Defining the Discipline of Application Architecture

Size: px
Start display at page:

Download "Defining the Discipline of Application Architecture"

Transcription

1 Research Publication Date: 12 June 2008 ID Number: G Defining the Discipline of Application Architecture Michael J. Blechar, Daniel Sholler, Anthony Bradley The term "application architecture" is commonly associated with various application design and architectural efforts that organizations often perform in an ad hoc or embedded manner that the new demands of Web-centric, interoperable, highly distributed systems have made separate and critical. Application architecture is a critical discipline for building effective application services and solutions that work with "common componentry" in a manner that satisfies the organization's requirements, while supporting its future evolution. It is nearly impossible to successfully build IT applications, or a portfolio of applications, without leveraging various patterns, practices and frameworks. Key Findings The increasing demand for application agility and shareability leading to and feeding off of service-oriented architecture (SOA) is driving complexity into application design. Application architects bring solution design knowledge, which enables more-traditional developers to transition to new application delivery types (such as service-oriented development), and less-skilled developers to become proficient in them more quickly. IT application and business process agility require well-designed and highly reusable software services that can be assembled as part of new solutions. Application architects are tasked with the design of these services. Recommendations Build a core competency in the application architecture discipline. Define and staff the role of application architect as part of executing SOA and business process management (BPM) projects. Application architects must work collaboratively with enterprise, technical, business and information architects as part of the organization's solution architecture efforts to ensure that the systems built conform to the requirements, principles and models that support the enterprise's change agenda, as captured in the gap plan and transition road map. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

2 TABLE OF CONTENTS Analysis Definition of Application Architecture Why Should I Care About Application Architecture? Putting Application Architecture in Context Scope of the Application Architect Role Examples of Architectural Decisions Made at Application Design Time What You Need to Know Recommended Reading LIST OF FIGURES Figure 1. Gartner's EA Framework... 6 Figure 2. The Application Architect Role at a Glance... 8 Publication Date: 12 June 2008/ID Number: G Page 2 of 11

3 ANALYSIS 1.0 Definition of Application Architecture Application architecture is the discipline of designing an IT material solution to an identified business need that incorporates situational guidelines and constraints (such as business requirements, enterprise architecture [EA], information architecture, existing infrastructure, available resources and the state of technology) to provide a core set of architecture artifacts that will guide subsequent application construction and deployment efforts. The complexities of today's IT solutions make application architectures a critical core-competency for any midsize to large company. Legacy application architectures must be understood and documented to improve the effective support of an asset and to lengthen its life. New applications will leverage newer architectural concepts, such as SOA and WOA, which must be combined with the legacy applications using older concepts. Organizations must understand how the existing models, design patterns, architectural styles and frameworks are evolving to make intelligent decisions about their own application architectures. Application architects must factor into the design of new applications and software services: The current application portfolio and short-term changes that are being made to it through build, buy and sourcing projects The longer-term future enterprise solution architecture plans as expressed and consolidated in the EA plan or road map The greater interoperability ecosystem in which the service or application must operate Industry and enterprise design standards Security, performance and costs related to application design choices The requirements, principles and models that support the enterprise's change agenda The trade-offs or conflicts that may emerge between short-term project needs and endstate enterprise architecture goals Application architects flesh out the architecture of a system through the use of design patterns (which they establish and evolve in cooperation with the broader IT architecture community). To improve application productivity, quality, consistency and compliancy, they are responsible for establishing, promoting and managing the reuse of application architecture practices and artifacts in support of the application portfolio as a whole. A primary mantra of application architecture is to leverage what has been built, and build what can be leveraged. This not only includes delivered services and applications, but also application architecture best practices and design artifacts. Example design artifacts include: Requirements decomposition Business use cases System use cases Reference architectures Logical architectures Publication Date: 12 June 2008/ID Number: G Page 3 of 11

4 Design patterns Sequence diagrams Event streams Information flows Information structures Service catalogs Service definitions Service documentation Testing guidelines Deployment patterns Deployment guidelines 2.0 Why Should I Care About Application Architecture? Application architecture success is determined by the level of effective sharing and execution of application architecture practices and artifacts resulting in design efforts that improve the agility (responsiveness to change) and cost-effectiveness of software applications. Direct application architecture benefits include, but are not limited to: better fulfillment of business needs, cost savings, easier system integration, faster application delivery, improved system performance, lower maintenance effort, and greater resilience and adaptability to change. In the move from a more insular and monolithic application delivery approach to an agile and leveraged interoperability ecosystem, application architects must pursue new approaches to application design, while maximizing the role of existing systems. This "current" base of systems will be extended by additional architectural overlays to support new approaches and application types, such as SOA, WOA, EDA, enterprise "mashups" and social applications. To successfully navigate to these new architectures, organizations must: Understand how these architectures fit into the enterprise and deliver value. Determine when it's best to use a specific architectural approach. Design software, data components and services to cross organizational and architectural boundaries. Design for end-to-end performance and cost-effective levels of consistency, reliability, performance and agility of application solutions across the enterprise. Leverage the expertise of architects in application design to make developers more productive and to reduce development cost and time. Design the application and, in aggregation, the application portfolio so they can evolve in response to business changes and EA planning. In moving to next-generation architectures, there are four major objectives for the application architecture discipline: Publication Date: 12 June 2008/ID Number: G Page 4 of 11

5 1. Design for leverage: Improve application leverage through the use of standards, a focus on interoperability and robust security mechanisms based on application architecture analysis and design best practices. 2. Design for evolveability: Ensure that a sound migration path exists from the current to the future versions of software architectures. 3. Design for simplicity: Enable less-skilled developers to create and maintain application solutions. Improve developer productivity and facilitate the speed of architectural and design changes to application solutions. 4. Design for serendipity: Serendipity is the pinnacle of flexibility. Application architecture should not only facilitate known flexibility needs, but should strive to enable emergence and innovation that is yet unknown. 3.0 Putting Application Architecture in Context As depicted in Figure 1, Gartner's EA framework contains three major "sub-architectures" business, information and technology. Enterprise architects work at a conceptual level to build future "enterprise solution architectures" based on business plans and strategies. For more information on the enterprise solution architecture, see "Gartner Enterprise Architecture Framework: Evolution 2005." The enterprise architects work with business, information, technical and application architects to plan and guide the transition from the current business processes, application portfolio, databases, platforms and technologies toward the future state. This transition planning usually takes the form of a gap plan or road map, which outlines the enterprise's evolution via the intended design of future enterprise solutions. The transition plans must cost-effectively balance current operational needs with the march toward the future state. An enterprise solution will consist of one or, more likely, many application solutions (among other things). Therefore, application architecture, which centers on designing material application solutions, is a critical part of enterprise solution architecture realization. Publication Date: 12 June 2008/ID Number: G Page 5 of 11

6 Figure 1. Gartner's EA Framework Solution Architecture Source: Gartner (June 2008) Application architecture has a fractal relationship to EA. It focuses on the architecture portion of the application solution (that is, the application solution architecture), which is a fractal subset of the enterprise solution architecture. It unifies relevant segments of the EA disciplines of enterprise information architecture, enterprise business architecture and enterprise technical architecture to address the needs of a particular application solution in a manner that is consistent with and adds value to the overall application portfolio. Application architects must be able to effectively collaborate with EAs to serve the broader and longer-term vision of the enterprise solution architecture, as well as the immediate needs of the target application solution. In other words, application architects ensure that applications work together for some broader business purpose in support of the organization's overarching strategies, rather than function as isolated islands of rigid and limited capability. For more information on the roles of the business and information architects, see "Q&A: Business Analyst and Business Architect Roles Are Different" and "Gartner Defines Enterprise Information Architecture." In organizations where a robust EA capability exists, the enterprise architects are responsible for the overall development and management of the future enterprise solution architecture. The enterprise architects provide the enterprise vision and constraints to the application, information, business and technical architects, and collaborate with them in developing the future enterprise solution architecture and in formulating application solution architectures facilitating the transition to it. As a result, in some organizations, the broader technical and standardization aspects of the application architecture role are fulfilled within the EA team (by enterprise architects, technical Publication Date: 12 June 2008/ID Number: G Page 6 of 11

7 architects or application architects attached to the EA team), while particular application solution architectures are done by application architects assigned to the application solution project team. Application architects participate as collaborative members of the EA team, as well as members of the project-specific application solution team. This cross-pollination, and hybrid alternatives, is an emerging best practice, and is successful as long as the application architect role is properly performed at both levels. For more information on the collaborative roles, see "Building the Enterprise Architecture Team." 4.0 Scope of the Application Architect Role As depicted in Figure 2, the application architect starts with two architecture givens the existing application portfolio within the current "as-is" application solution architecture and the future "tobe" enterprise solution architecture. The application architect establishes the design standards that are to be used when applications are built (and, ideally, to which application packages will adhere to if purchased). As application projects receive requirements from the business units, application architects decide which reusable design patterns and frameworks to apply to the projects. Application architects build the application design, including which existing software and data services will be assembled into the new application solutions. They also determine when departures to existing standard design artifacts are required for a particular application solution, and they progress through the architecture governance process to gain exception. This effort helps ensure that the architecture artifacts evolve with changing technology and application solution requirements. Publication Date: 12 June 2008/ID Number: G Page 7 of 11

8 Figure 2. The Application Architect Role at a Glance Current Application Architecture Work in Process Architecture No. 1 Work in Process Architecture No. 2 Future Solution Architecture Design Patterns & Frameworks Reusable Software Services Design Standards Reusable Data Services Work in Process Reqmts. No. 1 Application Design Work in Process Reqmts. No. 2 Source: Gartner (June 2008) The application architect establishes when and how legacy applications are to be wrapped or split apart as software services, and which new software services are to be developed. The application architect publishes design artifacts and assists the EA team, application portfolio managers and software service providers in promoting enterprise leverage of software services and design artifacts. All of this needs to be coordinated across releases of the application portfolio as part of the evolving "work in process" transition toward the enterprise solution architecture. At this juncture, application architects need to coordinate their efforts with others. For example, information architects will need to coordinate the master data management efforts, data services, and database designs and deployments in conjunction with application architects' software service designs. Additional details uncovered during requirements-gathering may cause enterprise architects to tweak the future solution architecture. Application architects must work closely with developers and package implementers to ensure design compliance and service reuse. Integration and technical architects must ensure that performance and security requirements can be met in terms of middleware, workflow, and orchestration software and networks. The application architect role can be implemented in many ways. In some organizations, the EA group may create a "solution architect" position to address the role of application architect. Publication Date: 12 June 2008/ID Number: G Page 8 of 11

9 Enterprises with smaller IT organizations may elect to have software engineers fill the role on a project-by-project basis. However, given the skill set and breadth of knowledge needed, we are increasingly seeing the role of application architect staffed as part of a center of excellence that includes support for SOA design, governance, service registries and repositories, and reuse metrics. These architects are often attached or assigned to application solution project teams. Regardless of how the application architect role is implemented, it is critical to the future success of applications, especially for SOA and BPM initiatives, because they hinge on the ability to design and deliver reusable services that can be assembled and executed effectively within a varied set of technical architecture topologies. Moreover, the application architect is needed to ensure a sound transition strategy from current application solution architectures to the future enterprise solution architecture. 5.0 Examples of Architectural Decisions Made at Application Design Time Many application architecture decisions need to be made at solution design time. There are several areas of solution design and architecture that overlap (for example, the creation of reusable services). The solution design will likely incorporate a set of potentially reusable services, some of which will be exposed to the user. For example, a CRM system may have a service that returns various statistics about the structure of sales territories. Because territories (in this particular example) are named accounts, and those are adjusted for work-balance regularly, this service information is volatile. Although it is clear that the provisioning of the information must be a service, what is not clear is how that information will be consumed. Depending on the consumption pattern, different architectural options are available. For example, if the principle consumers of this application were applications owned by the company that resided across different network topologies, technology platforms and security domains, then it is likely that the application architect would follow a path of using Web services or traditional middleware connectivity to enable application interactions with multihop complexities. However, if this information was primarily used by business analysts to determine the proper rebalancing of accounts and territories, and likely required some interpretation and possible combination with external data (such as map location), then the application architect might decide that the most useful method of access would be an enterprise mashup using WOA. There are other classes of decisions that are similar. For example, the application architecture team may have determined that using the Spring framework is an appropriate choice for Java development. However, formulating the policies for when to use Java Database Connectivity, data acquisitions or Java Persistence APIs to manage persistence is a specific design question for a particular application, and one that is made time and time again by designers. Therefore, the decision should be subject to some architectural policy established by the application architect to simplify the decision. In this way, the knowledge of the application architect can be leveraged by less-skilled developers. This is an example of the application architect constructing application development and deployment guidance. Other examples include details that will fundamentally shape the differences in design: Does the application require the use of message-oriented middleware, or do we rely on HTTP messaging or some other networking standards (such as raw Transmission Control Protocol [TCP])? Publication Date: 12 June 2008/ID Number: G Page 9 of 11

10 Given the expected service levels, does this program require us to run it on our commercial XTP application server environment (which happens to be WebSphere); and if so, should we program to the Spring/WebSphere integration model? Should the application use WOA or Web services? Does the need exist to control processing using context-driven architecture "environment-sensing" capabilities? 6.0 What You Need to Know As organizations evolve from mainframe and traditional client/server architectures to SOA and other new age and future architectures in the pursuit of increased developer productivity and enhanced application agility, they must pay greater attention to the discipline of application architecture. Therefore, ensuring that the role of application architect is properly fulfilled should be a priority. Because software developers generally lack the "bigger picture" systems design knowledge needed for the role of application architect, and most enterprise architects lack the technical ability to translate between business analysts and development teams to determine what constitutes good reusable services, organizations should staff the role with people that have a balanced mix of technical systems design, business requirements gathering and communication skills. Application architects help realize a smooth transition from the current application portfolio to the future enterprise solution architecture. Through the effective development, management and sharing of high-quality application design artifacts, they promote the development and management of leverageable application and information services that can be assembled and reassembled (that is, orchestrated) to flexibly address changing business process workflows. Consider the discipline of application architecture a key part of enabling the next generation of IT solutions in your organization. RECOMMENDED READING "Key Issues in Application Architecture, 2008" "Key Issues for SOA, EDA and WOA, 2008" "SOA Applications Should Mix Client/Server, EDA and Conversational Patterns" "Service-Oriented Architecture Overview and Guide to SOA Research" "Tutorial for EDA and How It Relates to SOA" "Key Issues for Enterprise 'Mashup' Practices, Technologies and Products, 2008" "Applying WS-* Based Web Services and WOA Standards to Enterprise Application-to- Application Interoperability Challenges" "Understanding and Applying the Design Differences Between WS-* Based Architecture and Web-Oriented Architecture" "Demand for SA Applications Drives EP Systems Enabled by SOA and Web 2.0 Synergy" Publication Date: 12 June 2008/ID Number: G Page 10 of 11

11 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 12 June 2008/ID Number: G Page 11 of 11

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Gartner's Business Intelligence and Performance Management Framework

Gartner's Business Intelligence and Performance Management Framework Research Publication Date: 9 October 2006 ID Number: G00142827 Gartner's Business Intelligence and Performance Management Framework Bill Hostmann, Nigel Rayner, Ted Friedman The use of business intelligence

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

Risk Intelligence: Applying KM to Information Risk Management

Risk Intelligence: Applying KM to Information Risk Management Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

How BPM Can Enhance the Eight Building Blocks of CRM

How BPM Can Enhance the Eight Building Blocks of CRM Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Q&A: The Impact of XBRL on Corporate Performance Management

Q&A: The Impact of XBRL on Corporate Performance Management Research Publication Date: 27 May 2008 ID Number: G00158184 Q&A: The Impact of XBRL on Corporate Performance Management Nigel Rayner Extensible Business Reporting Language is an XML-based standard that

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Data Center Consolidation: Top 10 Best Practices for Project Success

Data Center Consolidation: Top 10 Best Practices for Project Success Research Publication Date: 2 May 2011 ID Number: G00212551 Data Center Consolidation: Top 10 Best Practices for Project Success David J. Cappuccio Many data center consolidation projects fail to meet overall

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

Organizational Structure: Business Intelligence and Information Management

Organizational Structure: Business Intelligence and Information Management Research Publication Date: 14 April 2006 ID Number: G00138940 Organizational Structure: Business Intelligence and Information Management Betsy Burton, Lee Geishecker, Bill Hostmann, Ted Friedman, David

More information

Successful EA Change Management Requires Five Key Elements

Successful EA Change Management Requires Five Key Elements Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Tactical Guidelines for Narrowing Your Choices When Evaluating WCM Vendors

Tactical Guidelines for Narrowing Your Choices When Evaluating WCM Vendors Research Publication Date: 24 December 2008 ID Number: G00163788 Tactical Guidelines for Narrowing Your Choices When Evaluating WCM Vendors Mick MacComascaigh CIOs and other IT leaders responsible for

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Roundup of Business Intelligence and Information Management Research, 1Q08

Roundup of Business Intelligence and Information Management Research, 1Q08 Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey. Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)

More information

Mainframe Modernization: When Migration Is the Answer

Mainframe Modernization: When Migration Is the Answer Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

Eight Criteria for Evaluating Software License Metrics

Eight Criteria for Evaluating Software License Metrics G00213489 Eight Criteria for Evaluating Software License Metrics Published: 1 June 2011 Analyst(s): Alexa Bona, Jane B. Disbrow, Peter Wesche Procurement executives and software asset managers are struggling

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process

Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process Industry Research Publication Date: 30 June 2008 ID Number: G00158005 Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process David Schehr Redundant and

More information

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Research Publication Date: 23 April 2008 ID Number: G00156910 XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Nigel Rayner, Neil Chandler Extensible Business Reporting Language

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary. Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important

More information

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

Repurposing Old PCs as Thin Clients as a Way to Save Money

Repurposing Old PCs as Thin Clients as a Way to Save Money Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers

More information

ERP, SCM and CRM: Suites Define the Packaged Application Market

ERP, SCM and CRM: Suites Define the Packaged Application Market Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users

More information

Document the IT Service Portfolio Before Creating the IT Service Catalog

Document the IT Service Portfolio Before Creating the IT Service Catalog Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service

More information

Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset

Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset G00217757 Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset Published: 22 December 2011 Analyst(s): Bill O'Kane Lexmark International undertook a master data management (MDM) program

More information

How To Create A Cloud Computing System

How To Create A Cloud Computing System G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus

More information

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%.

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%. Research Publication Date: 29 March 2010 ID Number: G00174769 DCIM: Going Beyond IT David J. Cappuccio Infrastructure and operations (I&O) leaders must now go beyond performance management of IT equipment

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Case Study for Supply Chain Leaders: Dell's Transformative Journey Through Supply Chain Segmentation

Case Study for Supply Chain Leaders: Dell's Transformative Journey Through Supply Chain Segmentation Research Publication Date: 12 November 2010 ID Number: G00208603 Case Study for Supply Chain Leaders: Dell's Transformative Journey Through Supply Chain Segmentation Matthew Davis Faced with ever-changing

More information

EHR Advantages and Disadvantages

EHR Advantages and Disadvantages Industry Research Publication Date: 3 February 2010 ID Number: G00174011 The Limits of Certification and Guarantees in Buying Electronic Health Records in the U.S. Wes Rishel It is important not to rely

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

Q&A: Seven Questions Every Business Intelligence Leader Must Answer

Q&A: Seven Questions Every Business Intelligence Leader Must Answer Research Publication Date: 9 April 2008 ID Number: G00156821 Q&A: Seven Questions Every Business Intelligence Leader Must Answer Kurt Schlegel, Bill Hostmann Every business intelligence leader must answer

More information

GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary

GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS Executive Summary Gartner EXP is an exclusive, membership-based organization of more than 3,000 CIOs and senior IT leaders worldwide. Members benefits from the

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

Essilor Increases Business-to-Business and Businessto-Consumer

Essilor Increases Business-to-Business and Businessto-Consumer Research Publication Date: 3 October 2006 ID Number: G00142208 Essilor Increases Business-to-Business and Businessto-Consumer Revenue With CRM Isher Kaila Essilor increased the loyalty of 1,150 independent

More information

Prepare for the Inevitable With an Effective Security Incident Response Plan

Prepare for the Inevitable With an Effective Security Incident Response Plan G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information