of life, and so on) that’s been obtained from existing Customer Managed Databases and cleansed. A normalization tool can streamline technology names when there are multiple sources of information. A technology life cycle database and technology inventory may also be compiled from external libraries.

After that, they conduct the following procedures:

  • Pick the technologies that will be evaluated as standards, based on feedback from developers, architects, and risk managers.
  • Decide whether to rate the vendor based on its ability to support applications, its business capabilities, or its vendor dependency.
  • Throughout the various stages of a technology’s life cycle, its status can be updated:
    • Envisioning...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime