An e-business architect must focus on several key domains during the **architectural decision-making process** to ensure that the solution aligns with business goals, technology capabilities, and operational requirements. These domains include:
-
Business Domain
- Focus: Understanding the business goals, strategy, and processes.
- Key Considerations:
- Alignment of the architecture with the business objectives.
- Scalability to support future growth and market demands.
- Customer experience and engagement models.
- Compliance with business policies and regulations.
-
Application Domain
- Focus: Defining the application landscape to support business processes.
- Key Considerations:
- Integration of new applications with existing systems.
- Application lifecycle management (e.g., development, deployment, updates).
- Suitability of off-the-shelf vs. custom-built applications.
- Ensuring high availability and performance.
-
Technology Domain
- Focus: Selecting and utilizing the right technologies to build the architecture.
- Key Considerations:
- Choice of platforms (e.g., cloud vs. on-premises).
- Technology stack selection (e.g., programming languages, frameworks).
- Adoption of emerging technologies like AI, IoT, and blockchain if relevant.
- Vendor and product evaluation to meet technical requirements.
-
Data Domain
- Focus: Managing data assets effectively to support business needs.
- Key Considerations:
- Data storage, retrieval, and processing mechanisms.
- Data security, privacy, and compliance (e.g., GDPR, CCPA).
- Ensuring data integration across platforms and systems.
- Analytics and insights for decision-making.
-
Integration Domain
- Focus: Establishing seamless communication and interaction between systems.
- Key Considerations:
- API strategy and standards for system communication.
- Middleware and enterprise service bus (ESB) adoption.
- Managing data exchange between internal systems and external partners.
- Real-time vs. batch integration needs.
-
Security Domain
- Focus: Protecting the e-business architecture from vulnerabilities and threats.
- Key Considerations:
- Identity and access management (IAM).
- Network security, application security, and data encryption.
- Risk assessment and mitigation strategies.
- Regulatory compliance with security standards (e.g., ISO 27001, PCI DSS).
-
User Experience (UX) Domain
- Focus: Ensuring the architecture delivers a seamless and intuitive experience.
- Key Considerations:
- Responsive design for cross-platform usability.
- Accessibility compliance (e.g., WCAG standards).
- Personalization and localization capabilities.
- Performance optimization for end-user satisfaction.
-
Operations Domain
- Focus: Ensuring smooth ongoing operations and support.
- Key Considerations:
- Monitoring and logging for proactive maintenance.
- Disaster recovery and business continuity planning.
- Automation for deployment and system updates.
- Training and support for operational teams.
By addressing these domains comprehensively, an e-business architect can ensure a robust and scalable architecture that meets business needs, is technically sound, and provides a high-quality user experience.
Domains are the specific focus areas of architectural decision making:
- Business (processes, organizational structure, and geographic distribution)
- e-architecture feedback
- Application (the major systems implementing business functionality)
- Information (the information we are interested in such as who owns it and where does it live)
- Technical (my hardware, network, and operating system standards, and how I manage them)
These domains can be viewed from each perspective on the IT scale, yielding a set of building blocks.
| Deliverables matrix in e-business |
| Architecture Scale / BIT Layer |
Global |
Enterprise |
Management |
Point Solution |
Framework |
Micro |
Build |
| Business Architecture Deliverables |
Inter-company Business Drivers & Objectives; Identified Opportunities; Target Channel Partners; Market Analysis; Value Chain Assessment; Contracts & Alliances
|
Business Metrics, Internal Process Definitions; Organizational Design; Strategic Plan; Business Case |
Organizational Roles & Responsibilities; Business Unit Objectives; Process Flows; Service Level Agreements; Financial Models
|
Business Process Definitions; User Group Definitions; Functional Specifications |
Rulebases, Simulation Engines |
User Storyboards, Scenarios, Scripts, Actors |
Measures, Tolerances |
| Information Architecture Deliverables |
Transaction Specifications (e.g., EDI), Data Specification Standards (e.g., RosettaNet) |
TBD - Includes EDI data mappings to enterprise systems; Data Access Standards; Enterprise Data Dictionary,
Knowledge Taxonomy & Ontology |
Subject Area Database Definitions |
Data Models, Data Flows, CRUD Matrices, Object Models, Use Cases, Data/Object Management Requirements |
Media Standards & Management Tools, Object Model vs. Relational Model, Data Mappings |
DDL, Stored Procedures, Load & Extract Routines, Data Conversion Routines |
Attributes, Data Types |
| Application Architecture Deliverables |
Extranet Functional Requirements (B2B), Commerce Functional Requirements, Personalization, Security & Privacy Certification Requirements |
ERP Functional Requirements & Selection, Intranet Functional Specifications & Usage Policy |
Application Interface Specifications, Change Control Procedures, Scalability & Extensibility Requirements |
OTS SW or ERP Module Requirements & Selection, User Acceptance Criteria, Content Management Tool Selection |
User Interface Standards, UI Controls & Display Parameters |
Functional Components: ERP Modules, Applets, Servlets, EJB Beans, VB Macros, Encryption Tools (e.g., PGP) |
Scripting & Programming Languages (e.g., PERL, Javascript, VB Macro Language) |
| Technical Application Services Deliverables |
Messaging Protocols & Standards; Firewall Configuration Standards; Certificate Authority & Key Management |
Middleware & Integration Approach Standards; Guidelines, Enterprise Object Standards (e.g., EJB Standard) |
Adapter & Message Requirements, Development Guides, Data Access Tools (Impromptu, ODBC), Application Servers |
Maintenance Requirements & Procedures, Development Environment Tools (IDEs)
|
Development/Integration Frameworks (e.g., CORBA, DCOM, EJB) |
Class Libraries (Code), Encryption Algorithms & Methods (e.g., Public Key)
|
Programming Languages (e.g., Java, C++), Visual Development Tools (Photoshop)
|
| Technical Infrastructure Deliverables |
HTTP/XML Standards, Network & Firewall Stand, Protocol & Port Specification; WAN vs. Internet Delivery Assessment; Internet POP & ISP Requirements/Specs; ISP Service Level Agreements; Web Traffic Metrics & Impact Analysis
|
Platform Standards (Server & OS); LAN & WAN Network Equipment Specification & Configuration; RDBMS/CODDMS Selection
|
Database Gateways, LAN & WAN Management Standards & Protocols, Sockets & RPC/RMI, Web Servers, Routers & Load Balancers (HW or SW)
|
User Admin Tools & Audit Logs, System Reporting, Development Platform Specification
|
Storage & Peripheral Devices, Cabling & Physical Configuration, Credit Cards & Physical Access
|
Drivers, DLLs, x25, IP Maps, Cryptocards (e.g., Rainbow) |
Compilers, Interpreters (e.g., Java Virtual Machine)
|