Enterprise Architecture Maturity Level 1

3930 views
Enterprise Architecture

Published on 30 Nov 2018

Share | Embed | Viewer | Email

Enterprise Architecture Maturity Model

Many architects and their managers from the EA field ask themselves still these questions: What is Enterprise Architecture and what is the value of Enterprise Architecture?

This model shows the basic blocks that need to be in place in order to reach enterprise architecture maturity level #1.

Dragon1 as open method defines maturity level #1 as all key stakeholders and projects being aware of Enterprise Architecture, having access to Enterprise Architecture products, making use of some of them and providing feedback.

On this page, you can read more about the Benefits of Enterprise Architecture maturity levels.

As part of reaching maturity level #1, you need to create an Enterprise Architecture dossier filled with at least 20 to 30 products.

On Dragon1 Resources you can read about the Enterprise Architecture dossier standard.

Category: EA

Next content to watch

Mars-Landers-Rovers-Locations

Mars-Landers-Rovers-Locations

439 Views
Workflow-Diagram-Order-Processing

Workflow-Diagram-Order-Processing

586 Views
Collaboration as a Service

Collaboration as a Service

572 Views
Principles-of-the-Toucans-Bill

Principles-of-the-Toucans-Bill

517 Views
Schets van Proces

Schets van Proces

478 Views
Hello World

Hello World

638 Views
World Map as Heat Map?

World Map as Heat Map?

520 Views
ArchiMate Transformation Viewpoint

ArchiMate Transformation Viewpoint

4668 Views
AI Chatbot Reference Architecture

AI Chatbot Reference Architecture

20815 Views
What is Amazons Business Model - Denis Oakley

What is Amazons Business Model - Denis Oakley

4877 Views
What is Enterprise Architecture - Roger Evernden

What is Enterprise Architecture - Roger Evernden

6098 Views
Architecture Diagram - What is the Value?

Architecture Diagram - What is the Value?

10425 Views
Image Moderation Chatbot

Image Moderation Chatbot

8453 Views
IBM - Cyber Security: How it works

IBM - Cyber Security: How it works

2293 Views