labyrinth 发表于 2025-3-23 11:44:10
https://doi.org/10.1057/9780230378278In the previous section, we introduced the process layer. This layer is positioned between the business operating model and all subsequent layers and drives the activity that ensures that the support and outcomes are delivered.right-atrium 发表于 2025-3-23 14:38:00
http://reply.papertrans.cn/32/3116/311552/311552_12.pngchondromalacia 发表于 2025-3-23 19:07:52
Adapted: London, Dorset and Oxford,The data and information services layer addresses activities associated with structuring, manipulating, controlling, and exposing data and information across the enterprise from a wide range of multiple structured and unstructured sources. See Figure 7-1.Gerontology 发表于 2025-3-24 01:03:49
http://reply.papertrans.cn/32/3116/311552/311552_14.png鞭打 发表于 2025-3-24 05:49:00
http://reply.papertrans.cn/32/3116/311552/311552_15.pngFlinch 发表于 2025-3-24 09:48:00
https://doi.org/10.1057/9780230118843Value-adding services or hygiene services represent capabilities that are not essential but are more desirable, especially when the organization needs to maintain a steady state for the technology landscape.NOT 发表于 2025-3-24 12:35:55
http://reply.papertrans.cn/32/3116/311552/311552_17.pngisotope 发表于 2025-3-24 17:21:30
,Hardy’s Use of Biblical Allusion,In previous chapters, we touched on some of the core products and services provided by an EA function that aim to control, inform, and direct (CID) the strategic use of technology within the organization. To simplify the overall service provided by an EA function, we can cluster the offering into five distinct categories.osculate 发表于 2025-3-24 22:58:34
http://reply.papertrans.cn/32/3116/311552/311552_19.png改变 发表于 2025-3-25 01:01:01
Architectural PurposeAn economical question often asked by academics, stakeholders, and critics of an enterprise architecture function is “.hy . EA, as with most central services, has an opportunity cost associated with it, i.e., a cost of a foregone alternative, one in which resources are diverted away from potentially critical project IT activities.