Unified Architecture Method (UAM) was created by David W. Enstrom after 33 year working in the IT field.
UAM originally started off as EAM, the Enterprise Architecture Method back in 2008. EAM was, as one can gather, focused on Enterprise Architecture (EA). When it was decided to progress this methodology further, it became clear that the focus needed to be dramatically changed—it had to be more encompassing. After many months of research the UAM concepts and approach became clear. It is still roughly based upon the Zachman Framework, but that is about the only thing that the two methodologies have in common—the underlying concepts and metamodel for the UAM framework are quite different.
The Unified Architecture Method (UAM) defines a methodical approach to the creation of IT architectures. All aspects of IT architecture are covered, from entity modeling, process modeling, network modeling, and the modeling of actors and roles. IT architectures are defined at the enterprise level or the system level, and every level in-between.
The heart of UAM is the Business Process Model and Notation (BPMN), extended with additional modeling elements that permit the definition of complete architectures. ISO 42010 (Systems and software engineering – Architecture description) is the basis for the notation and structure of the Perspectives, Viewpoints, and Aspects that are at the heart of the UAM architecture framework. Integrated Perspective and Viewpoint modeling languages are defined for each level of modeling: Business, Logical, and Technical.
The methodology and example IT architectures are now available through a EUPL licence. They are available either online, or a ZIP of the website for download:
UAM, including the motivations and background, is described in the book A Simplified Approach to IT Architecture with BPMN – A Coherent Methodology for Modelling Every Level of the Enterprise, is available for purchase from iUniverse or Amazon. This approach is detailed in the methodology, which includes processes, guidance, governance, templates, and detailed example architectures. It describes how to create comprehensive and integrated IT architectures, and make use of them to progress business objectives. An introduction to UAM is here: UAM Introduction, and the methodology can be view online here: UAM Online.
OMG and BPMN are either registered trademarks or trademarks of Object Management Group, Inc. in the United States and/or other countries.
© 2022 by David W. Enstrom, Ottawa, Ontario, Canada.
Mr. David Enström, after receiving a Bachelor of Science with Honours (Mathematics and Engineering) from Queen’s University in 1974 acquired thirty-three years of experience in leading edge information technology design and development with the Communications Security Establishment (CSE) in Ottawa, Canada. His specialty is in defining enterprise architecture, enterprise IT security architecture, IT strategy definition and architecture process definition, which was his main occupation from 1994 through to 2007 when he retired.
Mr. Enstrom has extensive experience in IT projects, IT project management, logical data modeling, and IT architecture. He was also involved, while at the CSE, with partner relations, participating in many ongoing technology planning, standards definitions, and implementation activities. Mr. Enstrom retired from CSE on June 29th, 2007, and is now providing IT Architecture and IT security consulting services.
David lives in Canada with his wife Lise. His many interests and hobbies include sailing, golf, skiing, classical guitar, and photography.
Mr. Enström authored or co-authored the following papers:
- Enström, David, Hossendoust, Siavosh, Walsh, D’Arcy, 2007, “A Reference Model for Enterprise Security – High Assurance Enterprise Security”, ICEIS 2007 Proceedings.
- Enström, David, Hossendoust, Siavosh, 2008, “Business Driven Risk Assessment – A Methodical Approach to Risk Assessment and Business Investment”, ICEIS 2008 Proceedings.
- Enström, David, Walsh, D’Arcy, 2009, “A Rigorous Approach to IT Architecture”, Proceedings of the Forty Third Annual Hawaii International Conference on System Sciences (HICSS-43), 10 pages, CD-ROM, IEEE Computer Society, January 2010.