Open Framework, Information Management Strategy & Collaborative Governance | Data & Social Methodology - MIKE2.0 Methodology
Wiki Home
Collapse Expand Close

Members
Collapse Expand Close

To join, please contact us.

Improve MIKE 2.0
Collapse Expand Close
Need somewhere to start? How about the most wanted pages; or the pages we know need more work; or even the stub that somebody else has started, but hasn't been able to finish. Or create a ticket for any issues you have found.

Strategic Requirements that apply to Infrastructure Development Deliverable Template

From MIKE2.0 Methodology

Share/Save/Bookmark
Jump to: navigation, search
Under review.png
This article is a stub. It is currently undergoing major changes as it is in the very early stages of development and is only a placeholder. Please help improve MIKE2.0 by adding to this article.
This deliverable template is used to describe a sample of the MIKE2.0 Methodology (typically at a task level). More templates are now being added to MIKE2.0 as this has been a frequently requested aspect of the methodology. Contributors are strongly encouraged to assist in this effort.
Deliverable templates are illustrative as opposed to fully representative. Please help add examples to this template that are representative of the proposed output.

This document outlines the strategic requirements and technology principles that will determine the Infrastructure development. The SAFE architecture should be used as a starting point for this exercise. The architecture should be represented pictorially and also contain high level descriptions of all major components.

Foundation Capabilities for Infrastructure are in many ways the most fundamental of technologies required for any implementation. They are the base set of capabilities required to run systems, allow them to communicate and maintain a secure and stable environment. They include the following component areas:

  • Network
  • Process Automation
  • ETL (Extract, Transform, Load
  • Middleware
  • Platform
  • Information Security
  • Operations and Monitoring

Examples

Wiki Contributors
Collapse Expand Close