Executive Summary - North Carolina Statewide Technical Architecture

Size: px
Start display at page:

Download "Executive Summary - North Carolina Statewide Technical Architecture"

Transcription

1 State of North Carolina NASCIO Nomination Enterprise Architecture Executive Summary - North Carolina Statewide Technical Architecture In 1994, North Carolina recognized a the need for a comprehensive enterprise architecture that outlined the state s strategy for implementing, managing, and supporting technology-based business solutions. This was necessary for state government to continue to operate in a cost-effective manner, while being responsive to the increasing needs and expectations of its citizens. Following the enterprise architecture strategies and related initiatives would then position the state to maximize the returns and benefits of its investments in technology and reduce the associated risks. North Carolina began embracing an open architecture approach to information technology (IT) as early as This visionary move was 10 to 15 years ahead of the industry. In 1996, this vision was solidified through the development and implementation of the North Carolina Statewide Technical Architecture ( The result of these early and consistent efforts is a mature and proven business focused and principle driven enterprise architecture. By design, the North Carolina Statewide Technical Architecture (NCSTA) has become engrained in the IT culture of state government as well as within the vendor community. The effectiveness of this implementation has been accomplished through establishing clear architectural documents, processes, governance, and statewide IT procurement model. This framework helps ensure that the technology solutions agencies implement are aligned with business requirements and consistent with the principles, standards, and practices outlined within this body of work. A fundamental premise of the NCSTA is designing and deploying IT systems that are highly adaptable to changes in business and technology. An enterprise architecture framework must also be adaptable in order to endure and succeed over time. The NCSTA has proven this adaptability by surviving changes in technology, government leadership, IT governance, legislative, and support staff. This is accomplished through an approach that allows, expects, and embraces change. This approach has undergone continual refinement without compromising the principles upon which it is based. The North Carolina Enterprise Architecture Program supports a significant portfolio of IT projects, in excess of $500 million since inception, and is the impetus behind many enterprise IT initiatives and common services. These include: Enterprise ecommerce Common Payment Service Enterprise Service Enterprise Identity and Access Management Service Enterprise Data Center (Mainframe and Distributed platforms) Statewide Telecommunications Network (Voice, Data, Video, etc.) Statewide IT Procurement Statewide Portal The North Carolina Statewide Technical Architecture is managed centrally but belongs to all agencies in state government. Throughout its life, the body of work is the result of the dedication of many individuals moderated by a keen understanding in the culture of North Carolina state government and the benefits of enterprise architecture.

2 Justification and Description North Carolina has a long and rich history of embracing a standards based and enterprise approach to information technology (IT), which began in the late 1970 s, at least 10 to 15 years ahead of the industry. A few years later, in the early 1980 s, North Carolina began a data center consolidation effort in order to achieve economies of scale and begin fostering the enterprise approach to information technology. By the beginning of the 1990 s, state legislators enacted legislation that instituted a commission based IT governance model and soon thereafter enterprise IT standards began being published. In 1994, North Carolina recognized a need for a comprehensive enterprise architecture that outlined the state s strategy for implementing, managing, and supporting technology. This was necessary for state government to realize its enterprise and standards based goals and to continue to operate in a cost-effective manner, while being responsive to the increasing needs and expectations of its citizens. Following the enterprise architecture strategies and related initiatives would then position the state to maximize the returns and benefits of its investments in technology and reduce the associated risks. In 1996, this vision was solidified through the development and implementation of the landmark North Carolina Statewide Technical Architecture (NCSTA). With the institution of a governance model and the implementation of the NCSTA, the state was properly positioned to begin realizing the benefits of enterprise architecture. Fundamental to the success and validation of the enterprise architecture was an IT project approval process. Agency IT projects over a $500,000 threshold were brought through a project approval process that included an assessment of the technology choices for alignment with the NCSTA, as well as an evaluation of the project management approach. These actions resulted in a monitored IT project portfolio in excess of $500 million. Processes of this nature are critical to the success of any enterprise architecture program. The North Carolina governance and project approval processes are backed by legislation and supported at the highest levels in state government. While governance has changed over time, the approach North Carolina has taken to the development and maintenance of enterprise architecture has survived by designing agility and adaptability into the supporting processes such as governance, evergreen, maturity review, content development, and training. The NCSTA has served as a model for enterprise architecture industry wide. Due to this fact, many other government entities, both foreign and domestic, have sought North Carolina s enterprise architecture team s advice on enterprise architecture. From these dialogues, many of these government entities have adopted the North Carolina approach to enterprise architecture as well as the NCSTA content either in whole or in part. Furthermore, North Carolina is routinely asked to speak at industry conferences on enterprise architecture, not only as experts in this area but also as a successful case study. Very few (if any) other state government or private industry entities have achieved this level of maturity and success in the area of enterprise architecture. North Carolina s maturity and success in enterprise architecture is further exhibited by a recent NASCIO enterprise architecture maturity assessment, which was completed in - 2 -

3 August The EA maturity levels reached at each category as well as collectively clearly positions North Carolina as a top tier leader in the enterprise architecture arena. Category EA Maturity Level Level Title Administration Level 5 Continuously Improving, Vital Program Planning Level 5 Continuously Improving, Vital Program Framework Level 5 Continuously Improving, Vital Program Blueprint Level 4 Managed Program Communication Level 3 Well-defined Program Compliance Level 3 Well-defined Program Integration Level 3 Well-defined Program Involvement Level 3 Well-defined Program In summary, North Carolina has one of the longest continuously improving and vital enterprise architecture programs in the industry and has demonstrated maturity and success. Furthermore, North Carolina has been a model for many other enterprise architecture programs both in public and private sector industries. Improvements in Government Operations North Carolina has identified several key success factors to the operation of government that are kept at the forefront of the enterprise architecture program. These success factors are used to drive the development and implementation of the North Carolina Statewide Technical Architecture as well as other key IT strategies. They include: Agility in offering new and better services Rapid response to changing economic and political conditions and legislative initiatives More efficient and effective operations Quicker response to increased public expectations Greater accountability for results Adaptability to change Ability to do more with less In order to fulfill these requirements, a framework for the development, implementation, and integration of business systems must be in place. North Carolina has found that the larger and more complex the organization, the greater the need for a unified architecture. This framework and unified architecture is the North Carolina Statewide Technical Architecture. In support of the success factors listed above, North Carolina outlines the following principles and drivers: Information Technology is a business asset of the enterprise Information Technology must not constrain the business - 3 -

4 Information Technology must easily adapt to changes in business requirements Information Technology must enable collaboration and interaction Services must be accessible by anyone, anywhere, anytime The state must maximize information technology investment value The NCSTA is business focused and principle driven. This is key to the success of any enterprise architecture program and more importantly, key to improving operation of government. The success of the North Carolina enterprise architecture program is due, in large part, to a properly instituted and business focused enterprise architecture that is driven by principles resulting in improved government operations. Benefits North Carolina implements shared environments, which are deployed in alignment with the goals and objectives of the state to strengthen the management and sharing of information technology in the state while maintaining consistency with the principles, practices, and standards in the NCSTA. Opportunities to share and collaborate on information technology are initiated where the state can realize increased efficiencies, enhanced accountability of expenditures, and improved cost-effective use of investments. The state is also committed to working with agencies to provide better service to citizen and business, by developing a customercentric estate, which promotes the delivery of more timely, reliable, and easier access to services and useful information. Information technology in North Carolina state government is tempered by an enterprise architecture (the NCSTA) that provides agencies and vendors with principles, practices, and standards in virtually every aspect of technology. A fundamental premise that spans many of the NCSTA domains is to look for opportunities to de-couple common services in applications as reusable components, which can be shared across application boundaries. This is one of the key areas where the state can realize benefits in providing services to its constituency. Enterprise architecture, by its very nature, is far reaching in its influence and impact on services provided to citizens and state agencies through the use of information technology. A properly instituted enterprise architecture program enables enterprises to realize goals such as interoperability and the provision of centralized services to both citizens and state agencies. The benefits to the state, both citizens and agencies, have been significant. For illustrative and brevity purposes, the following two enterprise initiatives were chosen as examples of centralized services that have their roots in the state enterprise architecture program. Enterprise ecommerce Common Payment Service The North Carolina Common Payment Service has been particularly successful in helping to reduce cost and increase efficiencies. This is a shared enterprise service that enables state applications to interface with payment processing services provided centrally. It offers Automated Clearing House (ACH), Electronic Funds Transfer (EFT), and credit card processing services for state agencies. To date, approximately half of all - 4 -

5 state agencies, several universities, and some local government entities are utilizing this service. North Carolina s volume is approximately $225 million in credit card transactions and $2.5 billion in ACH annually. With this volume, North Carolina is able to leverage the transaction volume of the state to reduce overall cost for participants. A master service agreement has been established, which provides significantly better rates than could be obtained by any individual agency. Additionally, in alignment with principles outlined in the NCSTA, centralizing a service such as this enables agencies to integrate their applications very quickly using a common API and achieve significant economies of scale. Enterprise Identity Management and Access Service North Carolina has implemented a centralized service for the authentication and identity management of users of various state applications. These users include state employees, business users, and individual citizens. This service provides the following benefits: Ensure that citizens, business partners, and employees have a single, consistent, reliable, and easy to use interface with government. Enable agencies to rapidly build and deploy their ecommerce applications through the use of pre-fabricated components. Realize cost savings through volume discounts on ecommerce products and out-sourced services. Provide a secure, robust, reliable enterprise infrastructure for the authentication, authorization, and logging of access to agency applications. Offer an enterprise infrastructure for the management of user identities that enables self-registration, self-administration, and delegated administration. Create an enterprise infrastructure that offers provisioning and deprovisioning of users and user rights. Develop an automated process for the approval of account creation and access rights, which match the business processes of the agency. Centralize compliance with federal, state, and local security statutory and regulatory and requirements such as Common Criteria and the Health Insurance Portability and Accountability Act (HIPAA). Development of a service offering that encompasses the above features and provides them in a cost-effective manner by leveraging economies of scale. Since its inception, North Carolina has launched certain key initiatives in order to realize the principles espoused in the NCSTA. Implementation of this service was one of those key initiatives tied to the NCSTA. Cost-effective Use of Investments The investment into the North Carolina enterprise architecture program has been largely an investment into staff and training. However, some of the key centralized services that are a result of the principles outlined in the North Carolina enterprise architecture that were established as initiatives are amplified below

6 Return on Investment Enterprise ecommerce Common Payment Service Cost Avoidance The common payment service provides an infrastructure that supports Automated Clearing House (ACH), credit card processing, and Electronic Funds Transfer (EFT). ACH for example, allows agencies to improve cash flow, save time, and enhance customer service. Using this same example, ACH transactions versus traditional paper checks save an average of.28 cents per transaction. The current ACH volume is approximately 700,000 transactions annually, or nearly $200,000 savings per year, on ACH alone. Enterprise Identity Management and Access Service Cost Avoidance As described above, this service centralizes identity management and controls access to many of the state s applications and crosses agency boundaries. This functionality, if implemented independently by each agency, is costly and complex. If this service were not implemented, agencies would be forced to implement their own solutions independently and bear direct costs far above the enterprise approach. An order of magnitude analysis is as follows: Enterprise Costs: $ 6,600, Agency Independent Implementation Costs: $ 890, Multiplied By 23 Agencies: $ 20,470, Estimated Net Savings: $ 19,810, These figures were derived from a sampling of one agency and are based on estimated five-year life cycle costs. All figures used to derive the Estimated Net Savings are not shown in detail. Formatted: Bullets and Numbering Enterprise Electronic Mail Service Cost Avoidance The state has implemented a centralized enterprise-class service that is available to state agencies, local government, universities, community colleges, and K-12 schools. is classically described by most industry analysts as infrastructure and utilitarian in nature. A study was performed in North Carolina state government to assess the benefits of an enterprise approach to . The study found that costs for implementing systems independently by each agency is 57% higher than participating in an enterprise service. Furthermore, as the number of users increases the cost per user decreases significantly. It can be estimated that, if all state agency users were to utilize the central service, the state could save between $150,000 and $200,000 per year. Centralized E- mail was an early NCSTA initiative and continues to be expanded to reduce costs and increase efficiencies in state government. These are only a few of the many examples of how an enterprise approach to technology can realize increased efficiencies, enhanced accountability of expenditures, and improved cost-effective use of investments. It can be stated confidently that North Carolina has saved many millions of dollars through the implementation of an enterprise architecture program

NASCIO Recognition Award Nomination - 2009. IT Project and Portfolio Management

NASCIO Recognition Award Nomination - 2009. IT Project and Portfolio Management NASCIO Recognition Award Nomination - 2009 IT State of North Carolina Enterprise Project Management Office June 3, 2009 Executive Summary The Enterprise Project Management Office () was established in

More information

State of Montana Strategic Plan for Information Technology 2014

State of Montana Strategic Plan for Information Technology 2014 State of Montana Strategic Plan for Information Technology 2014 This document is prepared under the authority of the Montana Information Technology Act of 2001. It is published biennially unless special

More information

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Achieve Economic Synergies by Managing Your Human Capital In The Cloud Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid

More information

Technology Resource Planning

Technology Resource Planning Technology Resource Planning Part 1: Technology Assessment Summary The Department is dedicated to modernizing and expanding its current information technology function. An independent assessment of the

More information

INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary

INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA Executive Summary The Commonwealth of Pennsylvania has launched a comprehensive IT management transformation. This transformation is evolving the IT governance

More information

Enterprise IT Portfolio Governance and Management Model

Enterprise IT Portfolio Governance and Management Model STATE OF MICHIGAN Department of Information Technology Enterprise IT Portfolio Governance and Management Model NASCIO 2007 RECOGNITION AWARDS CATEGORY: IT PROJECT AND PORTFOLIO MANAGEMENT Enterprise IT

More information

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange Software as a Service Flexible Service Delivery for Your Health Insurance Exchange SaaS Health Insurance Exchanges Improving Services through More Cost-Efficient Delivery States are charged with making

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Ohio Nomination for Enterprise IT Management VOICE IN THE CLOUD - TELEPHONY AS A UTILITY SERVICE Category: Enterprise IT Management Contact: Katrina B. Flory Ohio

More information

1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) 2006 UPDATE

1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) 2006 UPDATE Report No. 1 of the e-government Sub-Committee 1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) 2006 UPDATE The e-government Sub-Committee recommends the adoption of the recommendation contained in

More information

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Technical Management Strategic Capabilities Statement. Business Solutions for the Future Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.

More information

COMMONWEALTH OF MASSACHUSETTS

COMMONWEALTH OF MASSACHUSETTS COMMONWEALTH OF MASSACHUSETTS Implementation Roadmap February 2003 February 2003 Page 165 of 191 February 2003 Page 166 of 191 A. INTRODUCTION The findings and recommendations of the Enterprise IT Strategy

More information

An RCG White Paper The Data Governance Maturity Model

An RCG White Paper The Data Governance Maturity Model The Dataa Governance Maturity Model This document is the copyrighted and intellectual property of RCG Global Services (RCG). All rights of use and reproduction are reserved by RCG and any use in full requires

More information

, Head of IT Strategy and Architecture. Application and Integration Strategy

, Head of IT Strategy and Architecture. Application and Integration Strategy IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL

More information

Accenture Technology Consulting. Clearing the Path for Business Growth

Accenture Technology Consulting. Clearing the Path for Business Growth Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers

More information

The multisourcing approach to IT consolidation

The multisourcing approach to IT consolidation Experience the commitment WHITE PAPER The multisourcing approach to IT consolidation The proven commercial practice of multisourcing services integration can help state and local governments achieve IT

More information

Technology Services Strategic Plan

Technology Services Strategic Plan Technology Services Strategic Plan 2014 Table of Contents A Changing Landscape... 3 Values... 4 Technology Services Goals... 5 Employee Engagement... 6 Operational Efficiency... 7 Agency Satisfaction...

More information

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management Category: Cross Boundary Collaboration Initiation date: August 2011 Completion date: October 2013 Nomination submitted

More information

Make your workplace really work

Make your workplace really work Make your workplace really work Avanade Communications and Collaboration Solutions A study by Forrester* notes that 59% of workers said they would save more than 15 minutes per day using technologies that

More information

Fund 60030 Technology Infrastructure Services

Fund 60030 Technology Infrastructure Services Mission To provide a reliable and secure technology infrastructure foundation required to support County business processes and systems that strengthen the public service commitment of Fairfax County.

More information

The Future of Census Bureau Operations

The Future of Census Bureau Operations The Future of Census Bureau Operations Version 1.0 April 25, 2013 The Future of Census Bureau Operations Page ii [This page intentionally left blank] The Future of Census Bureau Operations Page iii Document

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

ENTERPRISE ARCHITECTUE OFFICE

ENTERPRISE ARCHITECTUE OFFICE ENTERPRISE ARCHITECTUE OFFICE Date: 12/8/2010 Enterprise Architecture Guiding Principles 1 Global Architecture Principles 1.1 GA1: Statewide Focus 1.1.1 Principle Architecture decisions will be made based

More information

How To Develop An Enterprise Architecture

How To Develop An Enterprise Architecture OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY

More information

State of Minnesota IT Governance Framework

State of Minnesota IT Governance Framework State of Minnesota IT Governance Framework June 2012 Table of Contents Table of Contents... 2 Introduction... 4 IT Governance Overview... 4 Process for Developing the New Framework... 4 Management of the

More information

Revenue and Sales Reporting (RASR) Business Intelligence Platform

Revenue and Sales Reporting (RASR) Business Intelligence Platform Department of Information Resources Revenue and Sales Reporting (RASR) Business Intelligence Platform NASCIO 2009 Recognition Awards Category: Data, Information and Knowledge Management Executive Summary

More information

Business Architecture Scenarios

Business Architecture Scenarios The OMG, Business Architecture Special Interest Group Business Architecture Scenarios Principal Authors William Ulrich, President, TSG, Inc. Co chair, OMG BASIG wmmulrich@baymoon.com Neal McWhorter, Principal,

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

2014 SUMMARY ANNUAL REPORT AND 2015 ANNUAL MEETING DOCUMENTS

2014 SUMMARY ANNUAL REPORT AND 2015 ANNUAL MEETING DOCUMENTS 2014 SUMMARY ANNUAL REPORT AND 2015 ANNUAL MEETING DOCUMENTS To Our Shareholders New ways of living and working made possible by centralized computing, mobile access and high-speed networks are transforming

More information

eva Mobile 4 Business Category: Government to Business Initiation date: January 2012 Completion date: July 2012

eva Mobile 4 Business Category: Government to Business Initiation date: January 2012 Completion date: July 2012 eva Mobile 4 Business Category: Government to Business Initiation date: January 2012 Completion date: July 2012 Nomination submitted by: Samuel A. Nixon Jr. Chief Information Officer Commonwealth of Virginia

More information

IT Governance Overview

IT Governance Overview IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope

More information

The Art of Architecture Transformation. Copyright 2012, Oracle and/or its affiliates. All rights reserved.

The Art of Architecture Transformation. Copyright 2012, Oracle and/or its affiliates. All rights reserved. The Art of Architecture Transformation Oracle Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

More information

CA XOsoft Content Distribution v4

CA XOsoft Content Distribution v4 PRODUCT BRIEF: CA XOSOFT CONTENT DISTRIBUTION CA XOsoft Content Distribution v4 CA XOSOFT CONTENT DISTRIBUTION (FORMERLY CA XOSOFT WANSYNC CD) IS A SIMPLE, HIGHLY FLEXIBLE AND COST-EFFECTIVE CONTENT DELIVERY,

More information

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section

More information

Agency for State Technology

Agency for State Technology Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief

More information

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges WHITE PAPER The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges Cloud computing offers a significant opportunity for improved business outcomes through the delivery of innovative

More information

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Project, Program & Portfolio Management Help Leading Firms Deliver Value in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business

More information

Supporting Customer Journeys and Your Business with a Cloud Contact Center. ebook

Supporting Customer Journeys and Your Business with a Cloud Contact Center. ebook Supporting Customer Journeys and Your Business with a Cloud Contact Center ebook COMPANIES ARE ACCELERATING MOVEMENT Contact Center Applications Are Going to the Cloud Frost & Sullivan / Sept 2014 Report

More information

1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS)

1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) Report No.3 of the e-government Sub-Committee 1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) The e-government Sub-Committee recommends the following: 1. The presentation made by Louis Shallal, Director

More information

INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES

INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES Open Data in the G20 In 2014, the G20 s Anti-corruption Working Group (ACWG) established open data as one of the issues that merit particular

More information

Succeeding with Business Process Outsourcing

Succeeding with Business Process Outsourcing A P P L I C A T I O N S A WHITE PAPER SERIES COMPANIES ARE SEEKING NEW WAYS TO STREAMLINE PROCESSES, REALIZE FURTHER COST REDUCTIONS AND INCREASE TIME-TO-MARKET. MANY ORGANIZATIONS ARE CONSIDERING BUSINESS

More information

The Benefits of ICT. June 2007 GP.C.PDF.07.E.1115.1

The Benefits of ICT. June 2007 GP.C.PDF.07.E.1115.1 The Benefits of ICT June 2007 GP.C.PDF.07.E.1115.1 The Benefits of ICT Help You Connect, Collaborate and Compete A strong ICT (information and communications technology) strategy is pivotal to competitive

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Collaboration Tools: Innovation Management and Solution Infusion Benefits

Collaboration Tools: Innovation Management and Solution Infusion Benefits 2007 NASCIO Recognition Awards Information Communications Technology Innovations Collaboration Tools: Innovation Management and Solution Infusion Benefits Michigan Department of Information Technology

More information

2013-2015 INFORMATION

2013-2015 INFORMATION 2013-2015 INFORMATION TECHNOLOGY DEPARTMENT STRATEGICTRATEGIC PLANLAN www.nd.gov/itd OUR MISSIONISSION To provide leadership and knowledge to assist our customers in achieving their mission through the

More information

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Gear Up for the As-a-Service Era A Path to the

More information

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing

More information

Managed Enterprise Internet and Security Services

Managed Enterprise Internet and Security Services Managed Enterprise Internet and Security Services NOMINATING CATEGORY: CYBER SECURITY INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF INFORMATION OFFICER COMMONWEALTH OF PENNSYLVANIA FINANCE BUILDING HARRISBURG,

More information

OLD DOMINION UNIVERSITY INFORMATION TECHNOLOGY SERVICES 2015-2016 ITS OPERATIONAL PLAN

OLD DOMINION UNIVERSITY INFORMATION TECHNOLOGY SERVICES 2015-2016 ITS OPERATIONAL PLAN OLD DOMINION UNIVERSITY INFORMATION TECHNOLOGY SERVICES 2015-2016 ITS OPERATIONAL PLAN OLD DOMI N I ON UN I V E RS I T Y VI S I ON ST A T E ME N T Old Dominion University will be recognized nationally

More information

Security Services. Benefits. The CA Advantage. Overview

Security Services. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA SITEMINDER FEDERATION SECURITY SERVICES CA SiteMinder Federation Security Services CA SITEMINDER FEDERATION SECURITY SERVICES EXTENDS THE WEB SINGLE SIGN-ON EXPERIENCE PROVIDED BY CA

More information

The Bank of New York Mellon is Open For Business.

The Bank of New York Mellon is Open For Business. TREASURY SERVICES The Bank of New York Mellon is Open For Business. Merger Spawns New Platform for Enhanced Treasury Services. Sponsored supplement to Treasury & Risk magazine The Bank of New York Mellon

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

HP and netforensics Security Information Management solutions. Business blueprint

HP and netforensics Security Information Management solutions. Business blueprint HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization

More information

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services A guide to HP enterprise mobility solutions Expanding the potential of your business with advanced mobility services Going mobile, staying ahead These days, hardworking enterprise IT and technology managers

More information

Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs

Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs . White Paper Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs Executive Summary The concept of virtualization has gotten renewed

More information

IT Service Management. The Role of Service Request Management

IT Service Management. The Role of Service Request Management RL Consulting IT Service Management The Role of Service Request Management Prepared by: Rick Leopoldi June 1, 2007 Copyright 2001-2007. All rights reserved. Duplication of this document or extraction of

More information

An Evaluation Framework for Selecting an Enterprise Cloud Provider

An Evaluation Framework for Selecting an Enterprise Cloud Provider An Evaluation Framework for Selecting an Enterprise Cloud Provider WHITE PAPER This White Paper is intended for senior IT leaders of global enterprises considering a new cloud solution or expanding an

More information

Accenture & NetSuite

Accenture & NetSuite Accenture & NetSuite Gray background is only to allow visibility of all elements on page. Delete as needed. Delivering High Performance Turn off NOTES in Layers menu to Through the Cloud eliminate these

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012)

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012) UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES Approved by SBA General Faculty (April 2012) Introduction In 1926, we embarked on a noble experiment the creation

More information

Building a Mature Mobile Strategy: 4 Criteria for Secure Collaboration

Building a Mature Mobile Strategy: 4 Criteria for Secure Collaboration Building a Mature Mobile Strategy: 4 Criteria for Secure Collaboration Today s most productive employees are not tied to a desk, an office, or a location. These top producers are experts at finding new

More information

Digital Customer Experience

Digital Customer Experience Digital Customer Experience Digital. Two steps ahead Digital. Two steps ahead Organizations are challenged to deliver a digital promise to their customers. The move to digital is led by customers who are

More information

A Final Report for City of Chandler Strategic IT Plan Executive Summary

A Final Report for City of Chandler Strategic IT Plan Executive Summary A Final Report for City of Chandler 6 January 2004 Table of Contents 1. Executive Summary... 1 1.1 Background... 2 1.2 Chandler Business and IT Context... 3 1.3 Chandler s IT Strategic Direction... 5 1.4

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

The Evolution to Cloud Communications

The Evolution to Cloud Communications The Evolution to Cloud Communications The adoption of Cloud Communications by enterprises: An evolution, not a revolution Table of Contents Introduction... 1 The Emergence of Private, Public and Hybrid

More information

UNIVERSITY OF CENTRAL FLORIDA ORLANDO, FLORIDA

UNIVERSITY OF CENTRAL FLORIDA ORLANDO, FLORIDA EXCELLENCE IN PRACTICE UNIVERSITY OF CENTRAL FLORIDA ORLANDO, FLORIDA NORTH AMERICAN EXCELLENCE AWARDS: WORKFLOW, MERIT EXECUTIVE SUMMARY Orlando, site of the America s most popular tourist attraction,

More information

Office of Information Technology. County of Dallas FY2014 FY2018 Information Technology Strategic Plan

Office of Information Technology. County of Dallas FY2014 FY2018 Information Technology Strategic Plan Office of Information Technology County of Dallas Letter from the Office of Information Technology This Information Technology Strategic Plan is the culmination of hard work and collaboration by County

More information

Sonata Managed Application Lifecycle Services

Sonata Managed Application Lifecycle Services Sonata Managed Application Lifecycle Services Leveraging IT to Deliver Growth-Centric Business Transformation Make IT an Enabler of Your Business with the Right Partner In today s complex and ever-changing

More information

Anatomy of an Enterprise Software Delivery Project

Anatomy of an Enterprise Software Delivery Project Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific

More information

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing Presented by : Ajay Budhraja, Chief, Enterprise Services ME (Engg), MS (Mgmt), PMP, CICM, CSM,

More information

The State of North Dakota

The State of North Dakota The State of North Dakota Title: Category: North Dakota Health Information Network Cross Boundary Collaboration and Partnerships Project Initiation: January 2012 Project Completion: June 2014 Contact:

More information

Striking the balance between risk and reward

Striking the balance between risk and reward Experience the commitment Striking the balance between risk and reward in payments modernization Staying competitive in financial services requires meeting everincreasing customer expectations for digital

More information

ONLINE SERVICES. Business and ICT Service Delivery Redefined

ONLINE SERVICES. Business and ICT Service Delivery Redefined ONLINE SERVICES Business and ICT Service Delivery Redefined RULES AND ROLES Even ten years ago, the rules and roles which governed the provision of ICT business services were very different. Business demands

More information

ElegantJ BI. White Paper. The Enterprise Option Reporting Tools vs. Business Intelligence

ElegantJ BI. White Paper. The Enterprise Option Reporting Tools vs. Business Intelligence ElegantJ BI White Paper The Enterprise Option Integrated Business Intelligence and Reporting for Performance Management, Operational Business Intelligence and Data Management www.elegantjbi.com ELEGANTJ

More information

Operational Success: Targeting Performance

Operational Success: Targeting Performance Operational Success: Targeting Performance INTRODUCTION Operational success has become widely accepted as a critical factor for real estate service providers (hereinafter referred to as providers ). It

More information

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly 10/24/2011 Office of Information Technology Table of Contents Executive Summary... 3 The Colorado Cloud...

More information

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive

More information

Enterprise Exchange Email. Category: Enterprise IT Management Initiatives. State: Nebraska

Enterprise Exchange Email. Category: Enterprise IT Management Initiatives. State: Nebraska Enterprise Exchange Email Category: Enterprise IT Management Initiatives State: Nebraska Project contact: Jayne Scofield I.T. Administrator Network Services Office of the CIO 501 S 14 th Street Lincoln,

More information

SHARED SERVICES. An Enabler for Managing Risk. Steve Tracy, Principal Consultant, ISG. www.isg-one.com

SHARED SERVICES. An Enabler for Managing Risk. Steve Tracy, Principal Consultant, ISG. www.isg-one.com SHARED SERVICES An Enabler for Managing Risk Steve Tracy, Principal Consultant, ISG www.isg-one.com INTRODUCTION During the last few years, companies have become increasingly focused on the need for effective

More information

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market

More information

Business Service Management Links IT Services to Business Goals

Business Service Management Links IT Services to Business Goals WHITE PAPER: BUSINESS SERVICE MANAGEMENT Business Service Management Links IT Services to Business Goals JANUARY 2008 Sarah Meyer CA SOLUTIONS MARKETING Table of Contents Executive Summary SECTION 1 2

More information

2015 Michigan NASCIO Award Nomination IT Investment Fund: Fiscal Responsibility and Accountability

2015 Michigan NASCIO Award Nomination IT Investment Fund: Fiscal Responsibility and Accountability 2015 Michigan NASCIO Award Nomination IT Investment Fund: Fiscal Responsibility and Accountability Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: James McFarlane, Customer

More information

SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk

SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk SHAREPOINT SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S SHAREPOINT CAPABILITY Lockheed Martin offers a full end to end service, delivering

More information

Cross-Domain Service Management vs. Traditional IT Service Management for Service Providers

Cross-Domain Service Management vs. Traditional IT Service Management for Service Providers Position Paper Cross-Domain vs. Traditional IT for Providers Joseph Bondi Copyright-2013 All rights reserved. Ni², Ni² logo, other vendors or their logos are trademarks of Network Infrastructure Inventory

More information

Cisco Enterprise Services. Expertise, Innovation, and Strategies to Accelerate Your Business Success

Cisco Enterprise Services. Expertise, Innovation, and Strategies to Accelerate Your Business Success Cisco Enterprise Services Expertise, Innovation, and Strategies to Accelerate Your Business Success Maximizing technology and business ROI Advanced technologies have the ability to transform the way businesses

More information

ITC 19 th November 2015 Creation of Enterprise Architecture Practice

ITC 19 th November 2015 Creation of Enterprise Architecture Practice ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG

More information

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture SOLUTION WHITE PAPER BMC Manages the Full Service Stack on Secure Multi-tenant Architecture Table of Contents Introduction................................................... 1 Secure Multi-tenancy Architecture...................................

More information

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE A Functional Model for Critical Infrastructure Information Sharing and Analysis Maturing and Expanding Efforts ISAC Council White Paper January 31, 2004 1. PURPOSE/OBJECTIVES This paper is an effort to

More information

Public Sector Hosting April 2015

Public Sector Hosting April 2015 Public Sector Hosting April 2015 Secure Cloud solutions with guaranteed UK data sovereignty. Cloud computing for the public sector Public sector organisations are increasingly driven to improve operational

More information

Consulting. PMOver Transforming the Program Management Office into a Results Management Office

Consulting. PMOver Transforming the Program Management Office into a Results Management Office Consulting PMOver Transforming the Management Office into a Results Management Office Executive summary Regardless of size and complexity, most programs encounter hurdles and issues. Many are able to address

More information

5 Steps to Choosing the Right BPM Suite

5 Steps to Choosing the Right BPM Suite 5 Steps to Choosing the Right BPM Suite BPM Suites can deliver significant business benefits and a fast ROI but only if you choose the right one By Laura Mooney, Metastorm Copyright 2009, Metastorm Inc.

More information

Background. An Introduction to Cisco Unified Communications Manager

Background. An Introduction to Cisco Unified Communications Manager Upgrading Cisco Unified Communications Manager Background Cisco s Unified Communications Manager (UCM) has been available to the market since 2000. What started as an innovative niche product, promoting

More information

Data Center Optimization: California s Blueprint for Success

Data Center Optimization: California s Blueprint for Success 2011 NASCIO RECOGNITION AWARD NOMINATION Nomination Category: Enterprise IT Management Initiatives Data Center Optimization: California s Blueprint for Success California Technology Agency Office of Technology

More information

Achieve full value from your applications. Avanade Application Development Solutions

Achieve full value from your applications. Avanade Application Development Solutions Achieve full value from your applications Avanade Application Development Solutions We have developed a commercial-grade software development factory that I would stack up against any commercial software

More information

Chapter 3 VITA s Supply Chain Management (SCM)

Chapter 3 VITA s Supply Chain Management (SCM) Chapter 3 VITA s Supply Chain Management (SCM) Chapter highlights Purpose: This chapter outlines VITA s Supply Chain Management s (SCM s) vision, mission, core values and guiding principles. It also discusses

More information

A Look into the Cloud

A Look into the Cloud A Look into the Cloud An Allstream White Paper 1 Table of contents Why is everybody talking about the cloud? 1 Trends driving the move to the cloud 1 What actually is the cloud? 2 Private and public clouds

More information

The Benefits of Cloud: Maximizing Resources, Maximizing Value

The Benefits of Cloud: Maximizing Resources, Maximizing Value The Benefits of Cloud: Maximizing Resources, Maximizing Value White Paper May 2015, Version 1.0 196 Van Buren Street - -Herndon, Virginia 20170 - -(571) 353-6000 - -(800) 761-9691 - -vion.com The Benefits

More information

The Evolution to Cloud Communications

The Evolution to Cloud Communications The Evolution to Cloud Communications The adoption of Cloud Communications by enterprises: An evolution, not a revolution Table of Contents Introduction... 1 The Emergence of Private, Public and Hybrid

More information