Results 131 to 140 of about 2,576 (159)
Enterprise Architecture Planning for Balikpapan Environmental Services Using TOGAF ADM [PDF]
Soleh ARDIANSYAH +3 more
openaire +1 more source
Enhancing Serious Game Design: Expert-Reviewed, Stakeholder-Centered Framework.
Bunt L, Greeff J, Taylor E.
europepmc +1 more source
Enterprise Architecture Design at PT PerkebunanKaltim Utama Using TOGAF ADM
Agus Ganda Permana +3 more
openaire +1 more source
PERENCANAAN ARSITEKTUR ENTERPRISE PADA PT ZAMARAYA ASTRIN MENGGUNAKAN TOGAF ADM
Margaretha Sakalessy, Christ Rudianto
openaire +1 more source
Сучасні архітектури та моделі забезпечення електронної взаємодії складних інформаційних систем [PDF]
Слепченко, Олександр Петрович
core
Gurobaru kigyo no tame no risuku manejimento o koryoshita tekiogata togo dejitaru akitekucha furemuwaku [PDF]
Masuda, Yoshimasa +2 more
core +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Blueprint of Smart Campus System Using TOGAF ADM
2020 6th International Conference on Computing Engineering and Design (ICCED), 2020This study aims is obtain a blueprint or architectural smart campus system in the form of candidate data, the candidate of the system/application, application portfolio, to roadmap implementation. One of the methods that is widely used for the development of the model of enterprise architecture today is the TOGAF ADM.
Rintho Rante Rerung +3 more
openaire +3 more sources
Data-driven enterprise architecture and the TOGAF ADM phases
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016This paper investigates how Data as a disruptive technology could be integrated into TOGAF. Given the recent attention of Big Data and Data Science as disruptors, this paper investigates what the impact on the enterprise could be and how Enterprise Architecture (EA) should accommodate data to enable data-driven EA. There is no model currently available
Carike Kearny +2 more
openaire +3 more sources
Definition of cybersecurity businness framework based on ADM-TOGAF
2015 10th Iberian Conference on Information Systems and Technologies (CISTI), 2015In this paper a set of activities and steps that are required to implement a framework enterprise cybersecurity is proposed, for which, is taken as a reference to Method of Architectural Description ADM-TOGAF and its integration with SABSA methodology enterprise Security, which define a set of iterative phases adapted cybersecurity standards defined in
H. Danilo Jaramillo +4 more
openaire +3 more sources

