Basic Enterprise Architecture Methodology (BEAM)

67
One World Information System One World Information System Basic Enterprise Architecture Methodology (BEAM) Http://one-world-is.com/beam Roy Roebuck (703) 598-2351 [email protected] One World Information System (OWIS) This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Noncommercial use and extension of BEAM is allowed as described in this Creative Commons license. Commercial use of BEAM requires purchase of one or more types of low-cost BEAM Licenses for Service Provider, and Value-Added Reseller (VAR) BEAM use. BEAM licenses are available from One World Information System as indicated on a subsequent page of this presentation. 2/19/2004 5:17 PM The Basic Enterprise Architecture Methodology (BEAM) is a public-licensable subset of the General Enterprise Management (GEM) methodology of One World Information System. What is the General Enterprise Management (GEM) methodology? GEM provides an integrated and continuously evolving “Table of Contents” and “Index” to your enterprise, as it is, was, and is intended to be. BEAM builds this enterprise Table of Contents and Index, and helps establish the GEM mechanisms which integrate them, use them for security management, expertise management, and situational awareness, and keep them up to date. Why use GEM? How many organizational Executives, Senior Managers, Managers, Workers, Staff, etc., wouldn’t like the right information they need to do their jobs well and make good decisions, to be provided to them in the way it is need, when it is needed. GEM can help your enterprise, whether Government, Commercial, Non-Profit, Community, or Individual, to attain just that capability. BEAM is a detailed procedure for defining an enterprise architecture that is intended to be conformant with the evolving U.S. Federal Enterprise Architecture (FEA) being defined by the FEA Program Management Office (PMO) of the U.S. Office of Management and Budget (OMB). BEAM predates and is a superset of the popular Zachman Framework for EA, the Spewak EA Planning methodology, and the DoD Architecture Framework. BEAM is intended to provide the foundation for full enterprise management, leveraging the BEAM extension of typical EA structure and content as the start point of an enterprise knowledge base. BEAM supports ISO 9000 Quality efforts in the enterprise, along with other “maturity” efforts such as the five maturity levels of Software Engineering Institute’s Software, System, Acquisition and other Capability Maturity Model (CMM) and CMM-Integrated (CMMI) efforts. BEAM specifically supports the ISO 9000 – Eight Quality Management Principles: 1. Customer Focus 2. Leadership 3. Involvement of People 4. Process Approach 5. System Approach to Management 6. Continual Improvement 7. Factual Approach to Decision Making 8. Mutually Beneficial Supplier Relationships Training and support on BEAM is available from One World Information System (OWIS) and licensed GEM Service Providers.

Transcript of Basic Enterprise Architecture Methodology (BEAM)

Page 1: Basic Enterprise Architecture Methodology (BEAM)

1

One WorldInformation

System

One WorldInformation

System

Basic Enterprise Architecture Methodology

(BEAM)Http://one-world-is.com/beam

Roy Roebuck(703) 598-2351

[email protected] World Information System (OWIS)

This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California

94305, USA. Noncommercial use and extension of BEAM is allowed as described in this Creative Commons license.

Commercial use of BEAM requires purchase of one or more types of low-cost BEAM Licenses for Service Provider, and Value-Added Reseller (VAR) BEAM use. BEAM licenses are available from One World Information System as indicated on a subsequent page of this

presentation.

2/19/2004 5:17 PM

The Basic Enterprise Architecture Methodology (BEAM) is a public-licensable subset of the General Enterprise Management (GEM) methodology of One World Information System.

What is the General Enterprise Management (GEM) methodology? GEM provides an integrated and continuously evolving “Table of Contents” and “Index” to your enterprise, as it is, was, and is intended to be. BEAM builds this enterprise Table of Contents and Index, and helps establish the GEM mechanisms which integrate them, use them for security management, expertise management, and situational awareness, and keep them up to date.

Why use GEM? How many organizational Executives, Senior Managers, Managers, Workers, Staff, etc., wouldn’t like the right information they need to do their jobs well and make good decisions, to be provided to them in the way it is need, when it is needed. GEM can help your enterprise, whether Government, Commercial, Non-Profit, Community, or Individual, to attain just that capability.

BEAM is a detailed procedure for defining an enterprise architecture that is intended to be conformant with the evolving U.S. Federal Enterprise Architecture (FEA) being defined by the FEA Program Management Office (PMO) of the U.S. Office of Management and Budget (OMB). BEAM predates and is a superset of the popular Zachman Framework for EA, the Spewak EA Planning methodology, and the DoD Architecture Framework. BEAM is intended to provide the foundation for full enterprise management, leveraging the BEAM extension of typical EA structure and content as the start point of an enterprise knowledge base.

BEAM supports ISO 9000 Quality efforts in the enterprise, along with other “maturity” efforts such as the five maturity levels of Software Engineering Institute’s Software, System, Acquisition and other Capability Maturity Model (CMM) and CMM-Integrated (CMMI) efforts. BEAM specifically supports the ISO 9000 – Eight Quality Management Principles:

1. Customer Focus2. Leadership3. Involvement of People4. Process Approach5. System Approach to Management6. Continual Improvement7. Factual Approach to Decision Making8. Mutually Beneficial Supplier Relationships

Training and support on BEAM is available from One World Information System (OWIS) and licensed GEM Service Providers.

Page 2: Basic Enterprise Architecture Methodology (BEAM)

2

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

2

One WorldInformation

System

One WorldInformation

SystemPresentation Outline1. BEAM Concepts2. Executive Overview

What are BEAM, GEM, and EMM and why are they valuable? GEM Facts/History and Claimed BenefitsWhat are the costs of BEAM?

3. Technical OverviewWhat is the BEAM process?

4. BEAM Procedures5. Standards/Technology Supporting BEAM6. Products Supporting BEAM7. BEAM Implementation Project Plan Samples8. BEAM Solution Scenarios9. Summary

Page 3: Basic Enterprise Architecture Methodology (BEAM)

3

One WorldInformation

System

One WorldInformation

System

1. BEAM Concepts

Page 4: Basic Enterprise Architecture Methodology (BEAM)

4

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

4

One WorldInformation

System

One WorldInformation

SystemBEAM Glossary• Enterprise: A purposeful (i.e., goal seeking) endeavor.

• Architecture: The orderly arrangement of parts within an endeavor. The structure of endeavor components and their interfaces, and the description and diagramming of this structure and its properties.

• Capability: A talent or ability that has potential for development, deployment, and use/reuse.

• Management: The purposeful resolution of complexity, inconsistency, and chaos in science, society, and perception into a system of controlled order.

Here are some of the “common terms” underlying BEAM.

Page 5: Basic Enterprise Architecture Methodology (BEAM)

5

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

5

One WorldInformation

System

One WorldInformation

SystemWhat and Why - Enterprise Architecture?• What is EA:

– Enterprise Architecture is: • An inventory of the identified “components” of an organization within its environment of customers, suppliers, authorities, and partners• A blueprint mapping the component relationships• Detailed descriptions of the components and relationships• A governance process to control the accuracy, timeliness, and fitness-to-enterprise-purpose of the component inventory and blueprint• Reference-to and/or use-of external component standards and categories in the blueprint when appropriate• Application of the EA as a top-level map for more detailed organization resource maps of IT, Facilities, Supplies, Services, Skill Sets,

Funds, etc.• A mental map that everyone works from in their various enterprises – it’s usually not communicated fully or consistently with

associates to improve coordination and collaboration• Why perform EA?

– A formal (i.e., documented, shared, and controlled) EA is a sign of good, mature, and responsible management• EA is used for engineering of management• Management without EA is management as a craft – perhaps creating beautiful results, but not repeatable or easily maintainable• Would you build, rebuild, or renovate a house (i.e., your organization’s capabilities) without a blueprint?• Would you rather build/rebuild/renovate/maintain your house from common or unique components?• Would you rather have your blueprints maintained over time or redrawn from scratch any time a change was needed?

– EA is mandated by OMB to support:• Clinger-Cohen Act (CCA) for IT resources• Federal Investment Budgeting (Exhibits 300 and 53) for any resource initiative• President’s Management Agenda (PMA) Enhanced eGovernment Initiative• Government Paperwork Elimination act (GPEA)• Government Performance and Result Act (GPRA)

Page 6: Basic Enterprise Architecture Methodology (BEAM)

6

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

6

One WorldInformation

System

One WorldInformation

SystemHow Enterprise Architecture?• How to perform EA

– Follow OMB Federal EA Guidance where available (only 60% complete as of Sep 03)– Follow broad concepts provided by CIO Council extension to Zachman Framework (describing what EA is, but not

how to perform it) – Fit EA activities within existing operations where possible to reduce duplicative and fragmented efforts to collect

and organize EA data– Find, buy, or develop a procedure to walk the organization, its managers, and its workforce through the EA

process that will consistently produce and maintain a FEA compliant enterprise architecture

Page 7: Basic Enterprise Architecture Methodology (BEAM)

7

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

7

One WorldInformation

System

One WorldInformation

System

Basic Enterprise Architecture Methodology –What and Why

• What is BEAM?– BEAM is a detailed workflow procedure to step the organization through a comprehensive

EA development, operation, and maintenance process, as part of a larger workflow procedure for whole-organization life cycle management

– BEAM is released under a public license for noncommercial use (e.g., free for non-outsourced use by government, academic and other organization)

• Why use BEAM?– BEAM is the only full EA methodology (i.e., workflow procedure) available, commercially or

otherwise– BEAM provides the means for simultaneous FEA, CCA, GPRA, GPEA, CMM/CMMI, and

ISO-9000 compliance– BEAM supports all five government-wide initiatives of the PMA– BEAM is based on over two decades of operational research and experience in government

and industry– Every typical medium to large organization is already performing the activities within the

BEAM workflow – BEAM primarily organizes and integrates these activities’ operations, controls, and data

– BEAM can be performed by internal resources and/or by commercial/contracted/outsourced resources

Page 8: Basic Enterprise Architecture Methodology (BEAM)

8

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

8

One WorldInformation

System

One WorldInformation

System

Basic Enterprise Architecture Methodology –How?

• How to use BEAM?– Register for free BEAM non-commercial use– Specify BEAM as your required EA methodology in your EA Contracts and Task Orders– Receive authorized training on BEAM or find a licensed commercial BEAM service provider– Assign or acquire technology to support BEAM– Implement a BEAM project for the first EA cycle (Example Project)

• Site Survey Task – 1 month• Initial Business Architecture and EA Business Case Task – 2 more months• Full Business Architecture (BRM + PRM) Task – 2 more months• Full EA (BRM, PRM, SRM, DRM, TRM) Task – 4 more months

– Implement recurring BEAM operations workflow for subsequent EA maintenance– Extend BEAM for other business function activities and applications

• A76 sourcing studies• Feasibility Studies• Impact Analyses• Security Management (role-based asset distribution and access control, e.g., to support Sarbanes-Oxley Act, Information

Assurance, Privacy Act)• Contingency Management• Continuity Management• Vulnerability/Risk Management• Knowledge management• Human Capital Improvement (Expertise Management, Expertise On-Call Collaboration, Skills Inventory, Skills

Requirements, Training Management)• Budget/Performance Integration• Improved Financial Management and Reporting (Roll-up and Drill-Down to/from any level, for any subject/expense-

element)• Enterprise Application Integration (Workflow, Web Services)• Enterprise Information Integration (Virtual databases, user-customized views of enterprise data)

– GEM extensions of BEAM (Commercial Service and Support from licensed GEM Service Providers)• Integrated above BEAM extensions with enterprise Operations workflow based in dynamic enterprise intelligence

– 8 more months after BEAM• Integrated enterprise Value-Chain (e.g., supplier/customer chain) workflow and real-time situational awareness - 8

final months for first GEM iteration• Continuing GEM operations workflow with dynamic intelligence

Page 9: Basic Enterprise Architecture Methodology (BEAM)

9

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

9

One WorldInformation

System

One WorldInformation

System

EA as Color By The Numbers – Consistency and Simplicity is Needed!

1.1. Inventory, ID, and Arrange

Business Functions,

Organizations, and Locations

2.1. Inventory, ID, and Organize

Functional References, Data, Tools/Technology,

and Standards

1.2. Identify and ID the Assignment of

Functional Responsibility

2.2. Inventory, ID, and Organize

Goals, Objectives, Performance

Measures, and Strategies

2.3. Inventory, ID, and Organize Funded and

Unfunded Plans for Recurring

Operations and New Initiatives

2.4. Collect identified EA information

3.1. Perform Function, Program,

and Project Activities

3.2. Monitor, Assess, Report,

and Adjust Performance

3.3. Monitor, Assess, Report,

and Adjust Enterprise

1. Map the organization and its environment2. Map the organization operations and resources3. Perform and improve resource management and operations

1

2

3

High Level BEAM Process Steps1. Map the organization and its environment1.1. Inventory, ID, and Arrange Business Functions, Organizations, and Locations1.2. Identify and ID the Assignment of Functional Responsibility2. Map the organization operations and resources2.1. Inventory, ID, and Organize Functional References, Data, Tools/Technology, and

Standards2.2. Inventory, ID, and Organize Goals, Objectives, Performance Measures, and Strategies2.3. Inventory, ID, and Organize Funded and Unfunded Plans for Recurring Operations and

New Initiatives2.4. Collect identified EA information3. Perform and improve resource management and operations3.1. Perform Function, Program, and Project Activities3.2. Monitor, Assess, Report, and Adjust Performance3.3. Monitor, Assess, Report, and Adjust Enterprise

Page 10: Basic Enterprise Architecture Methodology (BEAM)

10

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

10

One WorldInformation

System

One WorldInformation

System

What Basic Enterprise Architecture Methodology Integrates and Why

Extend and Customize BEAM for:

Y

Y

Y

Y

Y

Y

Y

Y

Human Capital

Improvement

IT SecurityBusiness Process Analysis

IT Architecture

Budget and Performance

Strategic Plan

FEABEAM Activity

YYYY9. Monitor, Assess, Report, and Adjust Enterprise

YYYY8. Monitor, Assess, Report, and Adjust Performance

YYYYTRM7. Perform Function, Program, and Project Activities

YYYYYFEA6. Collect identified EA information

YYYYPRM, TRM5. Inventory, ID, and Organize Funded and Unfunded Plans for Recurring Operations and New Initiatives

YYYYPRM4. Inventory, ID, and Organize Goals, Objectives, Performance Measures, and Strategies

YYYBRM, TRM3. Inventory, ID, and Organize Functional References, Data, Tools/Technology, and Standards

YYYYBRM, SRM, DRM, TRM

2. Identify and ID the Assignment of Functional Responsibility

YYYYBRM1. Inventory, ID, and Arrange Business Functions, Organizations, and Locations

Why: BEAM Helps Identify and Reduce Duplicative Efforts, Reduce Inconsistency, Share Awareness/Knowledge/Information/Data, and Perform Parallel Improvements.

Page 11: Basic Enterprise Architecture Methodology (BEAM)

11

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

11

One WorldInformation

System

One WorldInformation

SystemBEAM BasicsAssertion: Something declared or stated positively, often with no support or attempt at proof.

Simple Assertion

Concept

Concept

Relation

C1 C2R1

C3 C4R2 R3

Compound Assertion

R6

R4R5

An Assertion is two or more concepts (i.e., nouns/names for things you know) connected by their relations (verbs or verb phrases).

A Semantic (Meaning) is a pathway of connections within an assertion. The more complex the assertion, the more complex its semantics/meaning.•Path R1, from C1 to C2 provides one meaning of the Assertion.•Path R4, R3, and R6 from C1 to C2 provides a different meaning of the assertion.•The first path above might be false, while the second path might be true, or vice-versa.•A single marked path, or a collection of them, through a compound assertion is a semantic network.

Everything, from the largest to the smallest, is part of many compound assertions with many meanings.

Joe has money.Mary is a consultant.Deer eat grain.

Deer/C1 eat/R1 grain/C2Deer/C1 Are Supported by/R4 money/C3 from/R3 Mary/C4 for/r6 grain/C2

Deer/C1grain/C2money/C3Mary/C4

eat/R1 costs/R2from/R3are supported by/R4 are fed by/R5for/r6

Paraphrased from http://www.knowledgemanager.us/KM-SemanticPaths-eng.htm:

The fundamental elements of models, or any type of map representing perceived or factual reality, are concepts, their instances, and their relations (i.e., interfaces). Concepts (conceptual generalizations, events, named things, etc.) connected by their relations, form Assertions. The reticular (net-like resemblance) connectiveness of real, possibly-real, and non-real assertions forms the knowledge of a person or group. Thus, a model not only illustrates that two concepts are related, but identifies how these concepts are related.

A proposition is a statement that affirms or denies something, and is an Assertion that is considered a truth. Other forms of Assertions are opinions, conjecture, speculation, contingencies, possibilities, etc., which may or may not represent factual knowledge.

Page 12: Basic Enterprise Architecture Methodology (BEAM)

12

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

12

One WorldInformation

System

One WorldInformation

SystemBEAM Basics 2• Assertion: Something declared or stated positively, often with no support or attempt at proof.

A data model or schema is the collection of properties within a semantic network.

An ontology is a collection of semantic networks and data models about a subject which identifies the structure of the knowledge, meaning, and properties of the subject.

An ontology is the structure or schema of a knowledge base, in the same way that a data model is the schema of a database.

SubjectObject

Relation Types (Concept Context)•Category (e.g., Taxonomy)•Containment•Sequence•Change (Past/Future)•Reference•Alias

Relation Properties

Concept Types (GEM Categories Subset) (Concept Content)

•Location•Organization•Organization Unit•Function•Process•Resource

Concept Properties

Concept Types

Predicate

Additional information about the concepts and relations, their Properties, help to describe and identify the concepts and relations, and their behaviors.

In Library and Information Science domains, the BEAM approach uses what is known as “faceted classification”, to enable dynamic and very rich description and linking between concepts.

Page 13: Basic Enterprise Architecture Methodology (BEAM)

13

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

13

One WorldInformation

System

One WorldInformation

SystemObject Basics 3 – Four Comparable Assertion Structures

Value 2.3Value 2.2Value 2.1Instance 2

Value 1.3Value 1.2Value 1.1Instance 1

Attribute 3Attribute 2Attribute 1

Class 1 (Table 1)

C2 Attributes

R1 Attributes

C2 Attributes

R1 Attributes

C1 Instance

2Value 1/2/2C1

AttributesValue 1/2/1

C1 Attributes

C2 Attributes

R1 Attributes

C2 Attributes

R1 Attributes

C1 Instance

1CLASS

1

Value 1/1/2C1 Attributes

Value 1/1/1

C1 Attributes

C1 Attributes

R1 Attributes

C2 Instance 1

Class 2

Value 1/3/1

C2 Attributes

C1 Instance

3

C2 Instance 2

Value 1/3/2C1 Attributes

C2 Attributes

R1 Attributes

Relation 1

An ontology is the structure or schema of a knowledge base, in the same way that a data model is the schema of a database. The elemental structure of an ontology is the triple (i.e., subject/predicate/object, noun/verb/noun, component/relation/component. The standard for triples is called Resource Description Framework (RDF)

Class1 Class2Relation 1

C1Attributes

C2Attributes

R1Attributes

Value 2.3Value 2.2Value 2.1Instance 2

Value 1.3Value 1.2Value 1.1Instance 1

Attribute 3Attribute 2Attribute 1

Class 2 (Table 2)

Relation 1 AssertionClass 1

Attribute 1Value 1

Class 2Attribute 1

Value 1Relation

Attribute 1Value 1

A. DLG

B. SQL

C. Matrix

D. XML

An Assertion can be represented as a directed labeled graph, (DLG) a matrix, and a parent/child table structure, among other means.

Page 14: Basic Enterprise Architecture Methodology (BEAM)

14

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

14

One WorldInformation

System

One WorldInformation

SystemArchitecture Basics• Architecture: The structure of an endeavor’s components and their interfaces, and the description

and diagramming of this structure and its properties.

Component 1

Component 2

Interface 1

Common Component and Interface Properties•Name•Unique ID•Description•Absolute Position•Create Date•Creator Unique ID•Modify Date•Modifier Unique ID•Deactivate Date•Deactivator ID

Structure Properties(Structure Metadata)

Structure

Architecture

Component 1 Specific PropertiesHeightWidthLengthWeight

Component 2 Specific PropertiesStreet AddressCityStateZip Code

Interface 1 Specific PropertiesShip Component 1 to Component 2Delivery DateDelivery CostRelation Forms: (Space, Matter, Energy, Time, Assertion)

The structure is diagrammed using a “directed labeled graph” - DLG, shown here with the requisite minimum of two labeled-components connected with a single labeled unidirectional arrowed line.

The properties of the structure are documented in a format now known as the “resource description framework” – RDF, established as a standard by the W3C. RDF is the foundation for object role modeling and data modeling used in semantics and data management, and for the ontology modeling used in knowledge management. The properties of the structure, including the diagram’s properties, are stored in RDF format, preferably in an RDF, or metadata, repository. This metadata repository can use XML, tabular, LDAP, or SQL technology. The recommended metadata repository storage technology is an XML database with the RDF storage schema implemented as the RDF-variant Managed Object Facility (MOF) schema, with MOF established as a standard by the Object Management Group. The MOF repository has the necessary flexibility to store, process, present, and maintain the continuously evolving schema and content of architectures and implementations.

Page 15: Basic Enterprise Architecture Methodology (BEAM)

15

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

15

One WorldInformation

System

One WorldInformation

SystemArchitecture Basics 2• Architecture: The structure of an endeavor’s components and their interfaces, and the description

and diagramming of this structure and its properties.

Component 1

Component 2

Link 1 Node 2

Node 1

Interface 1 (I1) = N1+L1+N2

•Interface 1 provides Extraction of an asset of Value 1 through Node 1 of Component 1, Asset Transformation (to Value 2)/Transport/Transfer over Link 1, and Loading of that asset with its added transaction Value 2 through Node 2 of Component 2 (ETL), under change transaction rules.•ETL provides Exchange Transactions for Physical Assets and Interchange Transactions for Digital Assets

Architecture Observations:•Architecture maps our perception of the world. •Engineering seeks to control the portion of the world’s mapped structure that we depend on. •Science seeks to identify and establish consistent controls on the portion of the world’s structure that we need to be reliable.•Everyone is an architect because they perceive and organize their own world view. Some architects have engineering discipline and skills. Some architects have scientific rigor and skills.•Architecture is observation, Engineering is applied theory, Science is reproducible proof of theory.•Engineering looks deeper into an architecture’s structure to identify and control the details of the sub-architectures’ structure. •All architecture, engineering, and science must be consistently communicated to have value. If it is not structured it cannot be engineered for reliability nor made consistent using science.

Architecture Example:A ship and a dock are components of a port’s architecture. The ship (component 1) interfaces with the dock (component 2) via a tie-line (interface 1). The ship has a tie-down point (node 1) linking the ship to the tie-line. The dock has a tie-down point (node 2) linking the dock to the tie-line. The tie-line (node 1 + line 1 + node 2) performs some combinations of interface extraction, transformation, transport, transfer, and loading of some physical (e.g., force) and/or digital (e.g., signal) asset between the ship and the dock, and conversely over another or the same interface.

Structure

Architecture is represented here in more detail, in relation to engineering and science. Architecture is presented here as a human trait for perceiving the world. Architecture’s value comes in communicating the perceived structures in a way that can be used as the start point for engineering and science.

Page 16: Basic Enterprise Architecture Methodology (BEAM)

16

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

16

One WorldInformation

System

One WorldInformation

SystemEnterprise Architecture Basics• A purposeful endeavor - an enterprise - can have an inventory of its known

and approved components, but an inventory is not an architecture• Those inventoried components that have defined interfaces/relationships

are the enterprise’s architecture, “As It Is” at the time of the component inventory and any interface identification

• An intended or desired structure and its properties is an architecture “To Be” formed at some future time

• A time-phased plan to introduce, modify, or eliminate components from the current enterprise As-Is inventory, with the corresponding introduction, modification, and/or elimination of relevant interfaces, to form the objective To-Be architecture, is an “Architectural Plan” to migrate the enterprise from its “As Is” to its “To Be” architecture

• Architectural plans can be for a single component, a single interface, a single property, or multiple components, interfaces, and properties

• Architectural plans are implemented as individual or collected projects and thus require project management controls (i.e., controls on production schedule, production budget, and product/service quality) with aggregation into programs, then into portfolios, and then into strategies

Page 17: Basic Enterprise Architecture Methodology (BEAM)

17

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

17

One WorldInformation

System

One WorldInformation

System

Open-Standard EA and IT Management Repository Elements

Standard Object Repository

EnterpriseArchitecture Design Rules

IT Common Information

Model(Device, Network,

Software, and Configuration

Integration Rules)

Standard Object Model

EA Tools IT Mgmt Tools

Data Mgmt via Common Database

and Data Warehouse Design Rules

Application Mgmt via System and

Software Design Rules

MOF Repository, showing enterprise architecture and IT operation management components.

Page 18: Basic Enterprise Architecture Methodology (BEAM)

18

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

18

One WorldInformation

System

One WorldInformation

System

BEAM Improvement Management Environment

Strategic and Business Plan (Future)•Function•Functional Mission•Functional Vision•Functional Goals•Functional Performance Measures•Functional Performance Strategies•Current Operations Analysis•New Initiatives•Alternate Improvement Paths•Improvement Path Economic Analysis•Improvement Project Funding

BEAM Integrated Web-enabled Management Repository•Object Repository (e.g., OMG XMI, CWM, CIM Schema)•SQL DBMS•Web Server•PKI Registration/Certificate/Security Service•PKI Authentication and Namespace Directory Service•Directory Service (Namespace Categorization and Attributes)•Architecture Modeling Service (Components, Relations, Descriptions, and Change Tracking)•Messaging Service (e.g., Email, Application Integration, Web Service)•Schedule/Calendar Service•Discussion/Conferencing/Collaboration Service•Document/Content Management Service•Change Management Service (Contingency, Plan, Current, History Change/Version Tracking)

Program/Project (Current and History)Detailed Planning, Tracking, and Reporting to Supply Data on Daily Management of Tasks:•Events

•Vulnerability/Risk•Deliverables•Activities•Action Items•Milestones•Meetings•Incident Reports•Status

•Labor Performance•Value Expectation and Requirement Management•Deliverable/Product Status•Performance Metrics•Task Processes•Event Dates (Contractual and Estimated Due, Start, End)

Program/Project Planning (Future)•Project Work Breakdown Structure•Resource Breakdown Structure•Organization Breakdown Structure•Task/Organization Matrix•Project Plan (Task, Milestone, Product Dependency, Critical Path)•Earned Value Management (Cost Variance, Schedule Variance)•Requirement and Constraint Specification

Management ScopeEnterprise

FunctionMission

VisionGoal

ObjectiveStrategy

PlanProject

TaskEvent

This diagram illustrates the types of information required to manage such an improvement effort. The GEM methodology provides a solid foundation for managing this type of information and the corresponding activities.

Projects directly linked to the organization mission and goals work with the information products in the boxes shown in the diagram, to manage the bolded elements in the strategic management scope outline.

After the project is planned, the execution of the project requires detailed tracking, analysis, and reporting of events over time. This is necessary to identify and resolve variance from project budget (resource plan) or schedule (time plan).

For project planning and tracking to be performed effectively and efficiently, especially in a distributed effort, technology that links the two management processes together must be made available and used.

Page 19: Basic Enterprise Architecture Methodology (BEAM)

19

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

19

One WorldInformation

System

One WorldInformation

System

Common information that business and IT workers would supply for BEAM.

Form 1: Enterprise

Form 2: Location

Form 3: Organization

Is At<>

Contains

Contains<>

Occupies

Form 4: Workforce

Form 6: Process

Implements<>

Performed By

Uses/Creates<>

Enables

Form 5: Function

Employs<>

Supports

Form 7: Resource

Form 8: Requirement

Applies<>

Activates

Satisfies<>

Constrains

Form 9: Time/Event

At<>

Schedule, Duration,

Frequency, Change

The “facets” of information collected and organized by BEAM are illustrated here. Each of these facets represents the root of a hierarchical “catalog” of these types of things.

Page 20: Basic Enterprise Architecture Methodology (BEAM)

20

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

20

One WorldInformation

System

One WorldInformation

SystemBEAM Form Templates, Part 1

Form 2: LocationGeographic:

Postal Address:Residence:Business:Public:Other:

Facility:Region Name:Spatial Coordinates:

Solar:Geospatial:

Latitude:Longitude:Altitude:

Virtual:Telephone:Email:URI/Web:UNC/File:Database:Radio Frequency:

Form 3: Related OrganizationName:

Chief Executive:Purpose:

Private:Personal:Commercial:

Public:Commercial:Non-Profit:Government:

Contains<>

Occupies

Form 3: EnterpriseName:

Chief Executive:Purpose:

Private:Personal:Commercial:

Public:Commercial:Non-Profit:Government:

At<>

Contains

OptionalFor GIS, Mapping,and CADUse

Example Enterprise, Location, and Organization class attributes and their primary relationships.

Page 21: Basic Enterprise Architecture Methodology (BEAM)

21

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

21

One WorldInformation

System

One WorldInformation

SystemBEAM Form Templates, Part 2Form 4: Workforce

Office:Position/Billet:

Team:Role:

Occupation:Grade:

Form 6: ProcessName:Standard:Role

Input:Control:Output:Mechanism:

Implements<>

Performed By

Form 5.1: FunctionName:

Mission:Vision:

Goal:Measure:

Strategy:Plan:

Operations/Projects:Requirements

BudgetsScheduleQuality

Operation:Maintenance:Functional Assessment:

Sustain:Dispose:

Review:Value Chain Assessment:SWOT Assessment:

Strength:Weakness:Opportunity:Threat:

Applies<>

ActivatesForm 5.2: Assignment

Responsible Person:Authority Limits:

LocationOrganizationOrganization UnitFunctionProcessResource

BudgetBudget Items:

Form 5.3: ReferencePolicy:

Process:Procedure:

Template:Constraint:Metadata:Data Required:Date ProducedTools:Materiel RequiredMateriel Produced:

Example Workforce (i.e., organization unit), Function, and Process class attributes and their primary relationships. Note that more detailed information collected and organized about function assignments, references, and plans.

Page 22: Basic Enterprise Architecture Methodology (BEAM)

22

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

22

One WorldInformation

System

One WorldInformation

SystemBEAM Form Templates, Part 4Form 7: Resources

Life formFaunaFlora

InformationUnstructuredSemi-structuredStructured

FundsOperationMaintenanceInvestment

SkillSocialBusinessTechnical

MaterielSuppliesEquipment

FacilitiesServicesSpace

DistanceAreaVolumeVelocityAcceleration

Energy

Form 8: RequirementResource

TimeframeScheduleDurationFrequencyChange HistoryChange Projection

QuantityQualityResource Life Cycle

StageProcess

Process StageFunctionOrganization UnitOrganizationLocation

Satisfies<>

Constrains

Form 9: TimePast Event:

Period:From:To:

Chronology:Predecessor:Successor:

Present Event:Period

Began:End:

Chronology:Predecessor:Successor:

Future Event:Period

Begin:End:

Chronology:Predecessor:Successor:

Ongoing Event:

At<>

During

Example Resource, Requirement, and Time/Event class attributes and their primary relationships. Note that considerable detail will be added the resource class as BEAM proceeds, to include specific types of resources approved for enterprise use, thus providing the content for an EA Technical Reference Model. The current and planned system specifications would be captured as requirements, while the schedule of the requirements would be captured in the Time/Event class.

Page 23: Basic Enterprise Architecture Methodology (BEAM)

23

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

23

One WorldInformation

System

One WorldInformation

SystemBEAM Management Relation Matrices

By asking the BEAM procedure’s questions in the order given, the tables shown at the top of this diagram are generated, representing relation matrices for the subjects of the questions. These populated relation matrices, when organized as a whole, related chain of subjects, provides a rich knowledge base of the enterprise as a whole. These same matrices provide the data necessary to generate the various information, products, and views specified by the various enterprise architecture frameworks (e.g., Zachman, FEA, DoDAF/C4ISR, TOGAF). Detailed attributes for each subject contain the majority of the subject detail, and both the subjects and their attributes are tailorable to each organization. GEM provides the mechanism to aggregate these subjects and their attributes, and privacy/security-appropriate data (e.g., knowledge instances) to enable the core GEM content distributed by OWIS to be increasingly refined over time, for all GEM users.

Page 24: Basic Enterprise Architecture Methodology (BEAM)

24

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

24

One WorldInformation

System

One WorldInformation

SystemBEAM Management Simplified Entity Relation Diagram

This diagram represents the entity-relationship structure generated by organizing the BEAM Subject Relation Matrices into a relational database, or XML or Java class.

Page 25: Basic Enterprise Architecture Methodology (BEAM)

25

One WorldInformation

System

One WorldInformation

System

2. Executive Overview

Page 26: Basic Enterprise Architecture Methodology (BEAM)

26

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

26

One WorldInformation

System

One WorldInformation

SystemWhat are BEAM, GEM, and EMM and why are they valuable?

• GEM = General Enterprise Management methodology• BEAM = Basic Enterprise Architecture Methodology. A subset of GEM• EMM = Enterprise Management Maturity. A five level scale for identifying

an enterprise’s level of management maturity, corresponding to the stages of fully implementing the GEM methodology

• GEM is valuable because it enables an enterprise to perform its operations with dynamically updated internal and environmental intelligence

• BEAM is valuable because it provides a step by step procedure, free for non-commercial use, to collect the information needed for satisfying the U.S. Federal and basic business requirements for an enterprise architecture, while providing recommended open-standard technologies for storing this information, while simultaneously forming the early stages of an enterprise knowledge base usable by the GEM methodology and its derived applications.

• EMM is valuable because it enables an organization to rate theirenterprise’s management maturity against the full Real-Time Enterprise management capability offered by fully following the GEM methodology, as well as providing the procedures, in stages, for implementing the GEM methodology, building/populating/integrating the GEM repository beyond the BEAM capability, and building/integrating GEM-based functional applications

GEM is a proven "management solution" framework that is the basis for consistent solution design and implementation. GEM is a generalization and integration of several processes present in all enterprise functions, and in all enterprise management, and is an improvement of processes that have been used for centuries. Through this integration, GEM provides a consistent method for analysis and integration of enterprise business, management, systems, value, and other subjects. The documentation of these analyses and integrations can be loaded into a multi-purpose knowledge-base which is part of the GEM design. The implementation of this integration results in knowledge-based value-chain workflow applications that reach across functional and enterprise boundaries.

The concepts and designs behind GEM date back over 35 years to an early “connection model” extension to the popular “systems model”. The connection model was subsequently renamed a “generalized object model”. This early object model is comparable to today’s industry standard Object Metaschema defined jointly by the OpenGroup and Object Management Group (OMG) as the foundation for the structure and management of many modern information technologies. The GEM methodology, repository, and application design has been developed over the past 21 years as information technology has evolved over that period.

GEM is designed as a method for simultaneously attaining enterprise management process and operation maturity, customer focus and value, continuous quality improvement, situational awareness, enterprise architecture, portfolio management, vulnerability management, etc., without all of the overhead required by each of these individual efforts. It is comparable to CMM for Software Engineering, and CMMI for System/Software Engineering and Acquisition Management, but for all organization functions, programs, projects, and processes.

Page 27: Basic Enterprise Architecture Methodology (BEAM)

27

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

27

One WorldInformation

System

One WorldInformation

SystemAdvantages of the BEAM UmbrellaBEAM can be used to support, integrate, merge, or eliminate• IT Architecture Management• IT Program, Project, Task, Event Management• System and Software Engineering Life Cycle Management• System/Software Requirement Specification Management• Requirement Management• Independent Verification and Validation (IV&V) of Requirements, Design, and

Development• A76 Outsourcing Studies• Organization And Function Management (Staffing and Structure, Realignment,

Reorganization, Relocation, Mergers, Acquisitions, Task Forces, BPR, etc.)• Quality Management (Six Sigma, TQM, etc.)• Maturity Management (e.g., ISO-9002, CMM, CMMI)• Human Capital Knowledge Management (i.e., Building individual and collective

knowledge base, identifying skills available, identifying skills required, identifying skills gap, driving training management and recruiting)

• Functional strategies, plans, and budgets tracked through to completion• Expenditures traced back to driving missions, goals, objectives, and strategies.• Reference Management (i.e., Policies, Processes, Procedures, Templates,

Standards, Tools)

Page 28: Basic Enterprise Architecture Methodology (BEAM)

28

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

28

One WorldInformation

System

One WorldInformation

System

BEAM Business Intelligence Capability Uses EA for Drill Down and Roll Up of Budgets, Priorities,

Performance, Production Levels

Functions and Uses of the Drill Down and Roll-Up Features of BEAM:• Asset Distribution Requirements• Asset Access Control and Information Requirements• Summaries, aggregations, and details concerning Business Functions, Priorities,

Budget• Gives the ability, as a business intelligence technique, to explain to anyone (e.g.,

Congress, OMB) the impact of funding changes (e.g., if you budget this agency XXX dollars you will get these outputs from our mission area in these quantities, in these time frames, with these qualities, etc., as in GPRA support.)

Page 29: Basic Enterprise Architecture Methodology (BEAM)

29

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

29

One WorldInformation

System

One WorldInformation

System

GEM Facts/History and Claimed BenefitsFacts/History

GEM, and to a large degree its BEAM subset, has been proven by over two decades of day to day practical use, including:

1. Re-justifying and reorganizing a 16,000 person U.S. Army command assigned to NATO

2. Mapping together job functions, positions, skill sets, IT requirements, organization units, facilities, training, and budgets for organizational productivity improvements and IT acquisitions based on enterprise-wide business patterns

3. Modeling and building an application to provide wartime and contingency operational scenario generation, event release for execution, and performance tracking

4. Modeling and managing the garrison IT architecture for a 300,000 person Theater Army

5. Managing IT requirements in conformance with that enterprise architecture

6. IT planning, programming, and budgeting for that Theater Army

7. Adoption of that methodology, and the application that applied it, as a candidate standard Army management system for managing IT architecture, plans, and execution

8. Inclusion of the management methodology’s knowledge schema in a standard DoD application combining SQL, GIS, and CAD functions for IT architecture, infrastructure, and systems planning and topological display

9. Serving as the management methodology in supporting engineering management for the DoD Common Operating Environment (COE) and Global Command and Control System (GCCS)

10. Providing the operational model and analytical schema to identify the traffic and usage patterns of the DoD Joint Operations Planning and Execution System (JOPES) for use in its redesign.

Claimed Benefits• GEM provides a methodology, i.e., a detailed set of

procedures supported by a variety of open-standard technologies, for developing and implementing management solutions, regardless of the subject being managed

• BEAM provides a single procedure to simultaneously support:– Enterprise architecture (As-Is and To-Be Architectures

and Migration Plans)– A76 competitive sourcing studies– Staffing, structure, and equipping studies– Reorganization/realignment/relocation projects– Functional and enterprise knowledge modeling (for

leveraging and enriching Human Capital)– Strategic management and performance management

of strategic plans/portfolios and budgets/programs/projects

– Business process reengineering (BPR)– Business process maturation (e.g., supporting ISO

9000, and CMMI and CMM at all maturity levels)• GEM provides the procedural steps beyond BEAM to provide:

– Enterprise modeling and management– Enterprise Knowledge Management– Enterprise Workflow– Enterprise Application and Information Integration

(EAI/EII)– Security Architecture and Management– Enterprise Resource and Requirements Management– Enterprise Situational Awareness and Managed

Intelligence– Integrated Enterprise Operations based on Dynamic

Enterprise Intelligence

Page 30: Basic Enterprise Architecture Methodology (BEAM)

30

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

30

One WorldInformation

System

One WorldInformation

System

What are the rough costs of BEAM?

• For non-commercial (e.g., government, FFRDC, Academic, individual, community) and internal organization use there is no charge to use the BEAM. (Register for BEAM use, including any of your extensions to BEAM, under the same Creative Commons license, by sending an email to [email protected]). If Contractors without BEAM commercial licenses are used to deploy BEAM internally or in other organization units of a largerorganization, then the initially registering organization must purchase appropriate commercial BEAM licenses from [email protected].

• The BEAM methodology does not introduce significant new work to the typical medium to large organization, but does change the way existing information about the organization and its environs is collected, shared, organized, applied, and maintained. BEAM provides an engineered approach to enterprise architecture as a substitute for the more typical non-repeatable "craft" approach to EA. These changes may involve added costs, which would predictably be offset by increases in productivity, responsiveness, and accuracy of the resultant BEAM-supported work.

• BEAM costs for commercial and non-profit licenses are shown in the table below. This would include providing contracted BEAM support to other organizations, and other non-commercial uses.

• To make payment, click on the hyperlinks in the table below, or contact [email protected] or +1 (703) 598-2351, to make other payment arrangements.

• To download BEAM documentation, project plan, and view lists of Licensed BEAM Supporters and VAR, visit http://one-world-is.com/BEAM.

BEAM Practitioners are available on hourly or retainer basis. Contact [email protected].

$ 20,000.00 1$50 Formal Organization10,000 3.4 Global

$ 10,000.00 1$50 Formal Organization1,000 3.3 National

$ 5,000.00 1$50 Formal Organization100 3.2 State

$ 2,500.00 1$50 Formal Organization50 3.1 City, Metro-Area, or County

CostQntyx License Type MultiplierBEAM Operations Scope and Multiplier

BEAM Commercial Service Provider Annual License Cost:

$ 5,000.00 2.4 Other Methodology or Corporate Software using BEAM

$ 1,000.00 2.3 Community Software using BEAM

$ 400.00 2.2 Small Team Software using BEAM

$ 200.00 2.1 Single User Software using BEAM

BEAM annual VAR license cost varies with inclusion of BEAM in Individual, Small team, Community, and Corporate commercial products or commercial methodology use.

BEAM Annual Licenses for Commercial and Non-Profit Organizations

Page 31: Basic Enterprise Architecture Methodology (BEAM)

31

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

31

One WorldInformation

System

One WorldInformation

SystemBEAM for EA Governance

Strength, Weakness, Opportunity, and Threat

(SWOT)Assessment,

Risk Assessment, and VulnerabilityManagement

---------Map Organization, Environment, Operations, and Resources (i.e., Document and Maintain Enterprise Architecture)

• Mission/Vision• Goals

• Performance Objectives• Performance Targets/Indicators

Develop StrategiesRecurring Operations

---------

Initiatives (Projects)---------

Implement StrategiesPerform Projects---------

Measure Project PerformanceReview Strategy PerformanceAdjust Performance---

Enterprise OperationsSpiral

Value Chain Assessment

BEAM enables the enterprise to resolve many of its toughest EA problems through the implementation of its integrated repository. This diagram illustrates the major enterprise and functional management activities supporting a BEAM environment, as a closed loop system.

The dashed elements of the diagram represent GEM components, outside of the BEAM scope.

Page 32: Basic Enterprise Architecture Methodology (BEAM)

32

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

32

One WorldInformation

System

One WorldInformation

System

GEM Intelligence Categories (i.e., Facet Classification) Give Context To The Subject

IT Focus

Operation and Performance

Focus

Management Focus

Increasing Context(=Decreasing Disorder)

Next State (Order)

Decision

Awareness

Knowledge

Information

Data

Signal

Event

Current State (Order)

IncreasingIntelligence

Response

Impact

Learning

Process

Metadata

Pattern

Indicator

Change

GEM Function – Enterprise Intelligence

GEM Subject Assertions (Fact, Opinion, History, Conjecture, Projection, Plan, Theory, etc.)

GEM Subjects

In GEM, Enterprise Intelligence is a collection of those sensed, perceived, and recorded things, treated as resources, that guide enterprise decisions for in responding to changes in monitored situations. These intelligence resources are best managed as a whole, thus providing integrated assertions (e.g., facts, opinions, contingencies, requirements) for decisions and response.

GEM categorizes and structures its intelligence in terms of the basic human questions and answers of: where, who, what, why, how, when, how many, how often, for how long, of what quality, at what stage, etc. The intelligence categories of GEM are named: Location, Organization, Organization Unit, Function, Process, Resource, and Requirement. GEM is used to collect, identify, describe, relate, control, and disseminate information about subjects in these categories.

Page 33: Basic Enterprise Architecture Methodology (BEAM)

33

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

33

One WorldInformation

System

One WorldInformation

System

1Where we are today…

(As-Is)

2Where we want to go…

(To-Be)

Value-Lattice(Integrated Value Chains)

Operating Environment Mission

Vision

Tightening “Acceptable Performance” Indicators

from Lessons Learned During Operations(Intelligence Refinement)

Risk Assessment, Performance Measurement,

And Adjustments

Objective Criteria

GoalStrength,

Weakness, Opportunity, and Threat Awareness

Evolving Strategy(Adaptation Decisions)

BEAM provides a procedure to move from problems to solutions.BEAM enables accomplishment of architecture goals and objectives.

BEAM Function – Migrating from As-Is to ToBe

3How we’ll get there

(Migration)

Management: The purposeful resolution of complexity, inconsistency, and chaos in science, society, and perception into a dynamicsystem of relative controlled order. The movement from Current Problem to Solved Problem, or from As-Is situation to To-Be situation.

An enterprise is a “purposeful endeavor”, and thus can include the purposeful (e.g., goal-oriented) endeavors of nations, collections of nations, organizations, chains of formally and informally linked organizations, markets, communities, groups, and/or individuals. Each of these endeavors has an As-Is “architecture” at some degree of completeness.

Part of enterprise architecture is defining how to move an enterprise’s As-Is architecture, and the infrastructure and systems described by that architecture, “from here to there” in a purposeful way. This entails knowing: 1) where you are, 2) where you want to go, 3) what path and pace you want to follow, 4) how you’re progressing on the path and pace, and 5) what adjustments are neededto these.

This goal-seeking approach resembles, and is a superset of, the operations-planning approach used by many organizations. It supports and can enable automation of large enterprise management controls such as compliance with the U.S. Government Performance and Results Act (GPRA) and Information Technology Management Reform Act (ITMRA, also known as Clinger-Cohen Act – CCA), and automation of management endeavors such as the 2001 U.S. President’s Management Agenda with its five key government-wide initiatives (Strategic Management of Human Capital, Competitive Sourcing, Improved Financial Performance, Expanded Electronic Government, Budget and Performance Integration).

BEAM can provide an integrated mechanism to support these controls and can thus directly support the Federal Enterprise Architecture (FEA).

Page 34: Basic Enterprise Architecture Methodology (BEAM)

34

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

34

One WorldInformation

System

One WorldInformation

SystemBEAM Supports the FEA and the PMA

EA

TA

AA

DA

BA

XXX

XXX

XXX

XXX

XXX

XXX

XXX

President’s Management Agenda Hierarchy

XGovernment Performance and Results Act (GPRA) (1993)

XPresident’s Goals (2001)

X• OMB PART Scorecard

X5. Budget/Performance

X• Federal Information Security Mgt Act

X• FEA in support of Clinger Cohen Act

X• 24 eGov Initiatives

X4. Enhanced eGovernment

X3. Financial Performance / BMMP

X2. Competitive Sourcing / A76

X1. Human Capital / CHCO

XFive Government-Wide Initiatives (Scorecard Items)

XPresident’s Mgt Agenda

BEAM Methodology Structure

FEA = Federal Enterprise ArchitectureBA = Business Architecture (FEA BRM/PRM and DoDAF OV Conformant)DA = Data Architecture (FEA DRM and DoDAF OV Conformant)AA = Application Architecture (FEA SRM and DoDAF OV Conformant)TA = Technology Architecture (FEA TRM and DoDAF TV Conformant)

GEM Methodology Structure

BusinessArchitecture

DataArchitecture

ApplicationArchitecture

TechnologyArchitecture

Enterprise Architecture

PMA = President’s Management AgendaCHCO = Chief Human Capital OfficerBMMP = Business Management Modernization PlanPART = Performance Assessment and Rating Tool

BEAM directly supports the U.S. President’s Management Agenda (PMA) initiative of “Enhanced eGovernment” and its FEA efforts. The commercially available GEM methodology supports the more comprehensive requirements of the full PMA.

Through internal capabilities and teaming and/or GEM licensing arrangements with best of breed management and technology service providers, OWIS provides a full spectrum of Services for managing an organization and its enterprise architecture. We are willing and able to team with your existing contractors in all categories of service, such as planning and implementing BEAM in your organization, or to license GEM to you or them.

BEAM can be directly applied to help achieve the expected results of the President’s Management Agenda, as shown in this diagram. At the heart of the BEAM support for the PMA initiatives is a FEA conformant enterprise architecture, satisfying the EA portion of the “Expanding eGovernment” PMA initiative, with extensions into infrastructure and system development and operations that encompasses the DoD Architecture Framework (DoDAF).

To build the EA, BEAM efforts collect and organize the Business, Data, Application, Technology, and Security Architectures, withmapping to existing and planned infrastructure and systems. BEAM provides the structured basis for effectively, efficiently, and securely building and using enterprise applications.

With the EA in place, the management solution for the other PMA initiatives, and other management initiatives, is greatly simplified. The BEAM Business Architecture, often in conjunction with the Security Architecture, is the most commonly used area of the BEAM-derived Enterprise Architecture. They provide the detailed system and requirement analyses used in defining the data, application, and technology architectures and in implementing subsequent information system capabilities.

Page 35: Basic Enterprise Architecture Methodology (BEAM)

35

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

35

One WorldInformation

System

One WorldInformation

System

GEM For Enterprise Management Services• Extending BEAM into Full Enterprise Engineering and Real-Time Enterprise• Operations and Intelligence Management Workflow• Performance/Quality/Cost Improvement• Cycle Time Reduction• Vulnerability/Security/Continuity/Risk Management• Knowledge Management• Multimedia Knowledge and Content Integration• Expertise Location, Collaboration, Notification, Certification, and Development• GEM Intelligence for:

Supporting The President’s Mgt Agenda (PMA)

Basic Enterprise Architecture Methodology (BEAM)Consulting-On, Implementing, and Extending:

IT Services

Network Infrastructure Services•IP, Telephony, VOIP, Satellite, Wireless, Radio•Provisioning, Prioritization/Precedence, and Quality Management

• FEA / NASCIO• DoDAF/C4ISR

• TOGAF• Spewak

• Zachman• Portfolio Management

• LAN/WAN/Wireless Network Management• Application and Database Integration• Complex Databases, Data Warehousing• Web-based Applications

• CFO• CIO• CTO

• CIO• CTO• System/Software

Development Mgrs

Target ServiceAudience

• CEO• COO• CFO• Functional Managers

• CHCO• CKO• CIO

PMA Initiatives(Simultaneous Support)

1. Human Capital• CHCO

2. Competitive Sourcing • A76

3. Financial Performance• BMMP

4. Enhanced eGovernment

• 24 eGov Initiatives• FEA• FISMA

5. Budget/Performance Integration

• Scorecard

GEM-Based Management Support and IT Services

• Organization Studies (Outsourcing/A76, Realignment, Reorganization, Relocation, Cultural and Political Change)

From top to bottom of the above service stratum:1. OWIS provides commercial Enterprise Management Services and Support using our GEM methodology, implemented in value-producing phases using our Enterprise Management Maturity model. 2. GEM includes BEAM, the Public-Licensed EA methodology from OWIS, within its larger methodology for managing the intelligence and intelligence-based operations of any enterprise. BEAM is a methodology, supported by appropriate technology, for developing, maintaining, and leveraging enterprise architectures. BEAM is provided as a public license to enable those working with the FEA and/or TOGAF to have a common starting point for defining EA terms, procedures, and products, thus helping the government clients and their EA providers to begin to reduce the uncontrolled variation in EA approaches into a common approach.

Following the BEAM provides the map or "blueprint" of the enterprise components and their interfaces. BEAM also provides the resultant "inventory" of enterprise resources/assets at their various life cycle stages, and links those resources to the "architecture" of processes, functions, organization units, organization, and locations relevant to the enterprise. In doing this, BEAM extends Enterprise Architecture capabilities far beyond those provided by FEA/FEAF, DoDAF/C4ISR, TOGAF, Zachman, Spewak, etc.

Through use of the more comprehensive and structured BEAM methodology, we provide Enterprise Architecture services and support, having the ability and readiness to work with:Other EA frameworks (e.g., Zachman, DoDAF/C4ISR, FEA, TOGAF, etc.) and EA methodologies (e.g., Spewak), data, application, and architecture modeling tools (e.g., Computas Metis, Agilense Web Modeler, Popkin System Architect, Rational Rose, Ptech, Poseidon UML, Oracle Designer, Microsoft Visio for Enterprise Architects), metadata (model) repositories

Open Standard (MOF, Agilense EA Repository, Netbeans MDR, DSTC),Proprietary (Metis, CA/Platinum ModelMart, ASG Rochade, Cyrano, Softlab Enabler, Oracle, Microsoft, Rational ClearCase, ISC E-GEN/MAP, Sybase Metaworks)

middleware products (workflow, metadata management, metadata integration, ETL, etc.)3. We provide full life cycle support for EA-governed system and software capabilities through our award-winning IT service capabilities, and by teaming with other high quality companies.4. We provide network infrastructure services, such as data and voice telecommunication services and support, through our teaming with high quality network service providers.

Page 36: Basic Enterprise Architecture Methodology (BEAM)

36

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

36

One WorldInformation

System

One WorldInformation

System

EMM Level 5: Real-Time Enterprise Management

EMM Level 4: Enterprise Operational Management

GEM™ and Enterprise Management Maturity Levels

GEM provides escalating levels for building and integratinga mature enterprise management capability.

EMM Level 3: Enterprise Architecture (BEAM)

EMM 2EMM 1

EMM 3

EMM 4 EMM 5

Growing the Capability Tree

GEM can begin at any levelof the enterprise and grow outward,

but starting with the whole enterprise is recommended.

EMM Level 1System

Architecture A

EMM Level 2:Functional

Architecture X

EMM Level 1System

Architecture B

EMM Level 1System

Architecture C

EMM Level 2:Functional

Architecture Y

EMM Level 1System

Architecture D

The EMM process has five levels for deploying the capabilities enabled by the General Enterprise Management (GEM) methodology. As illustrated here, the GEM methodology can be applied at multiple levels of the enterprise, but the enterprise only gains a “whole-enterprise” view starting at EMM Level 3, through the application of EA, preferably using BEAM.

GEM is applicable at all levels of the enterprise capability (e.g., from isolated system to “living” enterprise), but the enterprise gains the most value, in the shortest overall time, at the lowest overall cost and complexity, by pursuing EMM 3 through 5 in sequence.

An analogy to help understand the EMM levels of GEM comes from medicine. EMM Level 1 is equivalent to the anatomy and function of a human’s finger. EMM Level 2 is equivalent to the anatomy and function of a human’s arm. EMM Level 3 is equivalent to the anatomy and function of a human body. EMM Level 4 is equivalent to the physiology and mechanical operations of a human body, which both apply the anatomy. EMM Level 5 is equivalent to the psychology and awareness, the intelligence, of the human, which applies the body’s anatomy, physiology, and mechanics.

Stretching that same analogy a bit further, an organization with an enterprise architecture, such as one provided at EMM Level 3, is basically an anatomically modeled organization, much like a cadaver serves as a model of a human. EMM Level 4 is much like a human in a coma – operating but not aware, proactive, or reactive. EMM Level 5 is much like an aware and active human operating in their dynamic environment.

Page 37: Basic Enterprise Architecture Methodology (BEAM)

37

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

37

One WorldInformation

System

One WorldInformation

SystemImplementing GEM™ Using EMM™Advanced Services

• BEAM Business Analysis (Partial EMM 3)

• BEAM Enterprise Architecture(Full EMM 3)

• Integrated Operational Management Capability(EMM 4)

• Real-time Enterprise Management Capability(EMM 5)

Outcome/Results• Business Case for Full EA (EMM 3) and GEM (EMM 4 and 5)• Partial EA (Extending FEA BRM into initial Functional Knowledge Base) • Initial Security Architecture (Role basis for asset access and distribution) (GEM only)

• BRM, PRM, DRM, SRM, and TRM for FEA-Conformant EA• Full Security Architecture (Full Role-Based Access Controls) (GEM only)• Initial Vulnerability (Operation Value, Continuity, Risk) Modeling (GEM only)• Enterprise Portfolio Analysis• Initial Physical and Digital Asset Management (GEM only)• Enterprise Model and Value Chain Maturity (GEM only)• Functional Knowledge Base (GEM only)• Guidance Inventory• Guidance Integration (GEM only)

• Mature Operations and Integrated Workflow• Metadata Management for Enterprise Application Integration and Virtual Enterprise Database• Enterprise Portfolio Management• Detailed Physical and Digital Asset Management• Vulnerability Management• Leverages EA for Performance Mgt, Configuration Mgt, Security Mgt, etc.• Continuously Updated Management Dashboards• Reference Architecture (Functional Maturity) Support• Semantic Models

• Situational Awareness for Leaders and Workers• Fastest Decision and Response Cycles• Command and Control• Dynamic Enterprise Intelligence, Operations, Value-Chain Workflow, and Value-Lattice Visualization• Enables Complex Change Management• Mature Culture• Enterprise Ontologies and Dynamic Knowledge Management

OWIS is prepared to support your organization and your contractors in applying the GEM methodology to your enterprise management operation and reporting requirements. This diagram represents our primary GEM-related services.

•What are EMM/GEM durations (for most Federal Departments/Agencies, State and Local Government Departments, and medium to large commercial organizations)? GEM operates in spiral management life cycles, with each subsequent cycle operating from the refined results of the previous cycle. These GEM/EMM stage estimates are cumulative durations, not additive (i.e., Level 4.2 takes approximately three months added on to the 12 months of a Level 4.1 task, yielding an approximate 15 months total).

•A GEM/EMM Site Survey takes approximately 2 weeks. It provides the necessary information to establish the scale of the GEM/EMM effort, the technologies, methods, models, and notations currently in place, and the organizational context of the GEM/EMM effort to help establish the parameters for the Change Management (i.e., communication plan, etc.) process that runs in parallel with the GEM/EMM implementation activities. The Site Survey helps to determine the costs of the EMM efforts within the estimated timeframes below.•EMM Level 1 services take approximately 2 months per system. Note that multiple Level 1 services within a single function would never yield the same benefit as a Level 2 service for that function and all of its systems.•EMM Level 2 services take approximately 4 months. Note that multiple Level 2 services within a single enterprise would never yield the same benefit as a Level 3.3 service for that enterprise and all of its functions.•EMM Level 3.1 – BEAM Initial Business Architecture services take approximately 3 months, yielding a portion of BEAM functionality.•EMM Level 3.2 – BEAM Full Business Architecture services take approximately 5 months, yielding a portion of BEAM functionality.•EMM Level 3.3 –BEAM Enterprise Architecture services take approximately 9 months, yielding a portion of GEM functionality with FEA and C4ISR/DoDAF conformance.•EMM Level 4.1 – Operational Enterprise Architecture services take approximately 12 months, yielding a portion of GEM functionality. (EAI)•EMM Level 4.2 – Dynamic Enterprise Management services take approximately 15 months, yielding a portion of GEM functionality. (Workflow)•EMM Level 5 – Real-time Enterprise Management services take approximately 24 months, yielding the full GEM functionality. (Value-Chain Workflow, Situational Awareness)

•Who can benefit from BEAM and EMM/GEM? Any organizational executive, manager, workforce members, singly or in groups, and their customers, suppliers, authorities, partners, and the relevant public constituency.•What are the benefits of BEAM and EMM/GEM? Shared and maintained knowledge based on common terminology, meaning, and understanding, as appropriate by the attained EMM Level. Increased operational capability, effectiveness, efficiency, adaptability, and responsiveness.•What is the cost of BEAM and EMM/GEM? Cost of infrastructure to support BEAM/GEM (network, repository platform, repository software, client platform, client software, training on these, maintenance of these). Cost of initial and ongoing organizational and functional analysis. Cost of interfacing organizational and functional knowledge with legacy information systems, Web, Semantic Web, Web Services, etc.•Where are BEAM and EMM/GEM performed? BEAM/GEM would operate using a technical platform distributed over the organization’s intranet, private networks, and Internet.•When are BEAM and EMM/GEM performed? GEM is performed continuously once begun, operating as a core process within its adopted organizations.•What are the BEAM and EMM/GEM frequency? An EMM Level, once reached, would require consistent use and maintenance to sustain its value and capability. BEAM/GEM use would be by your organization’s personnel and/or its OWIS support team. The BEAM and EMM/GEM maintenance could be performed by OWIS and/or by your personnel trained in the EMM/GEM techniques and tools.

Page 38: Basic Enterprise Architecture Methodology (BEAM)

38

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

38

One WorldInformation

System

One WorldInformation

System

BEAM Spiral Life Cycle Support for Standards, Regulations, and Legislation

4. Infrastructure

4. Enterprise Architecture

5. Business Case, Technology,

Standards, R&D

2. Business Function Plans

4. Function Systems

5. Function Operation Performance5. Business Requirements

4. Capability Provisioning

5. Function Satisfaction

3. Process Maturity

1. Enterprise View

2. Enterprise References and Reference Maintenance

5.. P

erso

nnel

Fun

ctio

n

5. L

ogis

tics

Func

tion

5. F

inan

ce F

unct

ion

5. F

acilit

ies

Func

tion

5. M

arke

ting

Func

tion

5. O

ther

Bus

ines

s Fu

nctio

n

4. Functional Foundation

1. Enterprise Context Inventory

3. Requirements Management

2. Strategic Management

5. Customer Satisfaction

5. Function Information Products

3. Process Management (Workflow)

5. Strength, WeaknessOpportunity, Threat

Zach

man

, FEA

, TO

GAF

EA

GPR

A

GPR

A

ITM

RA/

Clin

ger-C

ohen

Act

DoD

AF/C

4ISR

EA

This figure illustrates the life cycle of enterprise management information resources. An enterprise model, showing the inventory of managed objects within the enterprise, provides a mapping for subsequent management activity. By building a management capability from an enterprise model, you gain the ability to manage the context of the enterprise as a whole. This provides the mechanism for situational awareness, knowledge-based activities, and process (supply chain, value chain) optimization.

Page 39: Basic Enterprise Architecture Methodology (BEAM)

39

One WorldInformation

System

One WorldInformation

System

3. Technical Overview

Page 40: Basic Enterprise Architecture Methodology (BEAM)

40

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

40

One WorldInformation

System

One WorldInformation

System

What is the BEAM process? (BEAM – EA Capability Management Stages Preceding GEM)

IT Capability Management Stages

System/Software Engineering (i.e., Detail Design) and Operation Enterprise Architecture and System/Software High Level Architecture

Certification and Accreditation (GEM)(e.g., DITSCAP Definition, Verification, Validation, Post-Accreditation Activities)

SA(GEM)

Customers, Business, and Investment

(GEM)

Content and Performance

(GEM)

Software(GEM)

Application Platform(GEM)

Infrastructure(GEM)

TA(TRM)

AA(SRM)

DA(DRM)

BA(BRM/P

RM)

Business Service (Component) Definition (Reusable solution set)

Security Architecture(GEM)

Security Domains mapped to security policy, procedures, and guidelines, and then to Enterprise Security Architecture (ESA) guidance

Technology ArchitectureFunction Technology•TRM Services Category

–Mapped to Runtime Patterns•TRM Approved Service Category Products

–Mapped to Runtime Products•Request TRM Waiver

Applications ArchitectureFunction Logic•Application and Business Component Catalog

–Feature•Behavior

–Benefit»Cost

•Request new Application or Component

Data ArchitectureFunction Data•Domain

–Subject Area•Subject

–Attributes–Constraints

–Structured Content•SQL, LDAP

–Semi-structured Content•XML, Messages

–Unstructured Content•Office Files•HTML, Text

•Request New Data

Business ArchitectureFunction•References

–Policy•Process

–Procedure»Templates»Rules»Standards

–Vocabulary -> Knowledge•Mission Operations•Assignment

–Org Units•Organization

–Locations

•Request New FunctionRole-based Access Definition(GEM)

Role-based Data Classification(GEM)

Access Rules and Methods(GEM)

Access Mechanisms

BEAM EA products as foundation for System/Software Engineering and Operations.

Page 41: Basic Enterprise Architecture Methodology (BEAM)

41

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

41

One WorldInformation

System

One WorldInformation

SystemBEAM™, Your Tools, and MDEM™

MDEM Repository

BEAM

Software Design Repository

Application Development and Data Modeling Tools

IT Repository

IT Management Tools

Metadata Repository

Metadata and Data Management Tools

Why Model Driven Enterprise Management (MDEM)? Using modern open-standard technology, MDEM can provide enterprise users with the effectively and efficiently-managed intelligence needed to conduct and improve operational activities, reduce costs, and reduce the latency of decisions.

RequirementRepository

Resource Management

Tools

The BEAM, in conjunction with a robust open-standard mechanism to collect and relate data from a variety of tools, provides MDEM. GEM is vendor neutral, although specific technical capabilities applied in the GEM implementation and subsequent operations are provided by a limited number of technology vendors.

Page 42: Basic Enterprise Architecture Methodology (BEAM)

42

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

42

One WorldInformation

System

One WorldInformation

System

Model Driven Enterprise Management - MDEM Tools (GEM Support)GEM Schema And Enterprise Model (GEM)

BEAM and GEM MDEM Repository Elements

OMG Managed Object Format (MOF) Repository (BEAM)

EnterpriseArchitecture Schema via Model

Driven Architecture – MDA (BEAM)

IT Common Information

Model – CIMSchema

(Networks, Platforms, Devices, Software, and Configurations)

(GEM)

IT OperationsManagement Focus:•CIO•CTO

IT Governance and Development Focus:•CFO•CIO•CTO

EnterpriseManagement Focus:•CEO•COO•CFO•CHCO•CKO•CIO•Functional Managers

OpenGroup and OMG Object Metaschema

GEM-based Operation, Asset, Vulnerability, and Security Management

WBEM Tools

Data Model (e.g., Metadata, ORM,

IDEF1X) Integration w/ Common Warehouse Metamodel – CWM

(GEM)

Application Model (e.g., UML)

Integration via XML Model Interchange –

XMI (GEM)

Software Development Focus:•Development Managers•CIO•CTO

Open StandardSoftware Process

Engineering Workflow (GEM)

Open Standard Web Services,

Business Process Integration, and Workflow (GEM)

BEAM and GEM Repository elements, showing enterprise management, enterprise architecture and IT operation management components. Standard are underlined.

Page 43: Basic Enterprise Architecture Methodology (BEAM)

43

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

43

One WorldInformation

System

One WorldInformation

SystemEMM 3 – Extended Enterprise Architecture (EA) +

Functional Operations with Technology

Portfolio s for PRM, Technology Development

Enterprise Operation, Asset, Vulnerability, and Configuration Management(DoDAF AV)

Controls

Infrastructure and Systems Linkage to EA(DoDAF SV)

Certification & Accreditation(FISMA)

• Information Management Technology (TV)

• Services Management Technology–e.g., personnel services, cleaning services, IT services, food services

• Facilities Management Technology

• Materiel Management Technology–Equipment (e.g., vehicles, factories, IT hardware/software, furniture–Supplies (e.g., food, fuel, office supplies, IT supplies

• Skills Management Technology

• Funds Management Technology

• Personnel Management Technology

Functional Technology Types

• Mechanisms for Asset Distribution and Access Control of Physical and Digital Assets (GEM, Final RBAC)

• Capability Package (Business Component)• Basis for Physical and Digital Asset Access Rules and Methods (GEM)

• Metadata and Data Management• Basis for Data Classification (Privacy, Confidentiality, Secrecy, Need to Know, etc.)

• FEA compliant BRM• Information for Physical and Digital Asset Management (GEM)• Information for Process Modeling and Management (Workflow and Asset Distribution) (GEM)• Information for Role-based Push/Pull of information for Situational Awareness and C2 (GEM)• Information for Knowledge Base

• Information for EA, System, and Functional Business Cases• Basis for Role-Based Access Control – RBAC to physical and digital assets (GEM)• Information for Organization and Functions Management (e.g., Task Organization, Realignment,

Reorganization, Merger/Acquisition)

Results

Full Business Architecture (FBA)

(2 months)

InitialBusiness

Architecture (IBA)(2 months)

Enterprise Architecture Elements

Enterprise Capability Documentation*** Enterprise Architecture is NOT about information technology.*** IT management benefits from EA, as does everyone in the enterprise, their customers, their partners,their authorities, their suppliers, and the public.

(Italic Underlines show IT-Specific EA Elements, with drivers from OMB FEA, Clinger-Cohen Act, OMB A-130 and A11, Investment Budget, etc.)

Technology Architecture (TA) (FEA TRM) (DoDAF TV)

Application Architecture (AA) (FEA SRM)(OV)

Data Architecture (DA) (FEA DRM) (OV)

Business Architecture (BA)

(FEA BRM and PRM) (DoDAF OV)

Security Architecture (SA) (FISMA)

FEA and DoDAF/C4ISR

Conformant EA(8 months)

BEAM supports the development and maintenance of the enterprise architecture.

This slide illustrates that, of all of the elements of a full-scale enterprise architecture, only a few relate to information technology. The CIO typically has the lead in EA because IT has measurable economies and efficiencies to gain in satisfying business, legal, andregulatory requirements. But the lead can also come from a functional, program or project manager, or another executive such as the CTO, CKO, CHCO, CSO, CFO, COO, CEO, or President.

However, the enterprise executive with the authority to implement the full enterprise architecture, operational enterprise architecture, and intelligent-enterprise management is usually the organization CEO, President, Director, or Commanding General, as an Executive Management Agenda initiative.

BEAM extends the early “business systems planning/information strategy planning” (BSP/ISP) of IBM’s Dewey Walker, the later 1987Enterprise Architecture Framework of IBM’s John Zachman, and the later 1992 Enterprise Architecture Planning methodology of Steven Spewak.

While BSP/ISP, Zachman Framework, and Spewak methodology are highly useful and parallel, and can substitute for, much of the initial phases of the BEAM approach, they provide only a subset of the capabilities provided by BEAM. Part of this is because of the basic model applied by these earlier EA efforts. The early efforts are patterned on a “relational” or “matrix” model, while BEAM is patterned on an “object” model, which has the inherent capability of working with more “dimensions” of information than the relational model. The organizations which have used BSP/ISP, Zachman Framework (or its derivatives of FEA/FEAF/TEAF, DoDAF/C4ISR, CADM, DIAD, TOGAF, NASCIO, etc.), or the Spewak Methodology (for pursuing the initial elements of the Zachman Framework) can apply the results of those efforts directly to the BEAM implementation to shorten BEAM implementation time.

Page 44: Basic Enterprise Architecture Methodology (BEAM)

44

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

44

One WorldInformation

System

One WorldInformation

SystemBEAM Delivers Capabilities

Enterprise Model RelatingEnterprise andFunctional Missions

OrganizationMission Organization EA

•PRM Extension•BRM Extension•DRM Extension•SRM Extension•TRM Extension•FISMA SA (GEM)

Capability (Component, System)

Architecture

CapabilityDevelopment

Functional ReferenceArchitectureand Methodology

FunctionalRequirementsAndPriorities

Approved Designs

Multiple InputAnd Output Formats

Specifications supporting Federal Enterprise Architecture (FEA)• PRM = Performance Reference Model• BRM = Business Reference Model• DRM = Data Reference Model• SRM = Service Component (e.g., Application) Reference Model• TRM = Technical Reference Model• FISMA = Federal Information Security Management Act• SA = Security Architecture• MDEM = Model Driven Enterprise Management

CapabilityOperation and Maintenance

Deployed Components (Reality)

BEAM Results• Single repository for integrating and sharing

Intelligence for Operations• Traceability of Capability Architecture,

Development, and Operation costs to Executive Management Agenda and Enterprise and Functional Missions

BEAM enables a smooth flow, with accountability, from mission to implementation.

BEAM Repository (MDEM Technology)

• Missions• Visions• Goals• Performance Results• Reusable Component Management• Business Drivers• Technology Drivers• Relationship Drivers• Enterprise Architecture• AIS Design, Test Plans, Test Data• Metadata and Data Management• Physical and Digital Assets• Portfolio Management• Configuration Management

• Objectives• Strategies• Plans

This diagram illustrates the GEM repository, from a US Government perspective, as the mechanism for connecting business drivers, enterprise management, IT management, and IT components/assets. It can do the same for management of any category of assets.

Page 45: Basic Enterprise Architecture Methodology (BEAM)

45

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

45

One WorldInformation

System

One WorldInformation

SystemCapability (Requirement) Management Life Cycle

Life Cycle Development by Functional Area (Requirements Management Process)

BasicScenario

Performance(Load/Stress)

Test. Network,System,

Application, andService Tests

Function Test,Against Validated

Requirements

RequirementVerification.

Solution SatisfiesValidated

Requirements

RequirementValidation

RequirementDocuments

InternalFunctions

ExternalFunctions

OtherFunctions

Conduct ofFunctional

Activity

OrganizationalAnd Functional

Strategic Planning

Organization andFunction Plans

and Policy

Emails, TaskingLetters, ConceptPapers, Enquiries

RequirementStatements, With

Authorizing OfficialIdenity. Table ofemphatic "shall"

statements with aperson held

accountable ($) forits validity

Decision to Build orBuy Required

Capability

Buy Capabilityfrom Product/

Service Vendors

Build Capability,using System/

SoftwareDevelopers

Product/Service

EvaluationCriteria

VendorContact

System/SoftwareSpecifications (e.g., ISO 830-

1998 System RequirementSpecification (SRS))

Design Phase

Build Phase

Test Phase

Deploy Phase

Initial OperationalCapability

Deployment

Final OperationalCapability

Deployment

Product Evaluation.Anectdotal

(Documents,References),

Demonstration, andTest EvaluationsAgainst Criteria

Security Test

Security Review

Preliminary DesignReview

Critical DesignReview

EvaluationRecommendation

OperationalAcceptance Test

(OAT)

Operate, Maintain,and Dispose

System Engineering (ANSI/EIA 632) and/or Software Engineering (IEEE/EIA 12207) Life Cycle Process

Software IntegrationSystem Integration

Infrastructure IntegrationEnterprise Integration

Requirements Traceback

Functional IT Infrastructure/Systems/Software

Functional IT Infrastructure/Systems/Software

Functional IT Infrastructure/Systems/Software

Build

Buy

Develop

IntegrateIntegrate Product/Service Into

Enterprise, Infrastructrure,System, or Software

Prototype or FOCDevelopment

Using Product/Service

ISO 14258EnterpriseModeling

ISO 15704 Enterprise Reference Architecture and Methodology

Requirements Analysis Build/Buy Acquisition Activity Implement Capability

This diagram illustrates the life cycle of requirements management derived from day to day operations, with system and software development being traceable back to the underlying operational need. This life cycle is mapped to the corresponding standards which can be used to guide the management of development efforts and the corresponding methodology, notation, and tool selection of the enterprise.

Page 46: Basic Enterprise Architecture Methodology (BEAM)

46

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

46

One WorldInformation

System

One WorldInformation

System

Typical Manually Controlled Role-Based Security(What are you securing, from whom or what, in what situation?)

•Q: What are you securing? A: Resources (i.e., Assets) and Processes.•Q: Whom or what are you securing from? A: Users = persons, processes, devices, etc.)•Q: How are you securing? A: Assigning (i.e., giving responsibility and authority) resource access rights to users.•Q: How do you measure security? A: Regularly count vulnerabilities to any and all resources on enterprise and value-chain scale, and watch and measure vulnerabilities and breaches over time.

User Resource(AssignmentsBased on Human Knowledge and Actions)

•Networks•Databases

•Applications•File Systems

•Message Systems•Facilities

•EquipmentRelationshipManagement

Value-ChainProcess / Workflow

Operation

UserIdentity

UserInventory

ResourceInventory

And Classification

IdentityManagement

ResourceManagement

This diagram illustrates the elements of enterprise security enabled through the typical manual process. The weakness in this approach becomes apparent when the number of assigned requirements increase, and the need for changing assignments becomes more fluid.

Page 47: Basic Enterprise Architecture Methodology (BEAM)

47

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

47

One WorldInformation

System

One WorldInformation

SystemBEAM-Based Security for Internal Control

(What are you securing, from whom or what, in what situation?)•Q: What are you securing? A: Resources (i.e., Assets) and Processes.•Q: Whom or what are you securing from? A: Users = persons, processes, devices, etc.)•Q: How are you securing? A: Assigning (i.e., giving responsibility and authority) resource access rights to users.•Q: How do you measure security? A: Regularly count vulnerabilities to any and all resources on enterprise and value-chain scale, and watch and measure vulnerabilities and breaches over time.

User Resource(AssignmentsManagement)

•Networks•Databases

•Applications•File Systems

•Message Systems•Facilities

•EquipmentRelationshipManagement

Value-Chain

Process / WorkflowOperation

BEAM Knowledge Base (i.e., EA Management Repository)SUBJECT CONTEXTSUBJECT

AuthenticatePerson orProcess?

AuthorizeOr Prohibit

Access?

UserIdentity

RightsControl

UserInventory

ResourceInventory

And Classification

BEAM Content

Third Party Tools

IdentityManagement

ResourceManagement

BEAM KB to Specify User Resource Requirements and Distribution

BEAM KB to Specify Resource Access Constraints

BEAM KB to Assign (i.e., as Internal Controls) User Access Permissions to Resources

This diagram illustrates the elements of enterprise security enabled through the GEM methodology and supporting tools.

Page 48: Basic Enterprise Architecture Methodology (BEAM)

48

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

48

One WorldInformation

System

One WorldInformation

SystemBEAM Cycle “Tree” Analogy in relation to FEA and DoDAF/C4ISR Elements

Sec

urity

Man

agem

ent (

FIS

MA

)

Sec

urity

Arc

hite

ctur

e(F

ISM

A S

A)

Ope

ratio

ns

BEAM Approach To EA (e.g., Zachman, FEAF, FEA, TOGAF, Spewak, etc.)

BEAM Approach To DoDAF/C4ISR

EMM3-Functional Guidance and Intelligence

EMM3-Full Functional Reference Architecture

EMM3-Infrastructure

EMM2-Functional Operations (Rules)

EMM2-Functional Systems

EMM1-Functional Products (Templates and Instances)

Business Architecture(FEA BRM and PRM)

Data Architecture(FEA DRM)

Application Architecture(FEA SRM)

Technical Architecture(FEA TRM)

Functional Systems

System Products (Templates and Instances)

Infrastructure

DoDAF OperationalView

DoDAF Technical View

DoDAF SystemView

BEAM Approach To EA

BEAM operates from the principle of a “spiral life cycle”, also known as a “closed loop system”. The results of one cycle are fed into the next cycle, providing part of the basis for adjusting that subsequent cycle. In BEAM, EA information products, such as reports, documents, data, etc., are “recycled” by the enterprise to refine its knowledge about its EA. Because BEAM is based on the GEM “generalized” approach, BEAM can be applied to perform enterprise architecture in all its varieties.

Page 49: Basic Enterprise Architecture Methodology (BEAM)

49

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

49

One WorldInformation

System

One WorldInformation

SystemBEAM - System (EMM Level 1) Capability Architecture Elements

Configuration Management

Across all Aspects of the

Enterprise

Security Management

Enterprise Architecture References

Capability Documentation

Detail Design, Implementation Plan, Tracking, Performance Measurement, Reporting, and Adjustments

High Level Capability (e.g., System) Architecture

Life Cycle Stages

Quality Assurance and Performance Measurement

Content Development, Operation and Maintenance Performance (GEM)

AIS Certification and Accreditation (C&A) (GEM)

Customer Relationship Management (CRM), Business Utility (e.g., Balanced Scorecard), and Investment Goals (e.g., CPIC)

Customer, Business, and Investment Satisfaction (GEM)

Approved Runtime and Security Products and Software Design Patterns

Software, Development, Operation, and Maintenance (GEM)

Platform Development, Operation, and Maintenance (GEM)

Approved Runtime Products and Security Products

Infrastructure Development, Operations, and Maintenance (GEM)

Business Function Requirement and Process (BEAM Step 30 & 31)

Business Component Testing and Deployment(GEM)

Application, Runtime and Security Patterns, Runtime TRM Service Categories, Security Service Categories

Technology Architecture Reference Selection (Mechanisms for Access Control) (FEA TRM)

Application Architecture Reference Selection (Basis for Access Rules and Methods) (FEA SRM) (BEAM Step 30 & 31)

Application and Security PatternsData Architecture Reference Selection (Basis for Data Classification) (FEA DRM) (BEAM Step 30 & 31)

Business Component (i.e., Solution Set) Definition(BEAM)

Business, Integration, Composite, and Security Patterns

Business Architecture Reference Selection (Basis for Role-Based Access Control – RBAC) (FEA BRM and PRM) (BEAM Step 30 & 31)

Security Architecture Reference Selection(GEM)

System Business Component

Development

System Pattern Matching (Ref. IBM Patterns for eBusiness and

System/Software Design Patterns)

System Capability Architecture Elements

Bottom-Up EA. EA built up from the System Capability level by linking to or creating enterprise-wide EA references.

Page 50: Basic Enterprise Architecture Methodology (BEAM)

50

One WorldInformation

System

One WorldInformation

System

4. BEAM Procedures

Page 51: Basic Enterprise Architecture Methodology (BEAM)

51

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

51

One WorldInformation

System

One WorldInformation

SystemBEAM Project Gantt Chart (Blue Bars)

(BEAM Precedes GEM, BPR, and Capability Design, Development, and Operations)

ID Task Name2004

3 BEAM Site Survey

4 BEAM Initial BusinessArchitecture

5 BEAM Full BusinessArchitecture

7 BEAM Data Architecture

8 BEAM ApplicationArchitecture

9 BEAM TechnicalArchitecture

10 GEM EA-based SecurityArchitecture. EMM4

21 EA-Based Business ProcessImprovement. EMM2, After BEAM

22 Initial BPI List

23 Refined BPI List

24 Baseline BPI List

25 BPI Project Template

26 BPI Projects (Multiple)

29

EA-based Technology SolutionLogical Design (UML, Metadata/DataModel, Data Migration). EMM1, AfterBPI

30 Technology Logical Design ProjectTemplate

31 Technology Logical Design Projects(Multiple)

34EA-Based Technology PhysicalDevelopment. EMM1, After LogicalDesign

37 Technology Physical DevelopmentProject Template

38 Technology Physical DevelopmentProjects

2Basic Enterprise ArchitectureMethodology (BEAM) life cycle.EMM3

6 BEAM Enterprise ITArchitecture

2003

FebJanNov

BPI Projects (Multiple)27

BPI Projects (Multiple)28

Technology Logical Design Projects(Multiple)32

Technology Logical Design Projects(Multiple)33

Apr

35 Technology Insertion Assessment

36 Technology Build/Buy/ReuseAcquisition Assessment

May

GEM EA-based OngoingKnowledge Inventory. EMM412

GEM EA-based OngoingKnowledge Integration. EMM4/513

GEM EA-based OngoingKnowledge Structure Definition.EMM4/5

18

GEM EA-based SituationalAwareness. EMM520

Dec Mar Jun

1 GEM Methodology Life Cycle Phases

11GEM-Based Ongoing Security,Vulnerability, and Risk ManagementEstablished. EMM4

19

17

16

15

14 Expertise Location andCategorization

Expertise Development andCertification

Expertise Notification andRecall

Expertise Communication,Coordination, and Collaboration

GEM Ongoing Integration ofEnterprise Workflow, Applications,and Information. EMM4/5)

41

42

39EA-Based Functional TechnologyOperations and Maintenance. EMM1,After Development

Technology Operations40

Technology Maintenance

Technology Maintenance

BEAM Activities(Enterprise Architecture)

GEM Activities, includingDevelopment of SecurityArchitecture as predecessor toBPR and Solution Design, Development, and Operation; Sarbanes-Oxley Act support First/Rapid Response support, etc.

BPR Activities based on detailed enterprise and functional analysisresulting from BEAM.

Solution Logical Design, under EA governance, using standard system and software modeling techniques and approved products and Services from Technical Architecture

Solution Development andOperation under EA Governance

This diagram is available fordownload from http://www.one-world-is.com/beam/BEAM+GEM+IT%20Gantt.jpg

This resource-loaded project plan, in MS Project format, is available at http://www.one-world-is.com/beam/BEAM-EMM3%20Organization%20EA-IT%20Rollout.mpp

A calculator to identify the rough order of magnitude (ROM) cost and duration of a BEAM project for your organization may be downloaded fromhttp://www.one-world-is.com/beam/BEAM%20Organization%20Project%20Scaling%20Formula.xls

The BEAM approach is easily implemented and controlled through standard project management techniques, and can serve as the comprehensive and consistent systems analysis needed for enterprise and/or functional BPR and subsequent functional capability implementation and operation.

Page 52: Basic Enterprise Architecture Methodology (BEAM)

52

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

52

One WorldInformation

System

One WorldInformation

System

BEAM Information Structure

GEM Security Architecture

GEM ExpertiseManagement

GEM LearningManagement

GEM KnowledgeManagement

GEM EnterpriseProcess and Value-Chain

Workflow(Function as Service)

GEM Real-TimeSituationalAwareness

(Service Agents)

Updated through continuous functional refinement (dynamic data, metadata, ontologies, and knowledge) (technology insertion/refresh) (Adjust Mission down through Plan) (ContinuouslyImprove Internal Controls)

Management Integrated Strategic, Operations, and Project/Tactical Life Cycle

EnterpriseLocations

OrganizationsOrganization Units

Functions (e.g., WfMC)Policy

Process (e.g., BPMS)

Procedure

Template (e.g., Web Forms and WSDL)

Metadata

Transaction / Event

ResourceRole

Rules

TechnologyComponents

Interface

Behavior

Interaction

Responsibility

Authority

BudgetInput

Control(Internal and External)

Output

Mechanism

ProductionGoal

Mission

Vision

Goal

ObjectiveStrategy

(Program, Portfolio)

Plan(Recurring, Initiative)

Project

Task

Activity

Resource

Schedule

Dependency

Product(Deliverable

Implementation of Plan

TrackingPerformance

Reporting Performance

Adjusting Performance

Assessing Performance Against Plan

Assessment of Strategy, Objective, Goal, Mission, Function, and Enterprise

Reporting

Adjusting

TechnologyCategory

TechnologyVendor

Technology Product or Service

TechnologyInventory and

Tracking

Service(SRM, OV)

BusinessArchitecture

(e.g., BRM and CPV, PRM, OV)

DataArchitecture(DRM, OV)

Service ComponentArchitecture(SRM, OV)

TechnologyArchitecture(TRM, TV)

BusinessArchitecture

ServiceLevels

(BRM, SRM, OV)

Managed Interoperability Bus (Network and Service Infrastructure)

(Enterprise Service Bus (ESB), Service Oriented Architecture (SOA),

Enterprise Application Integration (EAI), Enterprise Information Integration (EII), Electronic Data Interchange, (EDI) etc.)

External / Internet Bus

Internal / Intranet Bus

ServiceBus(SV)

Priority and Ranking of Plan

(Operations, Investments)

Plan ManagementApproach

System Engineering Management Plan (SEMP)

Software Engineering Management Plan

Plan Technical Approach

Vocabulary

TaxonomySemantics

OntologyKnowledge

BEAM Enterprise Architecture (Core Enterprise Knowledge Base) (e.g., FEA, DoDAF, TOGAF8 Support) (AV). GPRA, GPEA, CCA, and FISMA Support. Sarbanes-Oxley Internal Control Verification Support.

Service Information Sets(Functional References)(Supports Workflow –WfMC, BPM, WSDL)

Enterprise Context (Supports Universal Application Network - UAN)

IT Management

The large frame in this diagram represents the hierarchy of subjects encompassed and integrated by BEAM to create a core enterprise knowledge base. The gray boxes to the left represent the GEM products built from the BEAM Knowledge Base content.

Page 53: Basic Enterprise Architecture Methodology (BEAM)

53

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

53

One WorldInformation

System

One WorldInformation

System

BEAM – Procedural Flow(Concurrently For All Enterprise Organizations, Functions, Programs, and Projects)

4. Function 6. Policy

15. Process

16. Procedure

17. Templates

19. Metadata

21. Data

18. Constraints, Rules, and Principles

8. Authority 26. Budgets 27. Budget Lines

22. Equipment, Supplies, and Service (IT and Others)

13. StrategiesDefinitions& Portfolios

14. Plans29. Functional

Programs& Projects

32. Performance

28. Expense Elements

5. Mission

9. Vision

10. Goals

11. Objectives

12. PerformanceIndicators

30. Technology Infrastructure, Systems, and Devices Testing, Development, and Deployment

31. Technology Prototyping, Operation, and Maintenance

7. Responsibility

23. Technology Catalog

24. Technology-Specification and Insertion

20. Data Dictionary

TechnologyArchitecture(IncludingTechnicalReference Model - TRM)

Data Architecture(Including FEA Data Reference Model - DRM)

ApplicationArchitecture(Including FEA Service Component Reference Model - SRM)

Business Architecture (Including FEA Performance Reference Model –PRM, and Business Reference Model - BRM)

25. Requirements

BA-BRMElements

BA-PRMElements

Function Capability

Components

Technology Components

ResourceManagement

Services

ITServices

3. Organization Unit 2. Organization 1. Location

This diagram illustrates the operational flow of an organization using the BEAM life cycle. It also represents the multiple-level linkage of EA entity/relationship or class schema. The BEAM procedure is equivalent to a resource management procedure. In this case, the resource managed by BEAM is architectural information and optionally, information about actual or intended instances of enterprise infrastructure and systems built, operated, and maintained in conformance with the architecture. BEAM enables refinement of enterprise architecture throughout each subsequent cycle. The information created, used, and modified in this procedure needs to be stored in a single repository to avoid fragmentation of the enterprise architecture.

This diagram also illustrates the operational flow elements of the BEAM Spiral Life Cycle overlaid on the top-level OMB FEA Model with its PRM, BRM, SRM, DRM, and TRM elements, shown as yellow frames. The light blue boxes represent operational activities common to most organizations, whether accomplished formally or informally.

Note that while an “enterprise architecture”, shown here as BEAM components in relation to the FEA model, has elements in common across all organizations, GEM extends the organization’s enterprise architecture to support the larger enterprise management process of secure organizational operations management from managed organizational intelligence. GEM extends the BEAM, FEA, Zachman Framework, C4ISR/DoDAF, TOGAF, TEAF, and other EA frameworks, and glues these EA efforts together with the operational efforts, melding them into a full enterprise management (EM) solution framework. GEM, as a methodology, repository, and repository-based and repository-integrated applications, provides a dynamic federated interoperability model for communities of interest (COI) within the enterprise, and a comprehensive EA and EM management approach.

The concepts underlying EA are not new. EA is largely the repackaging of what most who have taken an "enterprise view", or a "system view of the organization" have done all along.

Note that The EA and FEA, through BEAM or otherwise, are not ends in themselves, but are a means to gain control over technology expenditures, primarily IT expenditures. IT spending has shown the trend of suboptimization - spending on localized views of need for assigned or assumed functions, not prioritized enterprise requirements. This control over technology spending and the reduction of suboptimization directly supports the alignment of the Executive Branch and its operations with the President's Management Agenda, in pursuit of Performance Management and compliance with the Government Performance and Results Act (GPRA).

If the common operational artifacts above are reviewed by those outside of the EA and IT communities, then most will acknowledge that their organization performs the activities yielding enterprise-wide common operational artifacts roughly matching the PRM and BMR. Fewer will have enterprise-wide common operational artifacts matching the SRM, while even fewer will have enterprise-wide common operational artifacts matching the DRM and TRM.

The need for a closed loop EA process thus drives the need for a shared, distributed, common, enterprise-wide repository for EA. Without such a shared repository - an "enterprise brain“ - every activity in this flow that is not shared through the repository breaks that activity and its subsequent activities out of the "enterprise-wide" view and makes it a locally suboptimized activity. If an EA activity and its artifacts are not stored and processedin the shared repository, they are hidden from the enterprise view and enterprise accountability. This takes local operational autonomy too far in the direction of wildness and away from the controlled order needed by any organization to survive and thrive. It's like a wild mutation, or worse, like cancer. Most wild mutations are not beneficial to the organization/organism, and cancer is never beneficial. A closed-loop, self-referencing, environmentally adaptive, self-healing management process is needed.

Page 54: Basic Enterprise Architecture Methodology (BEAM)

54

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

54

One WorldInformation

System

One WorldInformation

System

BEAM – Procedure Steps0. Identify your enterprise, most typically your organization. For your enterprise, identify the following to the degree you consider economical and relevant. Store and maintain

all of this information in a single data store to reduce enterprise fragmentation.1. What locations are relevant to you? Where do you operate?2. What is your organization's name? What are the organization names of your value-chain stakeholders (i.e., customers, suppliers, authorities, and partners), and what are

their locations which are relevant to you?3. What are your organization's internal units, as typically portrayed as blocks on an organization chart, or more formally identified by a budget, plan, or program within your

organization's aggregate financial management plan? What are the relevant organization units of your customers, suppliers, authorities, and partners for each internal organization unit?

4. What are the functions (i.e., assigned work) performed by your organization units? What are the relevant functions performed by their relevant organization units of your customers, suppliers, authorities, and partners?

5. What is the mission of each organizational unit's function?6. What policy governs the function?7. Which person, identified by name, unique identifier, and assigned position, is responsible for achieving the function's mission?8. What is the boundary of the functional mission's authority in terms of function, functional interfaces, organization units, organizations, and locations?9. What is the responsible person's vision of perfect mission performance?10. What measurable goals has the responsible person defined to achieve the vision of perfect mission performance?11. What performance objectives, specified in terms of schedule, cost, and quality, has the responsible person defined to attain these goals?12. What quantitative performance indicators give proof of reaching the objective on time, within budget, to the required quality specified?13. What strategies, including executing portfolios of investments, will enable the responsible person to quantitatively prove, through meeting the specified performance

indicators, that they have attained their objectives, and thus goals, and thus mission?14. What plans, either for recurring operations or new initiative projects, will be used to implement each strategy?15. What process will be followed in performing the planned recurring operation or initiative project?16. What specific procedure will be followed at each defined step of the process?17. What template will be used to collect or present information used in the procedure, and is this template automated (e.g., online form, web service) or manual (paper)?18. What constraints, rules, or principles must be complied with in using the template?19. What metadata does the template and constraint contain?20. What is the unique ID for each metadata item in each template and each constraint?21. What is the procedural transaction data for each metadata item in the template or constraint?22. What equipment, supplies, and/or service is required to complete the procedure, in what quantity, with what qualities, on what schedule?23. What category describes each equipment, supply, and service resource, and is this category approved by the enterprise's architecture (i.e., component and interface)

control authority to avoid wild variance in enterprise resources?24. What are the item/product/vendor specifics of the equipment, supply or service required for the procedure, and is this technology ubiquitous, in early adoption, or in the

research stage? 25. What are the collected requirements, defined in terms of procedural performance resources, in specific quantities, with specific qualities, at specific times, at specific cost,

for fully implementing the plans?26. What is the budget in the current and future years for filling the requirements of the plans, for the strategies, in accomplishing the function's objectives, goals, and mission?27. What budget line items, in the aggregate, fully describe the requirement?28. What elements of expense (i.e., pre-established categories of resources) categorize each budget line?29. As sub-functions, what programs, as collections of inter-related projects, and which program and project managers, are given responsibility for satisfying the requirements?30. What capability technology insertion, development, and deployment projects are governed by the Program and Project Managers, and what are their detailed performance

schedule, budget, and quality constraints? (Use ANSI 632 System Engineering Process, and ISO 12207 Software Life Cycle Management as guidelines here)31. What initial and recurring capability prototyping, operations, and maintenance are governed by the Program or Functional Managers, and what are their detailed

performance schedule, budget, and quality constraints? (Use ANSI 632 System Engineering Process, and ISO 12207 Software Life Cycle Management as guidelines here)

Feed all collected responses to these questions into the EA repository, noting that items 30 and 31 related to actual infrastructure and system development, deployment, operation, and maintenance, not enterprise architecture. However, these items form the basis for measuring compliance with the architecture and the success/fit of the architecture to the enterprise/function mission.

BA

BA

DAAA

TA

Business architecture is developed in steps 0 through 19 and 25 through 31. Data architecture is developed in steps 17 through 21. Application architecture is developed in steps 18 through 21. Technical Architecture is developed in steps 22 through 25. Note that Information Technology is considered only as one category within the TA and is not given consideration in the BA, DA, or AA.

Page 55: Basic Enterprise Architecture Methodology (BEAM)

55

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

55

One WorldInformation

System

One WorldInformation

System

C. EvolvingTime-PhasedArchitecture (TRM)

B. Proven PatternsAnd SharedComponents

A. TechnologyInsertionCenter

11. Future IT Architecture (TRM)

+ Exploratory Change

8. Next Generation. IT Architecture (TRM) +

Proactive/ Planned Change

5. Current IT Architecture (TRM) + Rapid Adaptive Change

10. Future IT Infrastructure

Prototypes / Testbed / Shared Components

7. Next Generation IT Infrastructure

Prototypes / Testbed / Shared Components

4. Current IT Infrastructure /

Shared Components

Architecture Driver Roles•User Awareness

•Functional User•Functional Technologist

•IT Management Awareness•IT Researcher•IT Architect•IT Infrastructure Engineer•IT System Engineer

CommonUse

I. R&D III. Standards V. DeployedII. Early

PrototypesIV. EarlyAdoption

VI. EarlyDeployment

VII. UbiquitousDeploymentIT Technology/

Product Status

12. Advanced Technology Demonstration Systems

9. Prototype Systems

6. Pilot Systems

3. Current Systems

Deprecated Use

1. Business Architecture

(BRM)

2. Existent Data (DRM)

and Application

(SRM) Architectures

Technology Insertion/Refreshment Process Flow(Within Steps 24, 30, and 31 of BEAM Procedure)

This diagram illustrates the phases of activity involved in developing and implementing an IT Architecture and the related infrastructure and systems. If reading the bottom bar from right to left, an organization cannot gain ubiquitous deployment (i.e., VII) of some IT capability until the capability has progressed through most, if not all, of the preceding phases (i.e., I – VI).

Page 56: Basic Enterprise Architecture Methodology (BEAM)

56

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

56

One WorldInformation

System

One WorldInformation

SystemTechnology Insertion/Refreshment ProcedureThe process for reviewing technology for insertion into the organization can use the following steps.1. Determine the business architecture2. Determine the data and application architectures.3. Examine the current (As-Is) technology infrastructure and systems supporting the applications’ processing of data

for business operations. Identify the requirements for inserting other technology (either new or common-use) into the ToBe infrastructure or systems. Plan the insertion project. Initially test the insertion as a pilot system (i.e., #6) in a lab. Initially implement and operate the insertion pilot. Operationally test the insertion. Gain acceptance of the insertion operational results. Fully implement the insertion as a production system. Operate and maintain the inserted technology.

4. Identify the technology components in the pilots, systems, and infrastructure that have use across multiple applications, data models, and business processes.

5. Register the successful pilot and operational technologies in the TRM as suitable for production systems, and have future system/infrastructure developers specify the technology’s TRM category in their initial plans and design.

6. Develop and test pilot systems using early-adoption and deployed-standard technologies in the lab.7. Identify technologies in the pilot that need to be prototyped in a lab yet which appear to satisfy unique and

common requirements.8. Include the successfully prototyped deployed technologies in the TRM as suitable for “Next Generation” and pilot

systems.9. Develop and prototype systems using R&D, pre-standard, and new-standard technologies in the lab.10. Identify technologies in the prototype that need further R&D and standardization.11. Include successfully prototyped pre-standard technologies in the TRM as suitable for future prototypes and pilots.12. Work with researchers to conduct Advanced Technology Demonstrations prior to the technology’s standardization

and register successfully demonstrated technology in the TRM as appropriate for prototyping and piloting of future systems.

Page 57: Basic Enterprise Architecture Methodology (BEAM)

57

One WorldInformation

System

One WorldInformation

System

5. Standards/Technology Supporting BEAM

Page 58: Basic Enterprise Architecture Methodology (BEAM)

58

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

58

One WorldInformation

System

One WorldInformation

System

Information Assurance Common Criteria (ISO 15408)

BEAM - Enterprise IT Reference Architecture (i.e., Technical Process Standards)

Enterprise Modeling (ISO 14258)

Enterprise Reference Architecture and Methodology (ISO 15704, FEA, ISO 9000)

SEI Capability Maturity Model Integrated (CMMI) (IT)

Standards Container / Component Relations

BEAM leverages these standards and others

ANSI/EIA 748-1998, Earned Value Management Systems

Acquisition Management (e.g., DoD 5000 Series, CMM, CMMI)

ISO/IEC 11179 Series – Specification and Standardization of Data Elements (IT)

Configuration Mgmt (ANSI/EIA-649)

System and Software Requirement Specification (IEEE 1233-1996 and 830-1998) (IT)

Process for Engineering a System (ANSI/EIA 632) (IT)

Software Life Cycle Management (IEEE / EIA 12207.x) (IT) Resource Management,

RequirementsManagement, and Access Provisioning

Information Assurance(Defining and Defending the Enterprise External and Internal Boundaries)

EnterpriseMissionManagement(GPRA, CC/ITMRA, Performance Management, IT Investment Planning and Management)

Enterprise References (Policy, Process, Procedure, Templates, Standards), Methodology, Role Management, and Architectures

This diagram illustrates the enterprise and IT standards leveraged by BEAM, and the applications and resultant functionality that results from implementing them as parts of the GEM whole-enterprise management approach.

Page 59: Basic Enterprise Architecture Methodology (BEAM)

59

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

59

One WorldInformation

System

One WorldInformation

SystemBEAM Information Product CategoriesContext

(Individual or CollectiveWorld View,

Philosophical Ontology)

Information(Structured

and Unstructured)

Words(Concepts, Tagged

Information)

Keywords(Major Concepts,

Tagged Information)

Taxonomies(Categorized Word

Inventory, With Word Variants)

Concept Maps(Keyword Relations:

Category, Containment, Sequence, Change, Reference)

Data Models(Keyword (i.e., Entity)

Relations, with Attributes)

Semantic Models(Detailed Data Models,

with Detailed Relationships)

Data Meaning(Significance, or value,

of Entity to Users, Meaningful Information)

Applications(Automated Rule-BasedProcessing of Data for

Transactions and Analysis)

Dictionaries(Words and Phrases,

With Definitions, Variants, and Usage)

Lexicon/Vocabularies(Function-Specific

Word and Phrase Variants)

Databases(Entity Values)

Process Models(Information/Work Flow

Across Users and Value Chain)

PrehistoryTill Now

1951 TillNow

Timeframe for Intelligence Technology

Item, List, Outline, Table,

Reference Table

Network, Hierarchical, and Relational

Database, Hierarchical Directory,

Multidimensional Database

Page 60: Basic Enterprise Architecture Methodology (BEAM)

60

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

60

One WorldInformation

System

One WorldInformation

System

BEAM, with Your EA and Other Tools, with MDEM™

MDEM MOF Repository(Open Source and Multiple Vendors)

BEAM

Tool Repository or Format

Legacy EA Tools (UML, XMI, IDEF, or Proprietary Formats)(Metis, PTech, Popkin, Agilense/Adaptive, Rational, Poseidon, etc.)

XMIEAMS Tools

(OMB Exhibit 300 Support)

XMI

CIM

IT Management Tools(Network, Platform, Help Desk,

Applications, Storage)(WBEM)

Metadata Repository Metadata and Data Management Tools

(Application Data Models, Warehouse Data Models,

i.e., IDEF1X, ORM))(Operational and Analytical Data)

CWM

The BEAM methodology, in conjunction with a robust mechanism to collect and relate data from a variety of tools, provides the start point for MDEM.

Page 61: Basic Enterprise Architecture Methodology (BEAM)

61

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

61

One WorldInformation

System

One WorldInformation

System

OMG 4 Layer Metamodel for MDEM(MDA, SPEM, XMI, GEM/BEAM, CIM, CWM)

M3 MOF

M2

M1

M0

MetaObject Facility(metadata repository)

MOF Extension/Profile

MOF-based Application Design

MOF-basedApplication Instance

UML (SPEM)

RUP

ImplementedProject

SW Process Metamodel

SW Process Model

SW Process Performance Or AggregatedPerformance

Object Metaschema (Generalized Object Model, Generalized Object Repository)

UML (XMI)

RUP

ImplementedProject

SW Design Metamodel

SW Design Model

SW DesignFor System orAggregated Design

BEAM Metaschema

BEAM Schema

ImplementedProject

BEAM Design Metamodel

BEAM Design Model

BEAM InstanceIn Enterprise Or AggregatedGEM Capability

CIM Metaschema

CIM Schema

IT ManagementRepository

CIM Design Metamodel

CIM Design Model

CIM InstanceOn Device, orAggregatedIT Management

CWM Metaschema

CWM Schema

Data ManagementRepository

Data Design Metamodel

Data Design Model

Data Model Or AggregatedData Models

This diagram provides a means of comparing the underlying structure of BEAM to “object” management standards.

Page 62: Basic Enterprise Architecture Methodology (BEAM)

62

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

62

One WorldInformation

System

One WorldInformation

System

Model Driven Enterprise Management - MDEM - Technology (GEM Support)

GEM Schema Tools(IntegratedEnterprise,Function,Process,Data,System,Software,Security,&KnowledgeModelingAnd Management)

6. Products Supporting BEAM

OMG Managed Object Format (MOF) Repository

Enterprise Architecture Schema(FEA, DoDAF, TOGAF, etc.) Business, Data, Application, & Technical)•Agilense WebModeler•Popkin SA•PTech•Computas Metis•Other EA/CASE Tools

IT Management Tools

OpenGroup and OMG Object Metaschema

GEM-based Operation, Asset, Vulnerability, and Security Management Tools

CWM Schema (Data and Metadata Models)•Data Modeling•Metadata Management•BI Tools•OLAP Tools•Data Warehouse Tools•3HT eSnap•Schema Logic•MetaMatrixORM Tools (for Semantic and Data Modeling)

•MS Visio for EA

•MS VisioModeler

XMI Schema (Application Models)•UML Tool Examples

•Rational•Poseidon

ORM Tools (Semantic Models)

•MS Visio for EA•MS VisioModeler

Open StandardSoftware Process

Engineering Metaschema

(SPEM) Standards and Tools (GEM)

Open Standard Business Process

Integration (WSDL, BPM) and Workflow (WfMC, UAN)

Standards and Tools

(GEM)

CIM Schema (IT Models) (MOF)•Troux (HW/SW/Net/EA)•Isogon (SW)•Tivoli TM1•MS SMS•BMC Patrol•HP OpenView•Other WBEM ToolsStandards Subsumed byCIM/MOF•SNMP IP Tools (MIB)•Desktop Mgmt Tools (MIF)•HelpDesk Tools (SES/SIS)•Others

BEAM and GEM Repository elements, showing enterprise management, enterprise architecture and IT operation management components. Standard are underlined.

Page 63: Basic Enterprise Architecture Methodology (BEAM)

63

One WorldInformation

System

One WorldInformation

System

7. Sample BEAM Implementation Project Plans

Page 64: Basic Enterprise Architecture Methodology (BEAM)

64

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

64

One WorldInformation

System

One WorldInformation

System

7.1 Sample BEAM Organizational EA (EMM 3) Project Plan

ID BEAMStep

Task Name BEAM Deliverable Durat ion

1 Develop Enterprise Architecture 174 days2 Preparation Phase Determine Scale, Complexity, and Readiness for EA 10 days3 Site Survey and Readiness Assessment 10 days4 Repository installation and configuration 5 days5 Operation Management Conduct BEAM Operations Management 169 days6 Repository Operation, Maintenance, and

Customization169 days

7 Change Management Planning, Dissemination,Implementation, and Tracking. BEAM Tailoring

164 days

8 Initial Business Architecture Business Case for Full EA (EMM 3) and GEM (EMM 4and 5), Partial EA (Extending FEA BRM into initial GEMFunctional Knowledge Base). Initiate Role-BasedAccess Control – RBAC definition for physical anddigital asset security.

42 days

21 Full Business Architecture FEA compliant BRM. Additional Information forPhysical and Digital Asset Management Security.Initial Process Modeling for Workflow and AssetDistribution. Additional Information for Enterprise

40 days

27 Enterprise Architecture BRM, PRM, DRM, SRM, and TRM for FEAConformance. Enterprise Guidance Inventory.

35 days

36 Budget and Portfolio Development Enterprise Portfolio Analysis. 30 days42 Infrastructure, System, and IT Management

Linkage to EAMapping of Resources to Mission. 5 days

BCBE,BC

BE

BC

T W T F S S M T W T F S S M T W T F SDec 7, '03 Jan 11, '04 Feb 15, '04 Mar 21, '04 Apr 25, '04 May 30, '04 Jul 4, '04 Aug 8, '04

Labor Category Initials Rate Work CostBEAM Consultant BC $280.00/hr 1,382 hrs $386,960.00BEAM Repository Engineer BE $120.00/hr 1,392 hrs $167,040.00Business Architect BA $170.00/hr 1,216 hrs $206,720.00Data Architect DA $150.00/hr 222 hrs $33,300.00Application Architect AA $150.00/hr 142 hrs $21,300.00Technology Architect TA $150.00/hr 360 hrs $54,000.00

Estimate $869,320.00

Page 65: Basic Enterprise Architecture Methodology (BEAM)

65

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

65

One WorldInformation

System

One WorldInformation

System

7.2 Sample BEAM Functional Architecture (EMM2) Project Plan(e.g., for A76 Studies and As-Is Function Modeling Independent of Organization EA)

ID BEAMStep

Task Name BEAM Deliverable Duration

1 Develop Functional Architecture prior to Full OrganizationEA

Rich functional As-Is model for Planning improvement,competetive sourcing, and start of knowledge managementand skillset alignment.

22 days

2 Preparation Phase Determine Scale, Complexity, and Readiness for ArchitectureEffort

2 days

3 Site Survey and Readiness Assessment 2 days

4 Repository installation and configuration 1 day

5 Operation Management Conduct BEAM Operations Management 20 days6 Repository Operation, Maintenance, and

Customization20 days

7 Change Management Planning, Dissemination,Implementation, and Tracking. BEAM Tailoring

19 days

8 Initial Function Business Architecture Business Case for Full EA (EMM 3) and GEM (EMM 4 and 5),Partial EA (Extending FEA BRM into initial GEM FunctionalKnowledge Base). Initiate Role-Based Access Control –RBAC definition for physical and digital asset security.

6 days

21 Full Function Business Architecture FEA compliant BRM. Additional Information for Physical andDigital Asset Management Security. Initial Process Modelingfor Workflow and Asset Distribution. Additional Informationfor Enterprise Knowledge Base.

7 days

27 Function Enterprise Architecture BRM, PRM, DRM, SRM, and TRM for FEA Conformance.Enterprise Guidance Inventory. Metadata and Data Inventory.

4.5 days

36 Budget and Portfolio Development Enterprise Portfolio Analysis. 3.5 days42 Functional Infrastructure, System, and IT Management

Linkage to Functional ArchitectureMapping of Resources to Mission. 0.5 days

BC

BE,BC

BE

BC

M W F S T T S M W F S T T S M W Fec 28, '03 Jan 4, '04 Jan 11, '04 Jan 18, '04 Jan 25, '04

Labor Category Initials Rate Work CostBEAM Consultant BC $280.00/hr 207.5 hrs $58,100.00BEAM Repository Engineer BE $120.00/hr 168 hrs $20,160.00Business Architect BA $170.00/hr 170 hrs $28,900.00Data Architect DA $150.00/hr 36 hrs $5,400.00Application Architect AA $150.00/hr 28 hrs $4,200.00Technology Architect TA $150.00/hr 40 hrs $6,000.00

Estimate $122,760.00

Page 66: Basic Enterprise Architecture Methodology (BEAM)

66

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

66

One WorldInformation

System

One WorldInformation

System8. BEAM Scenarios for Initial EA Governance Cycle

• Enterprise-wide (Top Down) Implementation = BEAM Procedure Steps 0-31

• System-level (Bottom Up) Implementation = BEAM Procedure Steps 22-31, 0-21 multiplied by number of systems to be architected and linked to Functional Architecture.

• Functional (Middle Out) Implementation = BEAM Procedure Steps 13-31, 0-12 multiplied by number of functions to be architected and linked to Enterprise Architecture.

Page 67: Basic Enterprise Architecture Methodology (BEAM)

67

2/19/2004 This Work Is Provided Under The Creative Commons Attribution-NonCommercial-ShareAlike License of Roy Roebuck, 1982-2003. http://one-world-is.com/beam

67

One WorldInformation

System

One WorldInformation

System9. BEAM Summary• BEAM provides a comprehensive step by step procedure to walk an

organization, group, or person through the inventory, identification, categorization, and subsequent management of things that are important to them.

• BEAM provides the process and information products needed for enterprise architecture management

• BEAM can be used for many purposes beyond developing an enterprise architecture and IT portfolios, to include providing the Enterprise Knowledge Base foundation for:– Security Management– Knowledge/Expertise Management– Real-Time Situational Awareness– Business Process Reengineering– IT Design/Development/Operations– Outsourcing/Reorganization/Realignment/Relocation Studies– Performance Management of Enterprise and Functional Missions