Difference between revisions of "GC Enterprise Architecture/Working Groups"
m |
m |
||
Line 73: | Line 73: | ||
− | <span style="font-size: 1.5em;"><b>Data Science | + | <span style="font-size: 1.5em;"><b>[https://gcconnex.gc.ca/groups/profile/5394852/data-science-goc?language=en Data Science @GoC]</b></span> |
− | Data | + | Share resources and connect with others exploring the cutting-edge of Machine Learning, Neural Networks & Deep Learning, Artificial Intelligence, Big Data, and Data Visualization |
[[Image: Image_placeholder.png |100px| left]] | [[Image: Image_placeholder.png |100px| left]] | ||
− | |||
− | |||
Revision as of 17:12, 5 March 2019
Home | EA standards | EARB Endorsements | EA Artifacts | Working Groups | GC EARB | Other References |
This page is a work in progress. We welcome your feedback. Please use the discussion page for suggestions and comments. When the page is approved and finalized, we will send it for translation. |
Working Groups within the Enterprise Architecture
The following are list of active Working Groups currently available within the Enterprise Architecture umbrella, categorized per the B-I-A-T-S+P. The first one, GC Enterprise Community of Practice, will have sub-groups that have links to the other working groups as well.
Enterprise Architecture Community of Practice
GC EA CoP
GC Enterprise Architecture Community of Practice
Enterprise Business Architecture
GC Business Capability Model Working Group
|
Enterprise Information Architecture
Enterprise Data Community of Practice
Share resources and connect with others exploring the cutting-edge of Machine Learning, Neural Networks & Deep Learning, Artificial Intelligence, Big Data, and Data Visualization
AI WG Artificial Intelligence Policy Workspace |
Enterprise Application Architecture
Part of Enterprise Application Architecture
|
Enterprise Technology Architecture
Part of Enterprise Technology Architecture |
Enterprise Security & Privacy ArchitectureDiscusses and shares ideas, information and tips regarding Identity, Credential & Access Management; Enterprise Security Architecture; and Cyber Security Event Management
|
Defines and standardizes practice & processes with regard to establishment and use of trusted digital identities
|
Need help? Contact us.
|