Enterprise architecture and ICT strategy development

Original price was: € 199,00.Current price is: € 0,00.


Two concepts: the former is a pillar on which the latter rests. How do these two measure up?

  • The IT manager who wants to speed up the organization's transformation with a full visibility on the status of all participants.
  • The customer who wants to clearly understand the goal of the project and at the same time want to be able to save some money.
  • The executive that wants to be able to support the transformation of his customer in the best way possible.
  • The security consultant who wants to help his client in preventing the current budget spendings.
  • The consultant that sees the IT transformation as an additional profit stream.
Data center
the key to digital transformation

how to manage it all

a distributed network is more secure and reliable than a centralized one

use routing protocols for security

Storage area network (SAN)
use storage devices for high performance data center networks that are fast

create an internal or external private network within your organization

connect multiple servers together using fibre channel

Selling price
what should the selling price be on a particular day in a particular month in a particular year ?

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. How does your organization respond to ICT security incidents?
  1. No formal process
  2. Organized chaos
  3. End-to-end process

Q. How do you know that ICT security is used correctly?
  1. Do not know
  2. I check if the ICT Security policy has been activated by the user
  3. Periodically I receive an email with ICT security updates
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Enterprise architecture and ICT strategy development”

    Your email address will not be published. Required fields are marked *