UAM

The Methodology

The Unified Architecture Method (UAM) defines a methodical approach to the creation of IT architectures. UAM covers all aspects of IT architecture, from entity modelling, process modelling, network modelling, and modelling of actors and roles. Create IT architectures at the enterprise level or the component level, and every level in-between. The heart of UAM is the Business Process Model and Notation (BPMN), extended with additional modelling elements that permit the definition of complete architectures that, by default, include IT security constructs. The methodology supporting this approach includes all required processes, deliverables, and detailed example architectures.

The Book

The book A Simplified Approach to IT Architecture with BPMN A Coherent Methodology for Modelling Every Level of the Enterprise describes UAM. It distills the insights a seasoned IT professional gathered over the course of thirty-five years spent studying, designing, deploying, analyzing, and refining IT architectures. This approach, rooted in models, follows a logical process for creating architectures that can unify corporate IT across every level of the enterprise. Anyone involved in IT, IT design, IT management, and IT development would benefit from reading the book—not just IT architects. The book:

  • Demystifies IT architecture - learn what IT architectures are and how they are used;
  • Defines IT architectures - understand the models required and how to create them;
  • Describes the IT Security architectural pattern - this pattern is integrated into UAM, a must in this interconnected world;
  • Describes the architecture life-cycle - learn how IT architectures are created, validated, maintained and used.

The book and UAM, clarifies what IT architecture is, where it fits within the enterprise, how to produce valid IT architectures, and how to apply the resulting models to advance the goals of the enterprise. In addition, with IT security constantly in the news, IT architectures must include this aspect. This book, and the associated UAM Methodology, integrate IT security right into your IT architecture. Regardless of the methodology used, improve your understanding of IT architectures and IT security through reading this book! The book is available for purchase directly from iUniverse, Amazon, or Indigo.

"I applaud the author for accomplishing all that he has. He has taken software development methodologies industry best practices, customized them with his own material -- some of which I find refreshingly unique, made them available in a customizable repository, and written this great book on how to use it. This book is nicely organized and easy to read. It does a great job of presenting the material. I highly recommend it to anyone interested in learning more about IT Architecture and SDLC (systems development life cycle) tailoring. Personally I think it is a great contribution to the industry."

"The very best book I've ever seen on IT Architecture. And I've seen a lot. I am an "Enterprise Architect" in a Fortune 20 company, and have been for decades. This book seems to bring more knowledge together in a single place than any other IT Architecture book I've ever seen."