Zachman
Zachman
Enterprise/Project scope analysis. To clarify perspectives and responsibility areas. Zachman is a logical structure for classifying and organizing the descriptive representations
Read more.
Work Breakdown Structure
WBS – Work Breakdown Structures
A hierarchical decomposition of the total scope of work to be carried out by the project team to accomplish the
Read more.
VUCA
VUCA – Volatility, Uncertainty, Complexity, Ambiguity
Volatility – Inherently unstable and can change rapidly. Fast changing technology, cultural influences and so Uncertainty – The lack or
Read more.
Value Of Information
VoI – Value of Information
Measure relationship between Processing, uniqueness an relevance in context. Transported through a channel. For instance, mobile, book, newspaper. The value can
Read more.
Value Stream Map
Value Stream Map
A Value Stream Map is used to assess the steps in a process for the value they add or cost
Read more.
Value Proposition Canvas
Value Proposition Canvas
Precisely define your customer profilesIdentify your customer’s major Jobs-to-be-done, the pains they face when trying to accomplish their Jobs-to-be-done and
Read more.
SDLC V-Model
V-Model (Software Development Lifecycle)
This model might rather fit into a concept than an actual framework or methodology. Instead of Waterfall methodology where all
Read more.
User Story
User Story
In a culture, normally agile, where there are product owners, the requirements is written in User Stories. To be frank,
Read more.
UML – Unified Modeling Language
A common library of type of modeling to visually describe a problem. Primarily used to describe software engineering problems. There
Read more.
Tuckman Levels of team growth
Tuckmans – Four Stages Team Growth
Tuckman defined the four stages of team activity as follows:  Forming – unclear expectations, boundaries, in need of role definition 
Read more.
TOGAF - The Open Group Architecture Framework
TOGAF – The Open Group Architecture Framework
This is a framework primarily for enterprise architecture. It provides an approach for designing, planning, implementing, and governing an enterprise
Read more.
The Twelve Factor App
The Twelve-Factor App
12 factor app can be seen as a methodology for software developers. It’s purpose is specifically to act as a
Read more.
MUDA, MURI, MURA, Nine Wastes
The Nine Wastes – MUDA, MURI, MURA
Muda is a Japanese word for waste or any work that the customer is not willing to pay for. This
Read more.
The Hedgehog Concept
A company should focus on activities that fall inside three intersecting circles: What you can be the best in the
Read more.
Dunning Kruger Effect
The Dunning-Krüger Effect
 1. Unconscious incompetence;  2. Conscious incompetence;  3. Conscious competence;  4. Unconscious competence.
Read more.
SWOT
SWOT Analysis
SWOT Analysis is a technique used to define Strength, Weakness, Opportunities and Threats to a project, organization, unit, initiative etc.
Read more.
Structured What If Analysis
SWIFT – Structured What If Analysis
Structured What If Technique (SWIFT) is a prospective hazards analysis method that uses structured brainstorming with guide words and prompts
Read more.
STRIDE
STRIDE Model
STRIDE is a threat classification model developed by Microsoft for thinking about computer security threats. It provides a mnemonic for
Read more.
Strategy Map
Strategy Map
The process of constructing a strategy map aligns a senior leadership team and permits it to do several things: Set
Read more.
Storyboard
Storyboard
The story board is a artefact that come close to the personas. Usually a Storyboard uses a Persona to travel
Read more.
Story Map
Story Map
To be used to describe how a process work in different states of a project life cycle. It also frequently
Read more.
STEEPLE
STEEP, or STEEPLE factors
When trying to identify factors, influers etcetera. STEEP or STEEPLE is a way to categorize the factors. Social/demographic Technological Economic
Read more.
Sliding Architecture Strategy
STAS – Sliding Technology Architecture Strategy
The STAS is in the core about the reference architectures at an organization, or a unit within a large organization.
Read more.
Stakeholder Meetings Strategy
Stakeholder Meetings Strategy
This model act more as a ideated target for meeting with stakeholders. It help increase awareness in what topics and
Read more.
Stakeholder Journey Mapping
Stakeholder Journey Mapping
Journey maps can be valuable for scenarios that describe a sequence of events. For instance, mapping multiple scenarios for one
Read more.
Stakeholder Empathy Mapping
Stakeholder Empathy Mapping
There are some more common models of this, than others. The key point is to map out the concerns that
Read more.
Spiral SDLC
Spiral Model (SDLC)
The spiral model starts with an initial pass through a standard waterfall life cycle, using a subset of the total
Read more.
SMART Goals
SMART Goals
S-Specific, this is the what, where, how when and with whom part of the goal. For example: I want to
Read more.
Six sources Strategy Matrix
Six Sources Strategy Matrix
This model comes from this book Influencer: The Power to Change Anything, by Kerry Patterson, Joseph Grenny, David Maxfield, Ron McMillan,
Read more.
SIPOC - Supplier, Inputs, Process, Outputs, Customers
SIPOC – Supplier, Inputs, Process, Outputs, Customers
A Six Sigma tool used to visualize flows. A typical purpose can be to reduce waste or develop existing processes
Read more.
Seven methods of IT Service Cost Allocation
Seven Methods of IT Service-Cost Allocation
Changes to services, and new services imply change in cost to serve – know these costs through a CMDB or
Read more.
Scrum
Scrum
In contrary to waterfall, a building methodology of a software can be done according to Scrum. The difference is basically
Read more.
Scenario Planning
Scenario Planning
Herman Khan and Gaston Berger has ben known for developing scenario planning. Khan was working for the Military and Berger
Read more.
SAFe – Scaled Agility Framework Extended
The Scaled Agile Framework (SAFe®) helps businesses address the significant challenges of developing and delivering enterprise-class software and systems in
Read more.
ROSI - Return of Security Investment
ROSI – Return of Security Investment
ROSI is a ROI extended with security concerns. This simple evaluation concept applies to every investment, including security. The strength
Read more.
Risk management
Risk Management
n a risk assessment document Identify –> Analyze Plan Track Control —> Retired tasks Four basic strategies to manage any
Read more.
Risk Control Quadrant
Risk Control Quadrant
Inspiration of a way to apply risk control.
Read more.
Root Cause Analysis
RCA – Root Cause Analysis
RCA do have many faces. A specific success key in this method is to decide what the problem is, then
Read more.
Ralph Stacy Matrix
Ralph Stacey Matrix
Personally speaking, this is a favorite kind of model to me. It touch the philosophical plane of assessing and reaching
Read more.
RACI
RACI – Matrix Chart
RACI stands for Responsible Accountable Consulted Informed In its simplest form, RACI is a grid with a list of procedures
Read more.
PROSCI - ADKAR
PROSCI – ADKAR Model
ADKAR Model is a goal-oriented management model. Uses for instance to guide through a change in organization or a larger
Read more.
Project Framing Matrix
Project Trade-Off Matrix
In a stright forward way frame a project current need, and over time, trending changes.
Read more.
Project Prioritization Annual Planning Model
When prioritizing and planning projects, life is easier to have a bunch of simple models to support structure. The Project
Read more.
Product Value Chain
Product Value Chain
A general method to publish the value chain of a product or a service. Where does the revenue o a
Read more.
Product Market Fit
Product Market Fit
Lean development och product oriented development börjar segla upp i popularitet. Det mångåriga fokuset på begreppet “agil” går mot ett
Read more.
Porters Value Chain
Porters Value Chain
Elements – Rather than looking at departments or accounting cost types, Porter’s Value Chain focuses on systems, and how inputs
Read more.
Pm3 Förvaltningsramverk
Pm3 är en modell för förvaltningsstyrning och omfattar framförallt förvaltningsdelen (vidmakthållande och vidareutveckling) i en applikations livscykel. Jämför man exempelvis
Read more.
PEST
PEST / PESTLE Analysis
PESTLE can be seen as a view on the external environment, in which an organization is operating. As comparation, the
Read more.
PERT – Program Evaluation Review Technique
PERT is a estimation technique that uses statistical aspects on the amount of effort needed for a project and it’s parts. Normally PERT is done together with CPM (Critical Path Method) and visualized as a network diagram.
Read more.
Pecha Kucha 20x20
PechaKucha 20×20 Presentation Style
This is a style of presentation built on the idea that one must be efficient in it’s communication to the
Read more.
PBA (PBAAM) - Perspective Based Architecture Approach Model
PBA (PBAAM) – Perspective Based Architecture Approach Model
The PBA model can feel somewhat daunting, but is a powerful tool to achieve information about a architecture, from a
Read more.
OARP
OARP stands for Owner Accountable Responsible Participant  The OARP framework is some kind of cousin, but i bet the authors
Read more.
Nine-Box Analysis
Nine-Box Analysis
Nine-box is a common Wall Street assessment of a company, and can be performed between companies. http://tech.fortune.cnn.com/2014/01/06/apple-google-amazon-merckel/?section=magazines_fortune Cash Flow from
Read more.
Muri Mura (Muda)
Mura is the waste of unevenness or inconsistency. Depending on your context, it can have more than one manifestation. Identifying
Read more.
MSF - Microsoft Solutions Framework
MSF – Microsoft Solutions Framework
MSF was created to maximize the success of IT projects throughout the entire IT life cycle. This information is derived
Read more.
MoSCoW
Within software development, the chunk of work is estimated in time and effort. Often the work has to be prioritized,
Read more.
mof_microsoft_operations_framework.png
MOF – Microsoft Operations Framework
Microsoft Operations Framework (MOF) consists of integrated best practices, principles, and activities that provide comprehensive guidelines for achieving reliability for
Read more.
Missing Value of Architecture
Missing Value of Software Architecture
Philip Kruchten, known for the 4+1 View Models, promotes to think of where software architecture loosing value. Also read as
Read more.
Miles and Snow
Miles & Snow
A model that make use of certain type of cultures that organizations tend to have on the market. I.e. in
Read more.
MIKE 2.0
MIKE 2.0
Is used for enterprise information management.
Read more.
MDA - Model Driven Architecture
MDA – Model Driven Architecture
Model Driven Architecture. A software design approach for the development of software systems. It provides a set of guidelines for
Read more.
Lencionis 5 Dysfunctions
Lencioni’s 5 Dysfunctions
Lack of trust Fear of conflict Lack of commitment Avoiding accountability Inattention to results Dysfunctional teams are common in business;
Read more.
Lean Canvas Template
Lean Canvas Template
Lean Canvas is an adaptation of Business Model Canvas by Alexander Osterwalder which Ash Maurya created in the Lean Startup
Read more.
Lean Business Change Canvas
Lean Business Change Canvas
Urgency – key drivers for the proposed change Change recipients – key stakeholders impacted Vision – how strategic objcvs and
Read more.
4+1 Architectural View Model.svg
Kruchten 4+1 View Models
The view models is a method to describe the architecture from different views. According to this model, you can describe
Read more.
K3M – Knowledge Management Maturity Model
Relative to CMM (Corporate Maturity Model) there is also a maturity model for measuring knowledge and its impact and value
Read more.
Job Stories
Job Stories
More of a concept and idea, than a model. The concept gains in popularity because it lends itself to more
Read more.
ITIL - Information Technology Infrastructure Library
ITIL – Information Technology Infrastructure Library
To easier maintain and manage the numerous number of simultaneous changes over a large organization. ITIL is basically a set
Read more.
ITABoK
ITABoK – IT Architecture Book of Knowledge
IasaGlobal provides this large set of practical guidelines and some methodologies for driving IT architecture. It does also act as
Read more.
ISO/IEC 20000 IT Service Management
An international standard for IT Service Management promoting a code of practice and describes the best practices for the adoption
Read more.
IRM - Vintergatan
IRM – Vintergatan
The Milky Way model (Vintergatan) is a Swedish born framework that focus on visualize flows and capabilities that flows through
Read more.
INVEST
INVEST Requirements
Similarly to SMART Goals, the User Stories within software development says to be INVEST. INVEST is a widely accepted (expected)
Read more.
Innovation Matrix
Can be used to classify and sort innovation projects and initiatives.
Read more.
ICEPAC
Use ICEPAC to form a compelling presentation. Designed for teaching / instruction but equally applicable to public speaking and presentations.
Read more.
Hiearchy of Disagreement
Hierarchy of disagreement
Graham’s hierarchy is a concept built on seven levels. The point with the levels is to differentiate the level of
Read more.
The Five Great Presentation Techniques
Great Presentations “The Five”
ICEPACQualities of a useful presentation: Interest, Comprehension, Emphasis, Participation, Accomplishment, Confirmation CRESTThe five types of verbal support used to enhance
Read more.
Valuation Template
Generic Valuation Template
An general example of a valuation template that can be used together with a business case. The purpose might be
Read more.
Gated / Staged Deliveries
In project management perspective, the project might be delivered in stage gates. Those can than be used to match the
Read more.
Gartners 5 R’s Cloud Migration
When facing a need to move a system, function or component to the Cloud; Infrastructure, Platform as well as to
Read more.
Gartner MQ – Magic Quadrant
Who are the competing players in the major technology markets? How are they positioned to help you over the long
Read more.
FMEA
FMEA – Failure Mode and Effect Analysis
FMEA is a structured method to identify real or potential problems in any environment, process or system. Roughly it should
Read more.
Flow
Flow (Concept)
Flow is a concept that are useful to be aware of. Sometimes one think of flow as in velocity. With
Read more.
FEAF - Federal Enterprise Architecture Framework
FEAF – Federal Enterprise Architecture Framework
FEA / FEAF provide a common language and framework to describe and analyze IT investments, enhance collaboration and, ultimately, transform
Read more.
FBM - FOGG Behaviour Model
FBM – FOGG Behaviour Model
The core idea of FBM is this equation: B=MAT Behaviour Motivation Ability Trigger FBM shows that three elements converge at
Read more.
Fagan Inspection
Fagan Inspection
A Fagan inspection is a structured process of trying to find defects in development documents such as programming code, specifications,
Read more.
DuPont Chart
DuPont Chart
DuPont Chemical “invented” this chart in the 1950s, hence the name. The ratio combinations are mathematical identities, but DuPont packaged
Read more.
The Drexler/Sibbet Team Performance Model® (co-developed by Allan Drexler and David Sibbet) illustrates team development as seven stages, four to create the team and three to achieve increasing levels of sustained performance. The Model is widely used with as a framework and common language for supporting a team-based culture using The Grove’s Team Performance System
Drexler/Sibbet Team Performance Model
The Drexler/Sibbet Team Performance Model® (co-developed by Allan Drexler and David Sibbet) illustrates team development as seven stages, four to create the
Read more.
DOBLIN
DOBLIN
Doblin: 10 types of innovation (business architecture) Means that there are areas/types that are subject for innovation/change and optimization to
Read more.
DIK
DIK – Data Information and Knowledge
Sometimes K also follows by W – Wisedom. The fourth step refer to what you achieved and learnt by the
Read more.
Design Decision Maturity Model
Design Decision Maturity Model
As you might be aware of, there exist certain level of maturity in knowledge management. See for instance K3M. Also
Read more.
DEEP Product Backlog Grooming
DEEP
Any product that make use of agile way of working, likely have a product backlog. A well being product backlog
Read more.
Due Diligence
DD – Due Diligence
A model used to assess the value of a corporation or person before deciding to sign a contract or a
Read more.
DAMA
DAMA – Data Management Association International
DAMA is there to advance the concepts and practices of information and data management. DAMA do provide bodies of knowledge.
Read more.
Cynefin
This framework provide five different segments of contexts. A given issue might fit into one of this, defined by the
Read more.
Critical Path Method
CPM – Critical Path Method
The Critical Path Method (CPM) is a concepts usually from the project management. The concept is about estimating work need
Read more.
Conways Law
Conways Law
“Any organization that designs a system (defined more broadly here than just information systems) will inevitably produce a design whose
Read more.
Capability Maturity Map Integration
CMMI – Capability Maturity Map Integration
Compared to CMM, the CMMI is measuring how well a organization or a unit perform against a process or any
Read more.
<< Back to list all models

Leave a Reply

Your email address will not be published. Required fields are marked *