GC Enterprise Architecture/Working Groups
Home | EA standards | EARB Endorsements | EA Artifacts | Working Groups | GC EARB | Other References |
This page is a work in progress. We welcome your feedback. Please use the discussion page for suggestions and comments. When the page is approved and finalized, we will send it for translation. |
The following are list of active Working Groups currently available within the Enterprise Architecture umbrella, categorized per the B-I-A-T-S+P. The first one, GC Enterprise Community of Practice, will have sub-groups that have links to the other working groups as well.
Enterprise Architecture Community of Practice
GC Enterprise Architecture Community of Practice
Enterprise Business ArchitectureGC Business Capability Model Working Group provides a view of the GC enterprise in terms of business capabilities. |
Enterprise Information ArchitectureEnterprise Data Community of Practice to share authoritative information related to data practices and activities across the GC Share resources and connect with others exploring the cutting-edge of Machine Learning, Neural Networks & Deep Learning, Artificial Intelligence, Big Data, and Data Visualization Artificial Intelligence Policy Workspace builds a policy framework for the implementation of AI applications in federal institutions |
Enterprise Application ArchitectureA platform to share GC data within each other and with the outside world in a modern, secure, and unified way.
A platform to enable Open Source and Collaboration across all levels of Government and the Public. |
Enterprise Technology ArchitectureGC Cloud Working Group supports the secure adoption of cloud services by providing advice to departments, assessing cloud service requests, and developing GC Enterprise guidance. |
Enterprise Security & Privacy Architecture
Discusses and shares ideas, information and tips regarding Identity, Credential & Access Management; Enterprise Security Architecture; and Cyber Security Event Management |
Defines and standardizes practice & processes with regard to establishment and use of trusted digital identities |
Need help? Contact us.
|