UAM

The Methodology

The Unified Architecture Method (UAM) defines a methodical approach to the creation of IT architectures. UAM covers all aspects of IT architecture, from entity modeling, process modeling, network modeling, and modeling of actors and roles. Create IT architectures at the enterprise level or the component level, and every level in-between. The heart of UAM is the Business Process Model and Notation (BPMN), extended with additional modeling elements that permit the definition of complete architectures that, by default, include IT security constructs. The methodology supporting this approach includes all required processes, deliverables, and detailed example architectures.

The Book

The book A Simplified Approach to IT Architecture with BPMN A Coherent Methodology for Modeling Every Level of the Enterprise describes UAM. It distills the insights a seasoned IT professional gathered over the course of thirty-five years spent studying, designing, deploying, analyzing, and refining IT architectures. This approach, rooted in models, follows a logical process for creating architectures that can unify corporate IT across every level of the enterprise. Anyone involved in IT, IT design, IT management, and IT development would benefit from reading the book—not just IT architects. The book:

  • Demystifies IT architecture – learn what IT architectures are and how they are used;
  • Defines IT architectures – understand the models required and how to create them;
  • Describes the IT Security architectural pattern – this pattern is integrated into UAM, a must in this interconnected world;
  • Describes the architecture life-cycle – learn how IT architectures are created, validated, maintained and used.

The book and UAM, clarifies what IT architecture is, where it fits within the enterprise, how to produce valid IT architectures, and how to apply the resulting models to advance the goals of the enterprise. In addition, with IT security constantly in the news, IT architectures must include this aspect. This book, and the associated UAM Methodology, integrate IT security right into your IT architecture. Regardless of the methodology used, improve your understanding of IT architectures and IT security through reading this book! The book is available for purchase directly from iUniverse, Amazon, or Indigo.

  

 
 
 
“I applaud the author for accomplishing all that he has. He has taken software development methodologies industry best practices, customized them with his own material — some of which I find refreshingly unique, made them available in a customizable repository, and written this great book on how to use it. This book is nicely organized and easy to read. It does a great job of presenting the material. I highly recommend it to anyone interested in learning more about IT Architecture and SDLC (systems development life cycle) tailoring. Personally I think it is a great contribution to the industry.”  

The very best book I’ve ever seen on IT Architecture. And I’ve seen a lot. I am an “Enterprise Architect” in a Fortune 20 company, and have been for decades. This book seems to bring more knowledge together in a single place than any other IT Architecture book I’ve ever seen.

The Framework

The UAM architecture framework (the set of models as defined in the methodology) is different from other approaches; and using this framework separates concerns for the target audiences in two ways:

  1. Vertically – the top level perspective is for business people, the next level defines Logical models, and the Technical Perspective defines the technology for those that implement, use, and support it.
  2. Horizontally – the Data, Process, Location and People aspects are for and of interest to different sets of stakeholders.

In UAM, a methodical and logical approach (i.e., a well-defined development process) is used to define IT architectures. It is not haphazard or even arbitrary like many methodologies out there! In addition, the architectures are complete—all interrogatives are covered.

Finally, this methodology can be applied anywhere within the organization, from EA down to specific systems, and if carefully done all of these architectures are clearly related.

The Methodology Online

A simplified version of UAM is view-able online here: UAM Online. The methodology provides an overview of notations used and other background information, definition of the processes used in creating IT architectures, along with extensive help and guidance. A very simple overview of UAM using example diagrams is available here: Overview. Background information and the motivations for the creation of UAM, along with an introduction to the methodology is available here: UAM Background.

The methodology and example IT architectures are now available through a EUPL license. They are available either online (as noted above), or a ZIP of the website for download: