Our application architecture can provide a blueprint for the individual application systems to be deployed, their interactions, and their relationships to the core business processes of the organization. Application architecture components includes: application service catalog, application inventory and types, functional requirements, application (service) relationship model, data flow diagram, interface model, application phasing model.
Our information architecture services provide data model design for enterprise-wide data objects and relationships such as person, entity, activity and offering. We can also provide detailed data definitions for the key attributes of each of these objects. Information architecture describes the structure of an organization's logical and physical data assets and data resources, includes: business key performance indicator catalog, information list / catalog, data dictionary, entity relationship model, information flow model and canonical data model.
Our infrastructure architecture describes the technology infrastructure intended to support the deployment of core, mission-critical applications. The infrastructure architecture components includes: technology service catalog, technology inventory and types, non-functional requirements, network diagram, IT security model, data center diagram, server diagram, storage diagram.
- Technology service catalog describes what non-functional components are provided by IT infrastructure, e.g. processing, storage, networking, security, presentation (clients), etc.
- Technology inventory and types describes, for each software application, what technology platforms are involved - vendors, hardware, versions, etc.
- Non-functional requirements are the statements of performance or service level agreements required from IT infrastructure, e.g. scalability, availability, throughput, capacity, etc.
- Network diagram is a schematic which shows how applications, servers, data centers, clients and physical locations are connected, including network types, bandwidths, routers, firewalls, etc.
- IT security model shows for all applications and IT infrastructure components, how security is covered: access, authentication, authorization, encryption, privacy, intrusion prevention, etc.