Enterprise Architecture Program: Publications, Resources & Toolkit

A View from the Marketplace: What They Say About State IT Procurement

  • 23 October 2018
  • Author: Mike Cooke
  • Number of views: 2934
A View from the Marketplace: What They Say About State IT Procurement

This document renews NASCIO’s call for IT acquisition reform and is a product of the NASCIO Roundtable on IT Procurement Innovation. The publication focuses on the role the private sector can play in the state IT acquisition process (not just the IT procurement process) and includes feedback from NASCIO’s private sector members as well as recommendations for all involved in the state IT acquisition process.


Rate this article:
No rating


About The Enterprise Architecture Program

The NASCIO Enterprise Architecture program was developed to enable the mission of state and local government. Government must continually reinvent itself to remain relevant by effectively and efficiently providing services to the citizens of this country. The path to this continual transformation must embrace leadership, management, coordination, communication and technology throughout government. Enterprise architecture is the discipline to appropriately define and leverage these capabilities within the complexities of government.

Funding to support the NASCIO EA Program and information sharing initiative is provided by a grant from the U.S. Department of Justice, the Bureau of Justice Assistance, Office of Justice Programs.

Enterprise Architecture Development Tool-Kit v3.0

October 2004

The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.