Premium Content

Access "The Open Group Architecture Framework (TOGAF™ 9) and the US DoD"

CW+Open-Group -TOGAF-9 and-the-US-DoD -Arch Framework.jpg

Sponsored by ComputerWeekly.com

This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.  Access >>>

Table of contents

  • The Open Group Architecture Framework Version 9 (TOGAF 9) 8
  • US Department of Defense Architecture Framework 2.0 (DoDAF 2.0)
  • TOGAF 9 ADM with DoDAF 2.0 Models

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Coding for Kids
    Coding For Kids.jpg
    E-Handbook

    Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

  • The Technology Industry Survey 2015
    MS_tech_survey.jpg
    E-Handbook

    This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals ...

  • Winning security use cases in the Computer Weekly European 2014 Awards
    CW_European_User_Awards_2014_security-252.jpg
    E-Handbook

    Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.