Open Badges from The Open Group

The Open Group is pleased to announce the piloting of our Open Badge program for the professional certification programs. Over the coming months, we will be issuing digital badges for all of The Open Group Certification Programs. These web-enabled badges will allow everyone with an Open Group certification, to clearly, more simply, and consistently promote their Open Group credentials online.

ArchiMate® Specification Update and ArchiMate Day 2017

ArchiMate® Version 3.0: Technical Corrigendum No. 1 (TC1) has been published. This is a set of corrections to the ArchiMate 3.0 Specification. It is available as a free download from The Open Group website, and an updated version of the full specification including TC1 has been published, known as the ArchiMate 3.0.1 Specification. The second ArchiMate Day will be held at The Open Group Amsterdam event on Wednesday, October 25th.

Making Standards Work for e-Government at The Open Group Ottawa conference, July 17-20, 2017

The Open Group Ottawa 2017 Highlights

The aim of this event was to unite practitioners and industry experts to discuss achievements, lessons learned and looming issues in e-Government. The theme, “Making Standards Work® e-Government” looked at the e-Society, e-Technology and e-Management viewpoints –federal, provincial, municipal and NGOs. Emphasis was on how techniques such as Enterprise Architecture and Business Design and standards such as TOGAF® and ArchiMate® are acting as a foundational core for enterprise transformation.
Topics include: issues surrounding business transformation, business analysis, information sharing, e-health, privacy and cyber-security. In addition, the strategic execution and the application of emerging technologies and management techniques to e-Government will be the subject of presentations by global experts.

The Open Trusted Technology Provider™ Standard (O-TTPS) – Approved as ISO/IEC 20243:2015 and the O-TTPS Certification Program

By The Open Group

The increase of cybersecurity threats, along with the global nature of Information and Communication Technology (ICT), results in a threat landscape ripe for the introduction of tainted (e.g., malware-enabled or malware-capable) and counterfeit components into ICT products. This poses significant risk to customers in the operation of their business enterprises and our critical infrastructures.

1 2 3